Top Banner
By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly
28

By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Dec 17, 2015

Download

Documents

Ross Turner
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

By Alex Kirshon and Dima Gonikman

Under the Guidance of Gabi Nakibly

Page 2: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Project Objectives OSPF Routing Protocol

Protocol OverviewKnown Attacks Description

Project AccomplishmentsFake Adjacency AttackAdjacency Corruption Attack

Project Summary

Outline

Page 3: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Study of vulnerabilities of OSPF from the protocol perspective

Exploitation of vulnerabilities to attack an OSPF network in new and improved ways

Prove effectiveness of attacks by collecting network statistics in simulated environment

OSPF AttacksProject Objectives

Page 4: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF Routing Protocol Open Shortest Path First

A Second Generation Internal Routing Protocol

Main Purpose – Internal Gateway Protocol – establishment an maintenance of routes within an Autonomous System

Dijkstra Algorithm based routing topology

Page 5: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF Routing Protocol Open Shortest Path First

Link State Advertisement Protocol Hello Protocol - discovery of neighbors and

forming adjacencies (~Every 10 seconds) Most protocol data is exchanged exclusively

over adjacencies Areas – an administrative abstraction

Page 6: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF Routing ProtocolSecurity Features

Simple EncryptionMD5 based Message Authentication Code

‘Natural Fightback’ mechanismFalse LSAs are updated or flushed by legitimate

router

Areas as a Security Measure Flooding of false information is limited to area

of origin

Page 7: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF Routing ProtocolThe Link State Database

Page 8: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF Routing ProtocolSome Known Attacks

Max Sequence Number AttackPrevents Fightback

False Forwarding Address AttackCreates data loops

False Designated Router AttackImpacts AS connectivity

Page 9: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Project AccomplishmentsNew Attacks

Fake Adjacency Attack

Adjacency Corruption Attack

Page 10: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

Attack Goal – Establishing an adjacency with a phantom router

Motivation – Being Adjacent is a powerful position

Link State Databases are synchronized over adjacencies, being adjacent means being able to change other LSDBs at will

Page 11: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Hello Protocol And Adjacency Bring-Up

Page 12: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency AttackDescription

Send Spoofed Hello Packet to Victim Network Designated Router

Perform the Adjacency Bring-Up Procedure Without Hearing Victim Response (Send “next packet” every RTT)

Inject False Routing Information Via Spoofed LSU Packets (~ Every 30 minutes)

Maintain Attack By Periodically Sending Spoofed Hello Packets (~Every 10 seconds)

Page 13: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

Page 14: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

Page 15: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

Page 16: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

Page 17: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Fake Adjacency Attack

AdvantagesNot Dependent On Network TopologyEasy Maintenance – generating messages for

maintenance is easy, and not frequentPowerful – can cause information loss, not

bothered by limitations caused by areas

DisadvantagesExposed and requires High Maintenance – The

attacker sends a false message every 10 seconds, this is traceable

Page 18: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Attack Goal – Controlling The Fightback Mechanism

Motivation – Knowing When Fightback Occurs Helps to Overcome It

Lack of Fightback Means False Information Stays in the System Longer

Page 19: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption AttackDescription

Send Spoofed LSU to Victim Router Immediately Send Same Spoofed LSU to

Network Designated Router (After RTT)The DR will fight the injected information but it will

be rejected by the victim

Send Spoofed LSA Ack to Network DR (After RTT)

Maintain Attack By Periodically Repeating it (~Every 30 minutes)

Page 20: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 21: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 22: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 23: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 24: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 25: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

Page 26: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Adjacency Corruption Attack

AdvantagesPowerful – can cause information loss or routing

loops, not bothered by limitations caused by areas

Low Maintenance – Attacker sends 3 protocol messages every 30 minutes

DisadvantagesDependent On Network Topology

Page 27: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

OSPF AttacksProject Summary

What We Accomplished:Found 2 New Major Security Weaknesses in

OSPFv2 RFC Exploited Said Weaknesses to Gain Positions of

PowerProved Applicability of Exploits Using

OMNET++

Page 28: By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.

Thanks for Listening

Any Questions?