[Olsr-dev] ARP prevention!

Ferry Huberts (spam-protected)
Thu Aug 18 13:17:05 CEST 2011


I think Henning asked the right questions:

- how is the MAC address authenticated?
- what measures are taken to detect MAC spoofing.

these are base questions because a MAC address is trivial to spoof

please explain (at least) these issues so that we do not need to read
all of the arpon docs

I still think this is a layer 1.5 issue and of no concern to olsr

On 08/18/2011 12:59 PM, Andrea Di Pasquale wrote:
> Il giorno 18/ago/2011, alle ore 12:42, Henning Rogge ha scritto:
> 
>> On Thu, 18 Aug 2011 11:50:57 Andrea Di Pasquale wrote:
>>> ArpON does what you're asking with the cooperation of all nodes. :)
>>>
>>> Read please these links:
>>>
>>> http://arpon.sourceforge.net/
>>> http://arpon.sourceforge.net/documentation.html
>>> http://arpon.sourceforge.net/algorithms.html
>> From what I read ARPon does work if the attacker cannot spoof its MAC address 
>> Spoofing the MAC address is trivial in wireless networks.
>>
>>> In ARP, you solve the problem with authenticating each host and ArpON does
>>> it.
>> No, it does not.
>>
>> ARPon verifies that the MAC address of a communication partner belongs to the 
>> verified node, nothing more.
> 
> ArpON is a proactive solution o proactive protocol because it works with cooperative node. 
> You can to see ArpON as an evolution of ARP protocol.
> ArpON doesn't authenticate the host as Cisco DAI to do with DHCP server.
> 
> See here:
> 
> http://arpon.sourceforge.net/img/algo/HARPI.jpg
> 
> These algorithms don't implements an authenticate solution.
> ArpON sets precise policies for ARP. Thus, ARP works in secure mode without cryptography.
> 
>>
>> Imagine the following scenario.
>>
>> We have two verified users Alice (A) and Bob (B), which cannot directly hear 
>> each other in the mesh.
>>
>> The attacker Mallory sets up two nodes, one near Alice (MA) and one near Bob 
>> (MB) which are connected by a hidden channel (a cable for example).
>>
>> Mallory now begins to replay the traffic he hears on each node on the other 
>> side, including MAC addresses.
>>
>> A --- MA --- MB --- B
>>
>> The OLSR instance of Alice will hear OLSR HELLO messages from Bob, which will 
>> form a link between the two.
>>
>> When an unicast packet has to travel from Alice to Bob, Alice sends an ARP 
>> challenge to Bob.
>>
>> MA will hear the ARP request and replay it on MB, where it will be heard by 
>> Bob.
>>
>> Bob will reply with a cryptographically signed ARP response, which will be 
>> transmitted by MB to MA and then to Alice.
>>
>> Alice is now sure that she knows the MAC-Address of Bob (which is true).
>>
>> But she still communicates with Bob through the cable between MA and MB, which 
>> is controlled by Mallory.
> 
> This is a problem of OLSRd, it isn't problem of ARP protocol.
> 
> 
> Andrea


-- 
Ferry Huberts




More information about the Olsr-dev mailing list