MrBrian wrote: » Seems like it's a common thing that if you can get a suspect router/switch into a network, you can compromise the network and at the minimum cause some DOS attacks.. It's acting as if this guy found an unknown vulnerability, by getting a suspect ospf router into a network and sending out false LSA's with higher sequence numbers. Is that really an unknown vulnerability??
Forsaken_GA wrote: » Long story short, this is a non issue unless you're stupid.
Forsaken_GA wrote: » Long story short, this is a non issue unless you're stupid. This is a total media FUD issue.
Bl8ckr0uter wrote: » Wouldn't a decent IDS monitoring the lan take notice that a LSA being sent? And authentication on the routing protocol.... EDIT: 4saken....
shodown wrote: » I work in plenty of networks for SMB where things like authentication and telnet and cisco/cisco passwords are the norm. I could easily see this being a problem there. When I worked large networks we even had to have crypto and OSPF/BGP authenticaiton on everything, but they had the budget and manpower to make it happen.
mattlee09 wrote: » "The only remedies are using another protocol such as RIP or IS-IS or changing OSPF to close the vulnerability," Looks like the Onion has some competition now
Forsaken_GA wrote: This is a total media FUD issue.
Forsaken_GA wrote: » You don't need an actual router. You could do it by crafting the proper packets from an end host using something like scapy.
Bl8ckr0uter wrote: Wouldn't a decent IDS monitoring the lan take notice that a LSA being sent? And authentication on the routing protocol....
Forsaken_GA wrote: » I was wondering when this would pop up here. Long story short, this is a non issue unless you're stupid. If you're using ospf authentication, they have to compromise a router first in order to life the encryption keys to be able to form an adjacency. If you have a compromised router, they pretty much don't need to use this exploit to screw with your routing information anymore. As well, if you're any good at this network game, any end user facing interfaces that are participating in OSPF are going to be passive-interface'd, so you could *give* them the crypto keys and they still wouldn't be able to screw with your routing tabes. This is a total media FUD issue.
chrisone wrote: » 2. Who leaves ports with the VLAN the routing network (control, data, management planes) are on? Hosts ports would never ever have this VLAN, so one would actually have to leave a port or more on the control, data, management planes on a switch, for some douche to plug in a router!
chrisone wrote: » This is why i am like "woah" no way should your routing and the LAN users be in the same vicinity. Well i studied in this manner with the CCDP exam recently and it looks like the CCNP Security is heading in the same direction, especialy when you build the LANs behind an ASA then you push off your routing to core edge routers or you can do the routing with your ASAs if you want, but i prefer routers. There is more than way one way to skin a cat as they say, i am just following what i study from Cisco which i love doing
chrisone wrote: » Just think layer 3 connections from ASA to Edge routers. You can do the same with L3 switches terminating the LANs there but your routers are seperated by a network and your L3 switch communicates with the routers with a routing protocol or static routes. That is basically the easiest way to describe it. It is basically separating your routing by a network in between your local LANs and the edge routers. Lab it up it is quite interesting when i saw it myself when i first started a couple years back with the current company i work for. Like i said the finance industry doesn't play around lol I hope i didnt confuse you, i sometimes dont know how to explain things as well as i think them lol