[3701] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BOOTP/DHCP security

daemon@ATHENA.MIT.EDU (itudps)
Wed Nov 27 20:04:02 1996

Date: 	Thu, 28 Nov 1996 06:08:30 +1030
Reply-To: itudps <itudps@ntx.city.unisa.edu.au>
From: itudps <itudps@ntx.city.unisa.edu.au>
X-To:         Jonathan Larmour <JLarmour@origin-at.co.uk>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <1.5.4.16.19961127192714.64278994@gatekeeper>

> >> > Examples of bogus information might include:
> >> >
> >> > o a new gateway that bounces everything to the real gateway but also keeps
> >> > a copy of certain information, this would often be undetected in a typical
> >> > large and busy commercial or educational network.
> >>
> >> [of course, you can do this with a packet sniffer just as easily].
> >
> >Not necessarily! The big point is that these requests are usually
> >broadcast and forwarded by the routers, so that you have a window of
> [snip 8< ]
>
> I thought the big point is that once this has done, all packets are sent to
> you for you to read, or more interestingly rewrite at whim. No need for
> sniffing, which may cause difficulties if not on the same subnet anyway, and
> wouldn't allow rewriting.

Someone might eventually notice the strange traffic pattern generated by a
fake gateway. But a dns or wins server would be very hard to spot and you
could use this to distribute requests to a lot of different (also hacked)
places on or outside the network, thus avoiding an obvious change in
network load.

This is a rather unnerving prospect.

--
 Dan Shearer                            email: Dan.Shearer@UniSA.edu.au
 Information Technology Unit            Phone: +61 8 302 3479
 University of South Australia          Fax  : +61 8 302 3385

home help back first fref pref prev next nref lref last post