From: ccie2be (ccie2be@nyc.rr.com)
Date: Fri May 06 2005 - 09:09:14 GMT-3
Hi Brian,
That post was a real eye opener. Thanks for that contribution.
However, you say 2 things which should raise eyebrows.
"R2 (the rogue device)has applied the same IP address as R1 and is receiving
the RIP updates along with R1."
and
"Remember that MD5 authentication provides authentication and packet
integrity but not confidentiality."
In the first remark, you're talking about duplicate ip addresses - a
definite no-no. Wouldn't that become almost immediately because people
would start calling the help desk complaining about reachability?
Re: your 2nd remark. I thought MD5 is an encryption algorithm and as such
DOES provide confidentiality. What am I missing?
TIA, Tim
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Brian Dennis
Sent: Friday, May 06, 2005 1:22 AM
To: John Matus; Group Study
Subject: RE: Preventing rogue hosts from intercepting rip packets
John,
First off this will not work as outbound ACL's will not affect
traffic sourced by the router (by default). Secondly it makes more
sense to use the passive-interface default command along with a neighbor
statement if you only want to send RIP updates to certain neighbors.
Lastly I'll add that the neighbor statement does not guarantee that only
the intended neighbor will receive the RIP updates. Let me demonstrate
this issue:
We have three routers running RIPv2 in the same VLAN. R4 has a
neighbor command pointing to R1 (155.1.146.1). R2 (the rogue device)
has applied the same IP address as R1 and is receiving the RIP updates
along with R1.
Rack1R4#sho run | be router rip
router rip
version 2
passive-interface default
network 155.1.0.0
neighbor 155.1.146.1
no auto-summary
Rack1R1#sho ip int brie e0/0
Interface IP-Address OK? Method Status
Protocol
Ethernet0/0 155.1.146.1 YES manual up up
Rack1R1#
Rack1R1#sho ip rout rip
155.1.0.0/24 is subnetted, 2 subnets
R 155.1.44.0 [120/1] via 155.1.146.4, 00:00:18, Ethernet0/0
Rack1R1#
Rack1R2#sho ip int brie e0/0
Interface IP-Address OK? Method Status
Protocol
Ethernet0/0 155.1.146.1 YES manual up up
Rack1R2#
Rack1R2#sho ip rout rip
155.1.0.0/24 is subnetted, 4 subnets
R 155.1.44.0 [120/1] via 155.1.146.4, 00:00:29, Ethernet0/0
Rack1R2#
So does the neighbor command alone stop a rogue device from
receiving the RIP updates? You could use the neighbor command and a
static ARP entry on R4 (R1's MAC/R1's IP address). This would be a more
secure solution since R2 or any other device would never receive RIP
updates sourced by R4 destined for R1. Taking it one step further you
could add a static MAC address entry on the 3550 for R1 so that another
device never hijacks its MAC address.
Technically authentication by itself does not meet the
requirements since the packets themselves are still sent in the clear.
This means a rogue device could still receive the updates and
technically view the updates. But that device could not authenticate
the updates and could not alter them in order to resent them. Remember
that MD5 authentication provides authentication and packet integrity but
not confidentiality. So in this situation I would add authentication
even though it does not stop a rogue device from receiving the updates.
Of course we may be starting to out thinking the question but I
just wanted to point out that the neighbor command alone doesn't really
meet the requirements. In the real CCIE lab do not out think the
question like this and go with the option you believe the developer of
the lab intended (neighbor statement along with authentication).
Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
bdennis@internetworkexpert.com
Internetwork Expert, Inc.
http://www.InternetworkExpert.com
Toll Free: 877-224-8987
Direct: 775-745-6404 (Outside the US and Canada)
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
John Matus
Sent: Thursday, May 05, 2005 9:40 PM
To: Jim; Sean C; Edwards, Andrew M; Shaikh, Nasir; ccie2be; Group Study
Subject: Re: Preventing rogue hosts from intercepting rip packets
couldn't you do something like the following so that rip packets are
only
sent to inteded recipients?
r1 = 150.1.1.1 r2 = 150.1.2.2
ip access-list extended security
permit udp host 150.1.1.1 host 150.1.2.2 eq rip
deny udp any any eq rip
permit ip any any
int e0/0
ip access-group security out
Regards,
John D. Matus
MCSE, CCNP
Office: 818-782-2061
Cell: 818-430-8372
jmatus@pacbell.net
----- Original Message -----
From: "Jim" <nhatquang@thiennam.org>
To: "Sean C" <Upp_and_Upp@hotmail.com>; "Edwards, Andrew M"
<andrew.m.edwards@boeing.com>; "Shaikh, Nasir"
<Nasir.Shaikh@atosorigin.com>; "ccie2be" <ccie2be@nyc.rr.com>; "Group
Study"
<ccielab@groupstudy.com>
Sent: Thursday, May 05, 2005 6:52 PM
Subject: Re: Preventing rogue hosts from intercepting rip packets
> since hackers can cheat or simulate chap session if they have enough
> access to
> the topology, it is not impossible
> to play something fun with 3 ways authentication sessions. If the task
> requires preventing rogue hosts from intercepting routing packets,
> I might use unicast update instead of multicasting routing packets
over
> shared
> medias such as LAN, FR or ATM. Another useful way to prevent
> intercepting is compression. I see that, sometimes, the task wording
> requires
> compression other than authentication or p2p session.
>
> HTH, Jim.
>
>
> ----- Original Message -----
> From: Sean C
> To: Edwards, Andrew M ; Shaikh, Nasir ; ccie2be ; Group Study
> Sent: Friday, May 06, 2005 5:53 AM
> Subject: Re: Preventing rogue hosts from intercepting rip packets
>
>
> I agree with Andrew on this one. Setting authentication won't stop a
> rogue
> host from intercepting the packets, albeit the packets will be
encrypted,
> but they'll still be intercepted. Sending the packets to a unicast
> address
> instead of a multicast and using passive ints, that will prevent the
> rogue
> host from intercepting the packets.
>
> HTH, Sean
> ----- Original Message -----
> From: "Edwards, Andrew M" <andrew.m.edwards@boeing.com>
> To: "Shaikh, Nasir" <Nasir.Shaikh@atosorigin.com>; "ccie2be"
> <ccie2be@nyc.rr.com>; "Group Study" <ccielab@groupstudy.com>
> Sent: Thursday, May 05, 2005 5:37 PM
> Subject: RE: Preventing rogue hosts from intercepting rip packets
>
>
> > Interesting...
> >
> > My inclination is towards passive default and neighbor commands.
> Either
> > RIP 1 or 2 will cause a switch to forward frames out all ports
(e.g.
> > broadcast and multicast) not received. So, to prevent rogue hosts
from
> > intercepting rip packets in general I would opt to unicast my
updates.
> >
> > I would think authentication would be a secondary concern.
> >
> > But, knowing this lab... Do both!~
> >
> > -----Original Message-----
> > From: Shaikh, Nasir [mailto:Nasir.Shaikh@atosorigin.com]
> > Sent: Thursday, May 05, 2005 11:28 AM
> > To: ccie2be; Group Study
> > Subject: RE: Preventing rogue hosts from intercepting rip packets
> >
> >
> > Tim,
> > I believe the requirement is asking for authentication. So method 1
(I
> > guess you mean passive interface) does not suffice. I would go for
> > method 2
> > and if the requirements of the task allow then combine method 1 and
2
> >
> > greetz
> > Nash
> >
> > -----Original Message-----
> > From: nobody@groupstudy.com [mailto:nobody@groupstudy.com]On Behalf
Of
> > ccie2be
> > Sent: donderdag 5 mei 2005 16:00
> > To: Group Study
> > Subject: Preventing rogue hosts from intercepting rip packets
> >
> >
> > Hi guys,
> >
> > To achieve the above requirement which method do you think is
better?
> > If you think one method is better than another, do you also think
the
> > less preferred method would be considered wrong in the lab?
> >
> > Method 1
> >
> > use default interface and neighbor combo or
> >
> > Method 2
> >
> > use authentication on the links involved or
> >
> > Method 3
> >
> > Use both Method 1 and Method 2
> >
> > TIA, Tim
> >
> >
This archive was generated by hypermail 2.1.4 : Fri Jun 03 2005 - 10:11:56 GMT-3