80 likes | 87 Views
Understand the vulnerability of ARP protocol, how it works, caching, and potential threats. Learn about current and future solutions to combat ARP cache poisoning in Ethernet networks.
E N D
The Inherent Insecurity of Ethernet An Introduction to ARP Poisoning by Stephen Roux sproux/InsecurityOfEthernet
About ARP • ARP = Address Resolution Protocol • Directs traffic within a subnet • Connects network and data link layers • No built-in security sproux/InsecurityOfEthernet
How ARP Works • Source broadcasts question • Who has IP address 192.168.38.17? • Destination responds • I do, my MAC address is 00-d1-b7-6e-ca-4b • Source adds mapping to its ARP cache C:\>arp -a Interface: 192.168.38.62 --- 0x4 Internet Address Physical Address Type 192.168.38.17 00-d1-b7-6e-ca-4b dynamic sproux/InsecurityOfEthernet
Caching • ARP mappings are kept for 2-20 minutes • Improves performance • No need to waste packets on mappings that don’t change often sproux/InsecurityOfEthernet
Stateless Protocol • ARP does not match requests to replies • Unsolicited replies can be sent • Improves performance • System with newly allocated IP address can announce itself to the subnet • Works well with DHCP • Immediately modifies the ARP cache sproux/InsecurityOfEthernet
Why This Is Bad • An attacker can falsify ARP messages • Poison the cache of a target victim • Redirect traffic • DOS • MITM sproux/InsecurityOfEthernet
Current Solutions • Switch/router settings • Advanced features • Can protect only if correctly configured • Network monitoring • Difficult to tell the difference between legitimate ARP traffic and malicious • Client-based • Static ARP tables • Block inconsistencies sproux/InsecurityOfEthernet
Future Solutions • Design secure ARP • May need to be significantly modified • Add cryptographic authentication • Must not significantly slow down the network • Combine ideas into new standard • One idea: • “An Efficient Solution to the ARP Cache Poisoning Problem” by Vipul Goyal and Rohit Tripathy sproux/InsecurityOfEthernet