Link layer security

From HandWiki
Short description: Security vulnerabilities of the network interface layer

The link layer is the lowest layer in the TCP/IP model. It is also referred to as the network interface layer and mostly equivalent to the data link layer plus physical layer in OSI. This particular layer has several unique security vulnerabilities that can be exploited by a determined adversary.

Network interface layer

The link layer is the interface between the host system and the network hardware. It defines how data packets are to be formatted for transmission and routings. Some common link-layer protocols include IEEE 802.2 and X.25.[1] The data link layer and its associated protocols govern the physical interface between the host computer and the network hardware. The goal of this layer is to provide reliable communications between hosts connected on a network. Services provided by this layer of the network stack include:[2]

  • Data Framing – Breaking up the data stream into individual frames or packets.
  • Checksums – Sending checksum data for each frame to enable the receiving node to determine whether or not the frame was received error-free.
  • Acknowledgment – Sending either a positive (data was received) or negative (data was not received but expected) acknowledgement from receiver to sender to ensure reliable data transmission.
  • Flow Control – Buffering data transmissions to ensure that a fast sender does not overwhelm a slower receiver.

Vulnerabilities and mitigation strategies

Wired networks

Content Address Memory (CAM) table exhaustion attack

The data link layer addresses data packets based on the destination hardware's physical Media Access Control (MAC) address. Switches within the network maintain Content Address Tables (CAMs) that maps the switch's ports to specific MAC addresses. These tables allow the switch to securely deliver the packet to its intended physical address only. Using the switch to connect only the systems that are communicating provides much greater security than a network hub, which broadcasts all traffic over all ports,[3] allowing an eavesdropper to intercept and monitor all network traffic. A CAM Table Exhaustion Attack basically turns a switch into a hub.[4] The attacker floods the CAM table with new MAC-to-port mappings until the table's fixed memory allotment is full. At this point the switch no longer knows how to deliver traffic based on a MAC-to-port mapping, and defaults to broadcasting traffic over all ports. An adversary is then able to intercept and monitor all network traffic traversing the switch to include passwords, emails, instant messages, etc.[5]

The CAM table-overflow attack can be mitigated by configuring port security on the switch. This option provides for either the specification of the MAC addresses on a particular switch port or the specification of the number of MAC addresses that can be learned by a switch port. When an invalid MAC address is detected on the port, the switch can either block the offending MAC address or shut down the port.[6]

Address Routing Protocol (ARP) spoofing

Main page: ARP spoofing

At the data link layer a logical IP address assigned by the network layer is translated into a physical MAC address. In order to ensure reliable data communications all switches in the network must maintain up-to-date tables for mapping logical (IP) to physical (MAC) addresses. If a client or switch is unsure of the IP-to-MAC mapping of a data packet it receives it will send an Address Resolution Protocol (ARP) message to the nearest switch asking for the MAC address associated with the particular IP address. Once this is accomplished the client or switch will update its table to reflect the new mapping. In an ARP spoofing attack the adversary broadcasts the IP address of the machine to be attacked along with its own MAC address. All neighboring switches will then update their mapping tables and begin transmitting data destined to the attacked system's IP address to the attacker's MAC address.[4] Such an attack is commonly referred to as a "man in the middle" attack.

Defenses against ARP spoofing generally rely on some form of certification or cross-checking of ARP responses. Uncertified ARP responses are blocked. These techniques may be integrated with the Dynamic Host Configuration Protocol (DHCP) server so that both dynamic and static IP addresses are certified. This capability may also be implemented in individual hosts or may be integrated into Ethernet switches or other network equipment.[7]

Dynamic Host Configuration Protocol (DHCP) starvation

When a client system without an IP address enters a network it will request an IP address from the resident DHCP server. The DHCP server will reserve an IP address (so anyone else asking for one is not granted this one) and it will send that IP address to the device along with a lease identifying how long the address will be valid. Normally, from this point, the device will respond by confirming the IP address with the DHCP server and the DHCP server finally responds with an acknowledgement.

In a DHCP starvation attack, once the adversary receives the IP address and the lease period from the DHCP server, the adversary does not respond with the confirmation. Instead, the adversary floods the DHCP server with IP address requests until all addresses within the server's address space have been reserved (exhausted). At this point, any hosts wishing to join the network will be denied access, resulting in a denial of service. The adversary can then set up a rogue DHCP server so that clients receive incorrect network settings and as a result transmit data to an attacker's machine.[8]

One method for mitigating this type of attack is to use the IP source guard feature available on many ethernet switches. The IP guard initially blocks all traffic except DHCP packets. When a client receives a valid IP address from the DHCP server the IP address and switch port relationship are bound in an Access Control List (ACL). The ACL then restricts traffic only to those IP addresses configured in the binding.[9]

Wireless networks

Hidden node attack

In a wireless network many hosts or nodes are sharing a common medium. If nodes A and B are both wireless laptop computers communicating in an office environment their physical separation may require that they communicate through a wireless access point. But only one device can transmit at a time in order to avoid packet collisions. Prior to transmitting, Node A sends out a Ready to Send (RTS) signal. If it is not receiving any other traffic the access point will broadcast a Clear to Send (CTS) signal over the network. Node A will then begin transmitting while Node B knows to hold off transmitting its data for the time being. Even though it cannot directly communicate with Node A, i.e. Node A is hidden, it knows to wait based on its communication with the access point. An attacker can exploit this functionality by flooding the network with CTS messages. Then every node assumes there is a hidden node trying to transmit and will hold its own transmissions, resulting in a denial of service.[10]

Preventing hidden node attacks requires a network tool such as NetEqualizer.[10] Such a tool monitors access point traffic and develops a baseline level of traffic. Any spikes in CTS/RTS signals are assumed to be the result of a hidden node attack and are subsequently blocked.

De-auth (de-authentication) attack

Any client entering a wireless network must first authenticate with an access point (AP) and is thereafter associated with that access point. When the client leaves it sends a deauthentication, or deauth, message to disassociate itself with the access point. An attacker can send deauth messages to an access point tied to client IP addresses thereby knocking the users off-line and requiring continued re-authenticate, giving the attacker valuable insight into the reauthentication handshaking that occurs.[11]

To mitigate this attack, the access point can be set up to delay the effects of deauthentication or disassociation requests (e.g., by queuing such requests for 5–10 seconds) thereby giving the access point an opportunity to observe subsequent packets from the client. If a data packet arrives after a deauthentication or disassociation request is queued, that request is discarded since a legitimate client would never generate packets in that order.[12]

References

  1. "The TCP/IP Protocol Framework". http://sourcedaddy.com/windows-xp/the-tcp-ip-protocol-framework.html. Retrieved 8 February 2013. 
  2. "Data Link Layer". http://web.cs.wpi.edu/~cs4514/b98/week3-dll/week3-dll.html. Retrieved 8 February 2013. 
  3. "CAM Table & STP Attacks". Polytechnic Institute of New York University. http://isis.poly.edu/courses/cs996-pent-test-f2004/Lectures/pre1.pdf. Retrieved 8 February 2013. 
  4. 4.0 4.1 O'Connor, Terrence. "Detecting and Responding to Data Link Layer Attacks". SANS Institute. http://www.sans.org/reading_room/whitepapers/detection/detecting-responding-data-link-layer-attacks_33513. Retrieved 8 February 2013. 
  5. Akeung, Darryl. "Switch Security – DHCP Starvation and Flooding CAM Tables (Fail Open) Part 1". Archived from the original on 2 February 2013. https://web.archive.org/web/20130202040743/http://dakeung.com/2011/12/20/switch-security-dhcp-starvation-and-flooding-cam-tables-fail-open-part-1/. Retrieved 8 February 2013. 
  6. "Network Security at the Data Link Layer (Layer 2) of LAN". Javvin Network Management & Security. Archived from the original on 11 April 2013. https://archive.today/20130411061206/http://www.javvin.com/networksecurity/NetworkSecurity.html. Retrieved 14 February 2013. 
  7. Gmoskov. "ARP Spoofing Attack and Defense". http://think-security.com/arp-spoofing-attack-and-defense/. Retrieved 14 February 2013. 
  8. Dmitry, Davletbaev. "Dhcpstarv - DHCP Starvation Utility". SourceForge.net. http://dhcpstarv.sourceforge.net/. Retrieved 14 February 2013. 
  9. "Mitigating Layer 2 Attacks". http://icon.clnchina.com.cn/attachment/0/7/8/8870_Mitigating%20Layer%202%20Attacks.pdf. Retrieved 14 February 2013. [yes|permanent dead link|dead link}}]
  10. 10.0 10.1 "NetEqualizer Lite and Hidden Nodes: A Real Solution to a Virtual Problem". NetEqualizer. http://www.netequalizer.com/Hidden_Node_White_Paper.php. Retrieved 14 February 2013. 
  11. "Deauthentication". Aircrack-ng. http://www.aircrack-ng.org/doku.php?id=deauthentication. Retrieved 14 February 2013. 
  12. Bellado, John. "Deauthentication Attack". Proceedings of the USENIX Security Symposium, Aug 2003. http://sysnet.ucsd.edu/~bellardo/pubs/usenix-sec03-80211dos-html/node11.html. Retrieved 14 February 2013.