Security Basics mailing list archives
Re: Re: MAC Spoofing Prevention in Wireless
From: Jamie Ivanov <jamie.ivanov () gmail com>
Date: Thu, 14 Jul 2011 18:55:32 -0500
The DHCP server would be helpful but a static IP would render that form of detection useless (unless there is some form of encrypted dhcp, no idea of that technology exists). Using a combination of time of association and which AP the host is on and whether it is actively associated will be the best I can come up with off the top of my head. Say Client1 associated with WAP1 and is still connected, Client2 spoofed Client1's MAC (even with a static IP) and associated sometime after. What are the odds that in a multi-wap environment that both clients will be on the same WAP? If Client1 is STILL associated on WAP1 and Client2 tries to connect on WAP7, the controller will be like "fuck no, someone with that mac is already auth'd on another WAP". The more waps you have the more true that would become. My only other suggestion is an additional transport protocol that can tag packets in a specific fashion to determine the true/original client vs. a spoofed interface. I doubt client isolation would be beneficial here. But because this is rather hard to do, it would be wise to have additional security measures in place to prevent this scenario from occurring. While I have experience in *some* cisco wireless equipment in standalone, I can imagine that cisco has some specific enhancements that could do something similar without you having to generate a custom solution. I've been up for 3 days with less than 5 hours of sleep, be gentle... On Thu, Jul 14, 2011 at 12:53 PM, David Gillett <gillettdavid () fhda edu> wrote:
And what are they going to tell you? IF you're very lucky, you might see the same MAC address trying to renew more than one IP address -- but that can only happen if one of the clients got its lease from somewhere else. You'll probably just see some address requests from MACs that the server thinks already have valid leases -- and THAT happens all the time, perfectly legitimately. Finding out what MAC addresses are on your network IS straightforward. Detecting that one or more of them are not unique, though, is NOT -- unless you can see that they are on different physical ports, or associating to different APs, or generating both associated and non-associated wireless control traffic. And none of those things is going to be visible to or logged by your DHCP server.... Any obvious/straightforward method of detecting duplicate MAC addresses has to presume some OTHER mechanism for identifying distinct clients. Since in the standard/portable case, distinct MAC addresses ARE the mechanism for making that distinction, a working solution, if one exists, is going to depend on something non-standard or non-portable or with an otherwise strange definition of "straightforward". David Gillett ________________________________ From: Brent Jesmer [mailto:BJesmer () platformsolutions com] Sent: Wednesday, July 13, 2011 14:56 To: David Gillett; security-basics () securityfocus com Subject: RE: Re: MAC Spoofing Prevention in Wireless So checking the dhcp logs or dhcp client tables isn't straight forward? Brent Jesmer Platform Solutions Inc. Sr. Security Consultant Sent via DROID. Please excuse any mis spelling. -----Original message----- From: David Gillett <gillettdavid () fhda edu> To: Brent Jesmer <BJesmer () PlatformSolutions com>, "security-basics () securityfocus com" <security-basics () securityfocus com> Sent: Wed, Jul 13, 2011 21:53:31 GMT+00:00 Subject: RE: Re: MAC Spoofing Prevention in Wireless It's not "straightforward" at all. How do you tell that there are two MACs the same on the network? On a wired network with STP enabled, you know there's *something* strange going on if you see packets with the same source MAC address from more than one wired interface. But that simply doesn't translate to wireless. (HINT: MAC addresses are supposed to be unique on a subnet/segment. If they're not, your network is out of spec and unlikely to work properly; any communications that happen to work are just good luck and may not be reproducible.) David Gillett -----Original Message----- From: bjesmer () platformsolutions com [mailto:bjesmer () platformsolutions com] Sent: Friday, July 08, 2011 12:31 To: security-basics () securityfocus com Subject: Re: Re: MAC Spoofing Prevention in Wireless The concept is fairly straight forward. The AP looks to see if there are 2 MACs of the same on the network and disallows the second one on the network. Not having worked with the Aruba yet, i would try a deauth attack against the mac you are going to spoof and then try to get on. If you can deauth that client and get on before it, you might be able to get in. ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727 d1 ------------------------------------------------------------------------ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
-- Jamie Ivanov / KC9LFD m.608.399.4252 http://www.linkedin.com/in/jamieivanov -- -- -- -- -- -- -- -- -- -- -- -- This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other applicable privileges), or constitute non-public information. Any use of this information by anyone other than the intended recipient is prohibited. If you have received this transmission in error, please immediately reply to the sender and delete this information from your system. Use, dissemination, distribution, or reproduction of this transmission by unintended recipients is not authorized and may be unlawful. ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- MAC Spoofing Prevention in Wireless Enis Sahin (Jul 04)
- Message not available
- Message not available
- Re: MAC Spoofing Prevention in Wireless Enis Sahin (Jul 05)
- Message not available
- Message not available
- <Possible follow-ups>
- Re: Re: MAC Spoofing Prevention in Wireless bjesmer (Jul 08)
- Re: MAC Spoofing Prevention in Wireless Erik (Jul 11)
- Re: MAC Spoofing Prevention in Wireless Jeffrey Walton (Jul 12)
- Re: MAC Spoofing Prevention in Wireless Enis Sahin (Jul 13)
- Re: MAC Spoofing Prevention in Wireless Erik (Jul 11)
- RE: Re: MAC Spoofing Prevention in Wireless David Gillett (Jul 13)
- Re: Re: MAC Spoofing Prevention in Wireless Jamie Ivanov (Jul 15)