Hi Jesse,

please take my excuses, as I was far too impatient yesterday.
I have retried the following this morning, and it lasts a couple of seconds, until - I think - the former injection of wrong MAC-addresses gets a timeout.

Now the following seems to work:

ovs-ofctl add-flow br0 "in_port="${PORT}" ip idle_timeout=0 nw_dst=224.0.0.0/24 priority=40000 action=drop" ovs-ofctl add-flow br0 "in_port="${PORT}" arp idle_timeout=0 priority=39500 action=resubmit("${PORT}",2)" ovs-ofctl add-flow br0 "in_port="${PORT}" ip idle_timeout=0 dl_src=00:f1:70:00:38:90 nw_src=192.168.1.30 priority=39000 action=resubmit("${PORT}",1)" ovs-ofctl add-flow br0 "in_port="${PORT}" ip idle_timeout=0 priority=100 action=drop"
        # Apply default normal:
ovs-ofctl add-flow br0 "in_port="${PORT}" table=1 priority=100 action=normal"
        # arp-special:
ovs-ofctl add-flow br0 "in_port="${PORT}" table=2 priority=200 arp idle_timeout=0 arp_sha=00:f1:70:00:38:90 nw_src=192.168.1.30 action=normal" ovs-ofctl add-flow br0 "in_port="${PORT}" table=2 priority=100 idle_timeout=0 action=drop"

while ettercap is running I see some "last packets", after that all is quiet, attacking is suppressed. Fine. Works. Great.

Sorry for being impatient, angry about myself to have done it right from the beginning :-\

Kind regards,

Oliver.


On 07/26/2012 10:28 PM, Jesse Gross wrote:
On Thu, Jul 26, 2012 at 1:09 PM, Oliver Francke <[email protected]> wrote:
Well,

Am 26.07.2012 um 21:01 schrieb Jesse Gross <[email protected]>:

On Thu, Jul 26, 2012 at 11:38 AM, Oliver Francke
<[email protected]> wrote:
I think this explains it:

http://www.thegeekstuff.com/2012/01/arp-cache-poisoning/

the packet I'm talking about is the faked arp-reply. Coming from the attacking 
VM, telling:
My MAC is <correct>, the IP ( faked) is my IP. Please hand over the packets to 
me, it's OK.
Yes, the flow that I gave you will prevent this.  I guarantee that OVS
can do it because many other people have done it the way that I
suggested.

I think you believe that there are two IP source fields in an ARP
packet the way that there are two Ethernet source addresses.  There
are not as an ARP packet is an Ethernet packet but not an IP packet.

I have no wireshark right now on my computer to better visualize, but here is 
the tcpdump -vv -r from a captured session:

17:03:10.406001 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.30 is-at 
00:f1:70:00:38:b0 (oui Unknown), length 28
17:03:10.406078 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.1 is-at 
00:f1:70:00:38:b0 (oui Unknown), length 28
17:03:11.416744 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.30 is-at 
00:f1:70:00:38:b0 (oui Unknown), length 28
17:03:11.416847 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.1 is-at 
00:f1:70:00:38:b0 (oui Unknown), length 28

there are no two IP source fields of course, but I'm talking about faking the 
payload. The evil VM is telling everybody, that - having the IP 192.168.1.32 - 
even the other IP .30 and the gateway .1 is on it's MAC.
In the _header_ if have correct source-MAC and correct source-IP.
As your own packet capture shows, there is no additional header in an
ARP packet to contain a "correct" source IP.  None of these packets
contain the address 192.168.1.32 in any location.

I'm going to stop responding to this thread because I don't know how
to explain it any more clearly.
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss


--

Oliver Francke

filoo GmbH
Moltkestraße 25a
33330 Gütersloh
HRB4355 AG Gütersloh

Geschäftsführer: S.Grewing | J.Rehpöhler | C.Kunz

Folgen Sie uns auf Twitter: http://twitter.com/filoogmbh

_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to