Got it

DHCP Snooping III

Latest reply: Jun 26, 2021 19:12:45 477 10 6 0 0

Middleman Attack and IP/MAC Spoofing Attack

The DHCP snooping binding table contains information about the IP address, MAC address, VLAN, interface, and lease. The DHCP snooping binding table consists of static binding entries and dynamic binding entries. Static binding entries are manually configured and contain information about static users. Dynamic binding entries are generated according to the information carried in the DHCP REPLY packets sent from the DHCP server, and contain the information about the IP address, MAC address, VLAN, and access interface. The life cycle of a dynamic binding entry equals the lease of an IP address.

After receiving IP packets, ARP packets, and DHCP packets for extending the IP address lease, the device checks whether the received packets are valid, filters out invalid packets, and collects statistics on them according to information in binding entries. If the number of discarded invalid packets exceeds the set threshold, trap messages are generated and then sent as required to the NMS for informing users.

The following lists two common scenarios of attacks:

  • Middleman attack

    • A middleman sends an ARP packet carrying its own       MAC address and the IP address of the DHCP server to the client. The       client then learns the entry containing the IP address of the DHCP server       and its MAC address, and considers the middleman as the DHCP server. In       this case, all the packets sent from the DHCP client to the server pass       the middleman.

    • A middleman sends an ARP packet carrying its own       MAC address and the IP address of the DHCP client to the server. The       server then learns the ARP entry containing its own MAC address and the       IP address of the DHCP client, and considers the middleman as the DHCP       client. In this case, all the packets sent from the DHCP server to the       client pass the middleman.

Figure 1 Middleman attack 

1

 

  • IP/MAC spoofing attack

The attacker initiates an attack by forging the IP address and MAC address of an authorized user.

Figure 2 IP/MAC spoofing attack

2


The DHCP snooping binding table is a solution to such an attack. The device connected to users listens to received DHCP ACK packets and generates DHCP snooping binding entries for untrusted interfaces. DHCP snooping binding entries define the binding relationship between the MAC address, IP address, VLAN, and interface, and are not deleted until the lease expires. When receiving an ARP, IPv4, or IPv6 packet from an untrusted interface, if no matching binding table is found, the device directly discards the packet.

Figure 3 Discarding invalid packets by using DHCP snooping

3


Good share
View more
  • x
  • convention:

Detailed explanation
View more
  • x
  • convention:

lucian2003
lucian2003 Created Apr 10, 2021 01:12:12 (0) (0)
 
Good post my friend. Thanks for sharing
View more
  • x
  • convention:

lucian2003
lucian2003 Created Apr 10, 2021 01:11:58 (0) (0)
 
Good.
View more
  • x
  • convention:

Kevin_Thomas
Kevin_Thomas Created Apr 10, 2021 09:57:56 (0) (0)
 
hemin88
Moderator Author Created Apr 10, 2021 10:01:35

well detailed ,, keep up
View more
  • x
  • convention:

Good sharing
View more
  • x
  • convention:

andersoncf1
MVE Author Created Jun 26, 2021 19:12:45

Thanks for sharing knowledge.
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.