140 likes | 292 Views
DHCP Security Analysis. Dallas Holmes / Matt MacClary ECE 478 Project Spring 2003. What is DHCP?. Dynamic Host Configuration Protocol UDP protocol for IP Discovery Based Ratified by the IETF in 1997 Used on most networks OSU utilizes DHCP heavily. Why use DHCP?.
E N D
DHCP Security Analysis Dallas Holmes / Matt MacClary ECE 478 Project Spring 2003
What is DHCP? • Dynamic Host Configuration Protocol • UDP protocol for IP • Discovery Based • Ratified by the IETF in 1997 • Used on most networks • OSU utilizes DHCP heavily
Why use DHCP? • Simple host configuration • “Plug and Surf” • Centralized address accounting • Distribution of vital host information • Hostname, DNS, WINS, Gateway, etc.
3 Significant Problems • Discovery based • Any host can respond to query • No server authentication • client trusts any server that responds 3. No client authentication • server may assign an address to any client
Problem 1: Anybody can answer • Anybody? • An attacker could place a “rouge” server • Authoritative (legitimate) server. • Who will the client listen to? • Logically “closest” server • fastest CPU, fastest network, lowest load • Server with free leases
Changing “logically closest” • Load the authoritative DHCP server • Take all the leases away • Load the network segment
Problem 2: Server Authentication • Client must trust what the server sends • Server can send fake DNS servers • client may be shown a misleading resource • client may be denied access to a resource • Server can send invalid gateway address • Attacker could redirect switched traffic • Loss of privacy
Which is Real? Real Login Screen Fake Login Screen
Problem 3: Host Authentication • Any client may join network • Simply plug in and server assigns address • Some networks configure network trust (MAC) • Client may gain access to network shares • Client may abuse network • Start a rouge DHCP server • Generate heavy traffic or attack other networks
Solution • SSL Style Public 3rd Party Certificate Authority • Two-way authentication • Server Certificate • Client Certificate • Requires changes to DHCP server and client • Slow to implement and gain acceptance • Expensive • Certificates cost money • Changing server configurations costs money