LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-18-2004, 02:30 PM   #1
SocialEngineer
Member
 
Registered: May 2003
Distribution: Slackware
Posts: 236

Rep: Reputation: 31
detecting/preventing arp cache poisoning?


Ok, I return to college here in a week and a half. We have ethernet based broadband access on a switched network - what I'm wondering is, is there any way to detect when someone is attempting to sniff my traffic?

The main reason I'm so worried about it is I check my own pop3 mail and log into my web server regularly, and I don't want my password or traffic caught.

It's a private baptist college, and I'm really the only person who has a serious security focus, but I just like to ensure nothing happens (we got a script kiddie last year who annoyed the crap out of me - he transfered though, thank goodness).

I'm running Slack 10 with 2.6.7, along with a modification to the kernel and a script that prevents port scanning (disabling sending of rst packets and a nemesis script that sends a fake packet response for other scans).
 
Old 08-18-2004, 02:35 PM   #2
iceman47
Senior Member
 
Registered: Oct 2002
Location: Belgium
Distribution: Debian, Free/OpenBSD
Posts: 1,123

Rep: Reputation: 47
Sniffing on a switched network, while you're the only guy there with a "security focus"? Not a chance.
I suggest you check how a switch works and if you're still insecure about your data, use SSL like everybody else.
 
Old 08-18-2004, 02:46 PM   #3
SocialEngineer
Member
 
Registered: May 2003
Distribution: Slackware
Posts: 236

Original Poster
Rep: Reputation: 31
I have a pretty good idea of how a switch works - and I know how to sniff on a switched network through arp cache poisoning. It's stupid easy, and I see no reason to think that an incoming freshman who is itching to make a mark couldn't do it.

What I don't know much about is SSL.. Will it work for my needs? Here is my situation: I log into cPanel for checking stats, and I also need to be able to log into my PHP/MySQL news system. I can SSH into my server and do this through Lynx on the server, but using Lynx is a bit of a hassle for doing site updates and checking stats.
 
Old 08-18-2004, 07:53 PM   #4
wrongman
Member
 
Registered: May 2004
Location: Italy
Distribution: Debian Unstable 64bit
Posts: 99

Rep: Reputation: 15
you can:
discover the mac address of the server you need to talk with (gateway to internet or wathever) using "arping 123.123.123.123"
then lock it using "arp -s 123.123.123.123 MAC_ADDRESS"
in this way an arp poisoning attack can't do anything against you
hope this help
 
Old 08-18-2004, 08:12 PM   #5
SocialEngineer
Member
 
Registered: May 2003
Distribution: Slackware
Posts: 236

Original Poster
Rep: Reputation: 31
Great, thanks. Exactly what I was looking for.
 
Old 08-18-2004, 11:09 PM   #6
iceman47
Senior Member
 
Registered: Oct 2002
Location: Belgium
Distribution: Debian, Free/OpenBSD
Posts: 1,123

Rep: Reputation: 47
Quote:
Originally posted by wrongman
you can:
discover the mac address of the server you need to talk with (gateway to internet or wathever) using "arping 123.123.123.123"
then lock it using "arp -s 123.123.123.123 MAC_ADDRESS"
in this way an arp poisoning attack can't do anything against you
hope this help
MAC adresses can be spoofed as easily as IP adresses, so that advice isn't much worth IMO.
 
Old 08-20-2004, 11:52 AM   #7
wrongman
Member
 
Registered: May 2004
Location: Italy
Distribution: Debian Unstable 64bit
Posts: 99

Rep: Reputation: 15
the topic ask how to prevent "arp cache poisoning attack", in this way you can't do such an attack, spoofing the mac is another thing but anyway you'll have a network with two identical mac addresses, with arp poisoning you say to the machines "that ip is of this MAC", so victim will send you the packets... with spoofed mac you'd also do a DoS to the real MAC machine

Last edited by wrongman; 08-20-2004 at 11:54 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Strange ARP behavior : A linux server responds to all ARP requests Hdvd21 Linux - Networking 4 10-24-2013 05:02 AM
arp poisoning Cisco counter measure? GUIPenguin General 1 10-14-2005 04:42 PM
ARP cache refreshing time ivanatora Linux - Networking 0 04-27-2005 06:00 AM
ArpStar 0.5.0 Defeats ARP poisoning bassdemon Linux - Security 14 02-21-2005 01:32 PM
How to create an proxyarp entry in arp table by using arp command? himalayas Linux - Networking 0 06-04-2003 04:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:07 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration