North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Secure DHCP?
- From: Aaron Hopkins
- Date: Sat Jul 24 23:53:10 1999
-----BEGIN PGP SIGNED MESSAGE-----
> After having experienced a rather malicious attack on our corporate network by
> someone running a rogue DHCP server, I'm wondering if there's any way to
> prevent this from happening again?
Ask your ethernet switch/bridge or cablemodem vendor for a method of
disabling non-ARP broadcasts from being received by client machines. You
can then trust your switches to direct such requests only to anything you
let receive broadcasts, which should only be trusted servers.
Cisco's IRB bridging has "subscriber-policy" which roughly approximates this
that I use for our DSL customers. I believe their higher-end switches can
take layer-2 access-lists, which could be made to work similarly.
Any protocol that relies on trusting the first server to reply to a
broadcast is similiarly vulnerable. I'm not sure theres a way to secure the
protocol itself if the client has zero knowledge of the network its on when
it starts up, which is the point of DHCP.
Note that disabling broadcasts may adversely affect some already-broken
protocols, such as WINS or SMB. This might only prevent shares off of
"client" machines from showing up in others' Network Neighborhood, but I
can't say that I've tested it.
Chief Technical Officer, Cyberverse Inc.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----