Security Basics mailing list archives
Re: ARP spoofing attacks
From: Markus Schabel <markus.schabel () tgm ac at>
Date: Thu, 15 Apr 2004 22:47:40 +0200
David Gillett wrote:
The short, sharp, general answer is that you can't. Layer two security measures are going to see a packet(it happens to be an ARP reply) from the miscreant's port, but since its source MAC address is what they expect, they'll let it through. Layer three measures won't see it either, because it's a unicast within the same vlan/subnet and so never needs to hit a layer 3device. About all you can do proactively, if this is a seriousconcern, is add a static ARP table entry to every host so they never need to send out an ARP request for thegateway.
which is definitly no option if you use roaming clients, e.g. in an wireless network, where you have different gateways depending on the location where you are. sure, you can add static entries for _each_ gateway in _each_ host, but if you have "some" networks and "some" hosts, this will soon be unmanagable. we're currently thinking about an solution in wireless networks, since we found out that wireless encryption doesn't save you from being sniffed via ARP spoofing. you surely can watch your networks for some spoofed ARP packets, but if your network is not the smallest one, maybe with a lot of subnets, this is also not an easy solution... best regards -- \\\ ||| /// _\=/_ ( @ @ ) (o o) +--------oOOo-(_)-oOOo--------------------------oOOo-(_)-oOOo------+ | Markus Schabel TGM - Die Schule der Technik www.tgm.ac.at | | IT-Service A-1200 Wien, Wexstrasse 19-23 net.tgm.ac.at | | markus.schabel () tgm ac at Tel.: +43(1)33126/316 | | markus.schabel () members fsf org Fax.: +43(1)33126/154 | | FSF Associate Member #597, Linux User #259595 (counter.li.org) | | oOOo Yet Another Spam Trap: oOOo | | ( ) oOOo yast () tgm ac at ( ) oOOo | +--------\ (----( )--------------------------\ ( -----( )-----+ \_) ) / \_) ) / (_/ (_/ Computers are like airconditioners: They stop working properly if you open windows. ---------------------------------------------------------------------------Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------
Current thread:
- syslog GUI for Linux Omar Khawaja (Apr 08)
- Re: syslog GUI for Linux Daniel Cid (Apr 12)
- ARP spoofing attacks Amit Agrawal (Apr 14)
- Re: ARP spoofing attacks Chris Moody (Apr 15)
- Re: ARP spoofing attacks Matthias Vallentin (Apr 16)
- Re: ARP spoofing attacks Chris Moody (Apr 19)
- Re: ARP spoofing attacks Markus Schabel (Apr 19)
- ARP spoofing attacks Amit Agrawal (Apr 14)
- Re: ARP spoofing attacks die tuere (Apr 15)
- RE: ARP spoofing attacks David Gillett (Apr 15)
- Re: ARP spoofing attacks Markus Schabel (Apr 16)
- RE: ARP spoofing attacks Ranjeet Shetye (Apr 16)
- Re: syslog GUI for Linux Daniel Cid (Apr 12)
- Re: syslog GUI for Linux Daniel Cid (Apr 21)
- Filtering SPAM with Linux ivan.hernandez (Apr 27)
- Re: Filtering SPAM with Linux Rajeev Kumar (Apr 27)
- RE: Filtering SPAM with Linux Sanjay K. Patel (Apr 27)
- Re: Filtering SPAM with Linux Gene Cronk (Apr 27)
- Message not available
- Re: Filtering SPAM with Linux Ivan Hernandez (Apr 28)