Chapter17SecurityConguration
DAIConfiguration
DAIOverview
TheattackbasedonARPoftenhappensinnetwork.DHCPSNOOP-
INGmoduleontheswitchimplementsDAI(DynamicARPInspec-
tion)function,butthisfunctionislimited.
CurrentlyDAIfunctiononlychecksbindingtableinDHCPSNOOP-
INGforswitchlearningARPpacket,thatis,onlycanchecklayer
3user .
IfusersoftheswitchareinthesameVLAN,thecommunication
betweenusersrequiresswitchtoforwardnotonlayer3butlayer
2.SwitchneednottolearnARPpacketsoftheseusers.Therefore
thereisn’trelevantsecuritycheck.Itisabigsecuritybug,which
causesman-in-the-middleattack,asshowninFigure39.
FIGURE39MAN-IN-THE-MIDDLEATTACK
A/B/Careinthesamebroadcastdomain,thatis,thesamenet-
worksegment.WhenAandBcommunicateswitheachother ,
ARPpacketissentrst,whichcanbelearnedbyC.IfCactsas
man-in-the-middletodomaliciousscanning,onlysendsfreeARP
toAtoinformthatIPcorrespondingMACaddressofBhasbeen
updatedtothatofC,theowfromAtoBisdirectlyforwarded
toC;BasedonthesameprincipletheowfromBtoAcanbe
forwardedtoC.Afterdoingmaliciousscanningonpacket,Cmod-
iesthedestinationaddressastherealMACaddressofBorA
andreturnthepackettoswitch.TheowbetweenAandBcan
beforwardednormallyandnotbeperceived.SothatCcompletes
man-in-the-middleattack.
Toavoidthisbug,allARPpacketsshouldbechecked.Thosethat
conformtothequalicationareforwaredbysoftware.TheARP
packetsthatfailincheckwillbediscarded.
Basedonthisrequirement,thefollowingmethodsthatprevents
usualARPattackareadded.
1.Asforuntrustedinterface,DAIblocksallARPpacketsandsend
themtoupperlayersoftwareforcheck.
2.ThespeedthatARPpacketsenttoCPUiscongurable.
3.WhenDHCPSNOOPINGisenabled,laye2IP,MACandport
correspondingrelationshiparechecked.Illegaluserwillbe
discarded.
CondentialandProprietaryInformationofZTECORPORATION177