Title: Project in Computer Security OSPF Attacks Project Summary
1Project in Computer SecurityOSPF
AttacksProject Summary
- By Alex Kirshon and Dima Gonikman
- Under the Guidance of Gabi Nakibly
2Outline
- Project Objectives
- OSPF Routing Protocol
- Protocol Overview
- Known Attacks Description
- Project Accomplishments
- Fake Adjacency Attack
- Adjacency Corruption Attack
- Project Summary
3OSPF AttacksProject Objectives
- Study of vulnerabilities of OSPF from the
protocol perspective - Exploitation of vulnerabilities to attack an OSPF
network in new and improved ways - Prove effectiveness of attacks by collecting
network statistics in simulated environment
4OSPF Routing Protocol Open Shortest Path First
- A Second Generation Internal Routing Protocol
- Main Purpose Internal Gateway Protocol
establishment an maintenance of routes within an
Autonomous System - Dijkstra Algorithm based routing topology
5OSPF Routing Protocol Open Shortest Path First
- Link State Advertisement Protocol
- Hello Protocol - discovery of neighbors and
forming adjacencies (Every 10 seconds) - Most protocol data is exchanged exclusively over
adjacencies - Areas an administrative abstraction
6OSPF Routing ProtocolSecurity Features
- Simple Encryption
- MD5 based Message Authentication Code
- Natural Fightback mechanism
- False LSAs are updated or flushed by legitimate
router - Areas as a Security Measure
- Flooding of false information is limited to area
of origin
7OSPF Routing ProtocolThe Link State Database
8OSPF Routing ProtocolSome Known Attacks
- Max Sequence Number Attack
- Prevents Fightback
- False Forwarding Address Attack
- Creates data loops
- False Designated Router Attack
- Impacts AS connectivity
9Project AccomplishmentsNew Attacks
- Fake Adjacency Attack
- Adjacency Corruption Attack
10Fake Adjacency Attack
- Attack Goal Establishing an adjacency with a
phantom router - Motivation Being Adjacent is a powerful
position - Link State Databases are synchronized over
adjacencies, being adjacent means being able to
change other LSDBs at will
11Hello Protocol And Adjacency Bring-Up
12Fake Adjacency AttackDescription
- Send Spoofed Hello Packet to Victim Network
Designated Router - Perform the Adjacency Bring-Up Procedure Without
Hearing Victim Response (Send next packet every
RTT) - Inject False Routing Information Via Spoofed LSU
Packets ( Every 30 minutes) - Maintain Attack By Periodically Sending Spoofed
Hello Packets (Every 10 seconds) -
13Fake Adjacency Attack
14Fake Adjacency Attack
15Fake Adjacency Attack
16Fake Adjacency Attack
17Fake Adjacency Attack
- Advantages
- Not Dependent On Network Topology
- Easy Maintenance generating messages for
maintenance is easy, and not frequent - Powerful can cause information loss, not
bothered by limitations caused by areas - Disadvantages
- Exposed and requires High Maintenance The
attacker sends a false message every 10 seconds,
this is traceable
18Adjacency Corruption Attack
- Attack Goal Controlling The Fightback Mechanism
- Motivation Knowing When Fightback Occurs Helps
to Overcome It - Lack of Fightback Means False Information Stays
in the System Longer
19Adjacency Corruption AttackDescription
- Send Spoofed LSU to Victim Router
- Immediately Send Same Spoofed LSU to Network
Designated Router (After RTT) - The DR will fight the injected information but it
will be rejected by the victim - Send Spoofed LSA Ack to Network DR (After RTT)
- Maintain Attack By Periodically Repeating it
(Every 30 minutes) -
20Adjacency Corruption Attack
21Adjacency Corruption Attack
22Adjacency Corruption Attack
23Adjacency Corruption Attack
24Adjacency Corruption Attack
25Adjacency Corruption Attack
26Adjacency Corruption Attack
- Advantages
- Powerful can cause information loss or routing
loops, not bothered by limitations caused by
areas - Low Maintenance Attacker sends 3 protocol
messages every 30 minutes - Disadvantages
- Dependent On Network Topology
27OSPF AttacksProject Summary
- What We Accomplished
- Found 2 New Major Security Weaknesses in OSPFv2
RFC - Exploited Said Weaknesses to Gain Positions of
Power - Proved Applicability of Exploits Using OMNET
28Thanks for Listening