open shortest path first
play

OPEN SHORTEST PATH FIRST How to take advantage of routing protocols - PowerPoint PPT Presentation

PWN OPEN SHORTEST PATH FIRST How to take advantage of routing protocols 1 ABOUT ME Studied network and security at the Technical University of Troyes (France) Working at WienCERT (Stadt-Wien) 2 AGENDA What is a routing protocol? How to


  1. PWN OPEN SHORTEST PATH FIRST How to take advantage of routing protocols 1

  2. ABOUT ME Studied network and security at the Technical University of Troyes (France) Working at WienCERT (Stadt-Wien) 2

  3. AGENDA What is a routing protocol? How to use a vulnerable configuration? Consequences and how to avoid it. 3

  4. WHAT IS A ROUTING PROTOCOL 4 Photo courtesy of Dawson Construction Co. BP Refinery project

  5. ROUTING IN IP NETWORKS IP Networks & Masks IP Network Mask 10.0.0.9/29 10.0.0.8 255.255.255.248 5

  6. ROUTING IN IP NETWORKS IP: 192.168.42.1/24 Network Gateway 10.0.0.0/8 R1 10.0.0.0/24 R2 0.0.0.0 R3 To reach 10.0. 0.1 ⇒ GW R2 To reach 10.0. 1.1 ⇒ GW R1 To reach 192.168.1.1 ⇒ GW R3 6

  7. HISTORICAL ROUTING All routers controlled by the same administrative authority Security wasn’t really a preoccupation Internet grew to fast to implement security changes 7

  8. WHAT IS A ROUTING PROTOCOL? Share routes through the network in an automated way IGP vs. EGP link-state vs. distance-vector 8

  9. OSPF: A ROUTING PROTOCOL Interior Gateway Protocol Multicast (224.0.0.5 or FF02::5) Link-State Protocol ⇒ Keep state with UPDATE packets Encapsulated directly in IP (protocol 89) 9

  10. Network Bravo Network A R1 Network C R3 Network B R2 Network C R3 OSPF Network Charlie Network Alpha DYNAMIC ROUTING 10

  11. HOW TO EXPLOIT A VULNERABLE CONFIGURATION 11 bit.ly/1vkWpOP

  12. MULTIPLE VULNERABILITIES Old protocol (last RFC in 1998) Information sent in clear text … 12

  13. OSPF HEADER 13

  14. MULTIPLE VULNERABILITIES II Standard configuration of routers ⇒ Clear text auth ⇒ add router to the network ⇒ and then add new routes to the protocol 14

  15. DYNAMIC ROUTING Network Bravo Network Charlie Network Alpha 15

  16. DYNAMIC ROUTING Network Bravo Network Charlie Network Alpha NewR Illegal Network 16

  17. DYNAMIC ROUTING Network Bravo Network A R1 Network C R3 Illegal Net. R3 Network Charlie Network Alpha NewR Network A R1 Network B R2 Illegal Network Network B R2 Network C R3 Illegal Net NewR Illegal Net. R3 17 17

  18. CONSEQUENCES Re-route internal IP-traffic Manipulate connections (DNS, DHCP , …) Reroute external IPs to internal servers 18

  19. WHAT ABOUT OTHER PROTOCOLS? 19

  20. EIGRP Distance-Vector Cisco Routing Protocol 20

  21. RIPv2 Distance-Vector Routing Protocol 21

  22. BGP Exterior Gateway Protocol This vulnerability is not applicable Neighboring required to route 22

  23. TOOLS Wireshark Nemesis Loki IP Sorcery Cain&Abel Quagga Net Dude Scapy (contrib module; no md5) Collasoft NRL Core IRPAS 23

  24. HOW TO AVOID MIS-CONFIGURATION 24 http://bit.ly/1uG7Oak

  25. CONFIGURATION Know your routers! Review your configuration periodically Limit the scope of your routing protocol Test your configuration 25

  26. JUNOS EXAMPLE # show protocols ospf area 0.0.0.0 interface vlan.1 { retransmit-interval 5; hello-interval 2; dead-interval 10; authentication { md5 1 key "mypassword"; } } interface ge-0/0/1.0 { passive ; } 26

  27. QUAGGA EXAMPLE router ospf ospf router-id 10.0.0.1 # network 10.1.2.0/24 area 0 network 10.2.4.0/24 area 0 passive-interface eth0:1 # redistribute kernel redistribute connected redistribute static default-information originate # 27

  28. CISCO EXAMPLE router ospf 1 router-id 10.0.0.1 log-adjacency-changes area 10.0.0.20 authentication redistribute connected metric 50 subnets redistribute static subnets passive-interface default no passive-interface FastEthernet0 network 10.11.12.0 0.0.0.255 area 20 network 192.168.42.0 0.0.0.255 area 20 28

  29. CISCO EXAMPLE interface FastEthernet0 ip address 10.0.0.1 255.255.255.0 ip ospf authentication message-digest ip ospf authentication-key P4ssW0rd ip ospf 1 area 10.0.0.20 duplex auto speed auto 29

  30. CISCO EXAMPLE 30

  31. PATCH MANAGEMENT Patch your network devices Learn about new protocol (OSPFv3 w/ AH&ESP) Use the new protocols 31

  32. OTHER VULNERABILITIES? Spoofed LSA (CVE-2013-0149) 32

  33. CONCLUSION Consider Routing as a critical asset Monitor your network Audit your network periodically 33

  34. SPECIAL THANKS WienCERT PGP-Key: 9B2C C43A 0B5A 6269 A438 A1FC 07FA F5B9 948A D027 34

  35. CONTACT louis@durufle.eu @louisdurufle 35

  36. REFERENCES IP RFC https://tools.ietf.org/html/rfc791 OSPF v2 RFC http://tools.ietf.org/html/rfc2328 OSPF for IPv6 RFC http://tools.ietf.org/html/rfc5340 “An Experimental Study of Insider Attacks for the OSPF Routing Protocol” Brian Vetter, Feiyi Wang, S. Felix Wu (1997) “Persistent OSPF Attacks” Gabi Nakibly and al. http://crypto.stanford.edu/~dabo/pubs/papers/ ospf.pdf “OSPF Security Project” Michael Sudkovitch and David I. Roitman, http:// webcourse.cs.technion.ac.il/236349/Spring2013/ho/WCFiles/2009-2-ospf-report.pdf Scapy OSPF Module https://raw.githubusercontent.com/d1b/scapy/master/scapy/contrib/ospf.py 36

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend