[800] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Router filtering not enough! (Was: Re: CERT advisory )

daemon@ATHENA.MIT.EDU (Jonathan M. Bresler)
Thu Jan 26 22:48:18 1995

Date: Thu, 26 Jan 1995 20:48:26 -0500 (EST)
From: "Jonathan M. Bresler" <jmb@kryten.Atinc.COM>
To: "Daniel O'Callaghan" <danny@miriworld.its.unimelb.EDU.AU>
Cc: Jon Peatfield <J.S.Peatfield@amtp.cam.ac.uk>,
        Jim Duncan <jim@math.psu.edu>, rens@imsi.com, ddrew@mci.net,
        firewalls@GreatCircle.COM, bugtraq@fc.net, z056716@uprc.com,
        jp107@amtp.cam.ac.uk
In-Reply-To: <Pine.3.89.9501270907.C314-0100000@miriworld.its.unimelb.edu.au>

On Fri, 27 Jan 1995, Daniel O'Callaghan wrote:
> > > 	another method.  use the arp cache to check source ip addresses 
> > > against physical layer addresses, local net packets coming from the Net 
> > > router, rather then direct from the local machine should be dropped.  
> > > this is also sufficient to protect against the spoofing attack from the Net.
> > 
> > How hard would it be to modify tcpwraper (for example) to check the incomming 
> > MAC address on a connection and to be worried if it came from a list of 
> > routers but the address was the local net?
> 
> Does the arp cache really reflect the MAC address of the arriving 
> packets, or does it only contain the responses to ARP requests?
> 
> If the latter, then consider:
> 
> Since this week it has been demonstrated that it is not necessary for a 
> reply packet to reach the spoofer, it is not necessary for a spoofing 
> machine to respond to arp requests.

	no response, no service.  furthermore, you can cache the arp data 
in a file on your local dns server.  (write a tiny perl script to sit 
around responding to requests, iteratively.  it can also notify you when 
the guy with a pc in the next office decides to start using the wrong ip 
number.  a common problem here, as we bring all the dussss and windoze 
users to the real world)

> Take it a step further... mount a denial of service attack against the 
> machine being spoofed, then forge its ethernet address on outbound 
> packets, and listen in promiscuous mode for the inbound.
> 
> Scarey!
> 
> That said, the tcpwrapper MAC address mods have been on my do list for a 
> while.  It will add to your armour but will not be the be-all and end-all.
> 
> Danny
> 

Jonathan M. Bresler  jmb@kryten.atinc.com	| Analysis & Technology, Inc.  
						| 2341 Jeff Davis Hwy
play go.					| Arlington, VA 22202
ride bike. hack FreeBSD.--ah the good life	| 703-418-2800 x346


home help back first fref pref prev next nref lref last post