A Client Side Defense against Address Resolution Protocol (ARP) Poisoning George Mason University INFS 612, Spring 2013 Group #3 (C. Blair, N. Eisele,

Slides:



Advertisements
Similar presentations
ARP Spoofing.
Advertisements

ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
ARP: Address Resolution Protocol
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
Copyright 2009 Kenneth M. Chipps Ph.D. Host Addressing Last Update
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Subnetting.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Address Resolution Protocol (ARP). Mapping IP Address to Data-Link Address  How does a machine map an IP address to its Data- Link layer (hardware or.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Mapping Internet Addresses to Physical Addresses (ARP)
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Bootstrap and Autoconfiguration Chapter 23. Introduction Each computer attached to a TCP/IP internet needs to know: –its IP address –the address of a.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
Hyung-Min Lee ©Networking Lab., 2001 Chapter 8 ARP and RARP.
Chapter 19 - Binding Protocol Addresses
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
BAI513 - PROTOCOLS ARP BAIST – Network Management.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
1 Kyung Hee University Chapter 8 ARP(Address Resolution Protocol)
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
Mapping IP Addresses to Hardware Addresses Chapter 5.
Ethernet Network Systems Security Mort Anvari. 9/28/20042 Ethernet Most widely used LAN technology Low cost and high flexibility Versions of different.
ADDRESS MAPPING ADDRESS MAPPING The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. We need to be able.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
1/22 ARP Problems and Solutions Yasir Jan Future Internet 15 th May 2008.
1 Address Resolution Protocol (ARP). 2 Overview 3 Need for Address Translation Note: –The Internet is based on IP addresses –Local area networks use.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
An Introduction To ARP Spoofing & Other Attacks
IP: Addressing, ARP, Routing
Intro to Networks (part 1)
Instructor Materials Chapter 5: Ethernet
Address Resolution Protocol (ARP)
Chapter 8 ARP(Address Resolution Protocol)
Objective: ARP.
LAN Vulnerabilities.
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Address Resolution Protocol (ARP)
BOOTP and DHCP Objectives
Troubleshooting IP Communications
Net 323: NETWORK Protocols
Ethernet Network Systems Security
ARP: Address Resolution Protocol
Address Resolution Protocol (ARP)
ARP Spoofing.
Address Resolution Protocol (ARP)
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Ch 17 - Binding Protocol Addresses
Computer Networks ARP and RARP
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

A Client Side Defense against Address Resolution Protocol (ARP) Poisoning George Mason University INFS 612, Spring 2013 Group #3 (C. Blair, N. Eisele, N. Rehman, T. Troy)

Topics Abstract ARP Introduction Problem Related Research Works Pros / Cons of Other Solutions Our Proposed Solution Pseudo-code Pros / Cons of Our Solution Summary Questions?

Abstract ARP Poisoning can cause loss of privacy and security vulnerabilities Many scholarly works were researched, key weakness were highlighted in their research Within our constrained scope, our solution to ARP Poisoning overcomes the weaknesses of previously researched solutions

ARP Introduction ARP is used on local Ethernet networks to map an IP address to a MAC address ARP was first created in the early 80s, intended as an efficient address resolution mechanism (security was not a priority) Each host maintains their own ARP table which stores IP- MAC mapping ARP communicates using Requests and Replies ARP Replies are automatically accepted without authentication ARP Poisoning exploits the processing of ARP Replies

Normal ARP Exchange Host A Host C Host A wishes to communicate with Host B Host B ARP cache is checked ARP request is sent ARP entry is added ARP reply is sent ARP entry is added

ARP Frame Packet 0 bits 32 Hardware TypeProtocol Type Hardware Adr. Len. Protocol Adr. Len. Opcode (1 for Request, 2 for Reply) Src. MAC (bytes 1-4) Src. MAC (bytes 5-6)Src. IP (bytes 1-2) Src. IP (bytes 3-4)Dest. MAC (bytes 1-2) Dest. MAC (bytes 3-6) Dest. IP (bytes 1-4)

ARP Cache Table NeighborLinklayer AddressExpire(O)Expire(I)Netif ff:ff:ff:ff:ff:ff(none) vnic :1c:42:74:3e:4829s vnic ff:ff:ff:ff:ff:ff(none) vnic :59:33:9d:5c:6838s en :90:a9:b4:46:cbexpired10sen :d4:fe:f7:e7:eexpired en e0:ca:94:f4:63:a738s en c:33:a9:63:8d:aaexpired en ff:ff:ff:ff:ff:ff(none) en1 Typical OS X ARP Cache Table

ARP Poisoning Host A Attacker Attacker wishes to intercept traffic to and from host A Classic “Man-in-the-Middle” attack Router Gratuitous ARP to Host A saying “I am the router” Gratuitous ARP to router saying “I am Host A” Outbound traffic passes through attacker Inbound traffic also passes through attacker

Secure Server (Gouda) Add secure server to Ethernet Add Invite-Accept and Request-Reply protocols Protocols use:  Timeouts to counter message loss  Shared secrets to counter message modification  Nonces to counter message replays Cons:  Requires adding an additional secure server and backup server  Requires two additional protocols  Additional communication traffic  Permanent entries are restrictive

Accept: Store IP-MAC-Fingerprint information Reply Accepted with fingerprint hash Reject: Fingerprint already in use Reply Rejected, Host must resend Drop: IP already registered Drop Request, most likely spoof Enhanced ARP with Trusted Authority (Hammouda and Trablesi) Host A Host B Router Registers with Router using unique 10 byte “fingerprint” If accepted, stores IP-MAC-fingerprint information, replies with hash Sends ARP request for Host B with fingerprint fragment Creates ARP Traffic database entry with ARP Request information Verification Request If ok, notifies B, removes A’s request entry, and adds an entry for B’s reply Sends ARP Reply Sends Verification Request, Router removes B’s reply entry and responds Adds Host B’s MAC Address to cache

Our Proposed Solution Assumptions: 1.Unsecured LAN 2.Network must use DHCP 3.DHCP Server resides on Internet Gateway box Constraints: 1.Can not modify Protocol 2.Can not modify any external machine (host or router )

Our Proposed Solution 1.Process begins at startup or user initiation. 2.Listens for a network connection and captures all DHCP traffic from Port If packet is a DHCP Reply, extract the IP and MAC address for own machine and IP address for gateway. 4.Additionally extract gateway MAC address from sender’s frame source hardware address field. 5.Delete own ARP cache. 6.Make static entry in ARP cache with extracted information. 7.Initiate a gratuitous ARP Reply containing own information at set intervals (default = 500 ms). DHCP Message Format

Our Proposed Solution //call init() on host start up or manually. init() { boolean DHCPframeFound=false ; Frame cFrame = new frame(); while(networkInterfaceExists) { while(!DHCPframeFound) { cFrame.cDHCP = UDPpacket_listener(port 68); if (cDHCP.isDHCP_reply) { System.delete_ARPtable(); System.addARP(STATIC, cDHCP.getGtwyIP(),cFrame.getGtwyMAC()); PacketTimer arpM = create_message_repeater(500); arpM.sendGratuitousARP(NetIface.IP, NetIface.MAC); DHCPframeFound=true ; } } } }

Pros & Cons Pros: No additional hardware needed. No administrative costs. Theoretically easy to develop and distribute. Minimal computer resources required. Scalable. Cons: Can only be used in a DHCP network. Requires DHCP server on the same machine as internet gateway. Extra network traffic. Does not secure peer-to-peer communication. Gateway may not allow gratuitous ARP. A race condition could exist if an attacker continuously attempts to poison the internet gateway’s cache with the host’s IP and the attacker’s MAC.

Summary ARP was designed to be efficient. Our solution overcomes the weaknesses of other solutions while preserving the original efficiency.

Questions