Vlan
Vlan
Vlan
Compromised
Presentation
MAC Attacks
MAC B Port 2
X-
Port 3
>?
Y->?
MAC C
4
B ->
MAC B
MAC C
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
Speak first
Deviation from learning bridge: never flood Requires a hosts to send traffic first before receiving
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
ARP Attacks
ARP Spoofing
C>A
IP a MAC A
,A
RP ,b
C ->
, IP B
b a- > ,
IP b MAC B
C>A
,A
RP ,b
IP c MAC C
ARP spoofing works only within one VLAN static ARP table on critical stations (but dynamic ARP override static ARP on most hosts!) ARP ACL: checking ARP packets within a VLAN ACL
Either by static definition Or by snooping DHCP for dynamic leases
Isolated VLAN
x x
Isolated Ports
10
11
Trunk Port
Trunk ports have access to all VLANs by default Used to route traffic for multiple VLANs across the same physical link (generally used between switches)
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
12
Trunk Port
Trunk Port
A station can spoof as a switch with 802.1Q signaling The station is then member of all VLANs Requires a trunking favorable setting on the port (the SANS paper is three years old)
http://www.sans.org/newlook/resources/IDFAQ/vlan.htm
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
13
Attacker
80 2. 1q ,8 02 .
802.1q, Frame
Fram e
Note: Only Works if Trunk Has the Same Native VLAN as the Attacker
Victim
Send double encapsulated 802.1Q frames Switch performs only one level of decapsulation Unidirectional traffic only Works even if trunk ports are set to off
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
14
Mitigation
Use recent switches Disable auto-trunking Never put host in the trunk native VLAN Put unused ports in an unused VLAN
15
16
Root
F B
Loop-Free Connectivity
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
17
P ST
Attacker
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
ST
18
F F
F B F
F B Root
Attacker
Vyncke ethernet layer 2 security
2003, Cisco Systems, Inc. All rights reserved.
19
Root Guard
Disables ports who would become the root bridge due to their BPDU advertisement
20
Other Attacks
21
22
ProActive Defense
23
Many current switches offer wire-speed ACLs to control traffic flows (with or without a router port) Allows implementation of edge filtering that might otherwise not be deployed due to performance concerns VLAN ACLs and Router ACLs are typically the two implementation methods
24
Network IDS are now able to Understand trunking protocols Fast enough to handle 1 Gbps
Including management of alerts !
25
802.1x
802.1x is an IEEE Standard for Port Based Network Access Control EAP based Improved user authentication: username and password Can work on plain 802.3 or 802.11
26
ted ry p Enc
Supplicant
27
802.1x Header
EAP Payload
28
Login Request Credential s Login Good! Apply Policies Check with Policy DB
29
Authentication timeout. Retries expired. Client is not 802.1x capable. Put them in the quarantine zone!
30
Summary
31
32
33
Final Word
Switches were not designed for security Now, switches are designed with security in mind In most cases, with good configuration, they can even enhance your network security
34