[20560] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cisco HSRP Weakness/DoS

daemon@ATHENA.MIT.EDU (bashis)
Sat May 5 14:06:49 2001

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID:  <200105051612.SAA02199@ns.wcd.se>
Date:         Sat, 5 May 2001 18:12:16 +0200
Reply-To: bashis <bash@NS.WCD.SE>
From: bashis <bash@NS.WCD.SE>
X-To:         jmayer@loplof.de
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010504075956.A3291@thot.informatik.uni-kl.de> from "Joerg
              Mayer" at May 04, 2001 07:59:56 AM

Hi

> b) what worries me about this method is that it is close to ideal for
>   a man in the middle attack (take over default gw, rewrite source
>   address to my own address, rewrite anything else in the packet, send
>   to the real router).

It's realy old news, this was allready known in '98 when they written
RFC 2281 ( http://www.faqs.org/rfcs/rfc2281.html )
but nobody have talked about it in public,
except Cisco who is saying how good it is, to get a fault tolerant network..

Well, i'm not suprised that there are lots of ppl who dont know this,
so thats why i posted it to bugtraq, to make ppl aware of it..

Regards,
bashis


--
\0x62\0x61\0x73\0x68\0x69\0x73

home help back first fref pref prev next nref lref last post