RE: Cisco uplinkfast Dummy frame (Mac address spoofing)

From: Matthew George <mgeorge_at_geores.net>
Date: Wed, 20 Oct 2010 22:10:49 -0400

Correct me if Im wrong but this inspects l3 to l2 bindings. ARP is different
from BPDU's. I don't think this would prevent rouge bpdu's

 

I did manage to test it using a basic BPDU frame and it does work to some
degree. The MAC addresses are instantly updated in all CAM tables on the l2
domain. Communications to the real destination instantly drop and all
communications are forwarded to the new switch. The port spamming the BPDU's
becomes the new destination. It causes a MACFLAP_NOTIF however I'm not for
sure if particular BPDU values would prevent such notifications and the
switch would view the BPDU's as a legitimate uplinkfast dummy frame.

 

This method would only work if you had a l2 core obviously but none the less
it is a proof of concept.

 

-Matt George

 

From: garry baker [mailto:baker.garry_at_gmail.com]
Sent: Wednesday, October 20, 2010 10:01 PM
To: Matthew George
Cc: groupstudy
Subject: Re: Cisco uplinkfast Dummy frame (Mac address spoofing)

 

would this defeat the kind of attack you are talking about?

Dynamic ARP inspection is a security feature that validates ARP packets in a
network. It intercepts, logs, and discards ARP packets with invalid
IP-to-MAC address bindings. This capability protects the network from
certain man-in-the-middle attacks.

http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/1
2.2_55_se/configuration/guide/swdynarp.html

--
Garry L. Baker
"There is no 'patch' for stupidity." - www.sqlsecurity.com
On Wed, Oct 20, 2010 at 6:41 PM, Matthew George <mgeorge_at_geores.net> wrote:
I bought up this topic in #Cisco on Freenode and no one has ever heard of
this being done nor can i find any documentation whatsoever regarding the
uplinkfast dummy frame.
So I was reviewing some bridging and switching topics and noticed an
interesting abnormality in the uplinkfast dummy frame. This frame is sent
out the new root port of a switch during an uplinkfast reconvergence with
the destination mac 0100.0ccd.cdcd and sourced from each dynamic mac address
in cam table entry of the originating switch. This is used to ensure
reconvergence time of the cam table on the upstream switches during the
event of a uplinkfast failover. Otherwise uplinkfast is useless right? Why
transition to the next available root port immediately if upstream cam
tables are not going to be updated immediately to reflect the l2 topology
change(s)?
None the less. After reading about this frame, Cisco documents it as a frame
that is forwarded throughout the entire l2 domain, in which case this frame
is processed by the SP then forwarded out all forwarding ports. (I'm
assuming)
The dilemma i run into is; can this frame be crafted in a way to cause a L2
denial of service attack or even the ability to sniff traffic destined to a
server on a network by poisoning the CAM table on all switches on the
network simultaneously.
If indeed the frame is spammed across the entire l2 domain and forces Cisco
switches (only cisco) to update their cam tables to the new spammed MAC
address then this would cause l2 traffic to traverse the network in a
different path.
I've attempted to craft the packet but I've been successful as I'm not for
sure what all fields are required/associated with the uplinkfast dummy frame
as I've not had the ability to capture a uplinkfast dummy frame in the act.
(I'll have to put wireshark to work)
Ultimately the question is; Is there a security mechanism in place on the
Cisco SP to prevent such attacks using spoofed uplinkfast frames?
If no security exist to prevent such spoofing someone would easily be able
to craft frames spammed to a switch with lets say the source mac address of
the DNS servers on a network and the destination mac address of the packet
as the uplinkfast multi-cast destination (0100.0ccd.cdcd) in which case it
would be spammed throughout the l2 domain forcing updates of the cam tables
on every cisco switch thus changing the l2 transit path for traffic destined
to that MAC. After all, in modern networks DNS is practically a critical
role. A Network without DNS could a nasty outage as many app's and services
such as email rely on DNS.
-Matthew George
Blogs and organic groups at http://www.ccie.net
Received on Wed Oct 20 2010 - 22:10:49 ART

This archive was generated by hypermail 2.2.0 : Mon Nov 01 2010 - 06:42:06 ART