(I thought this could be of interest to the firewalls mailing list, 
so I anonymized the person asking the question and cc:ed the list.)

someone wrote (off-list):
> 
> You were talking about it is possible to hijack a session using 
> ICMP redirects, and BGP even if you are not on the same 
> subnet as the target.  
>
> Mikael Olsson posted, at 2000-06-07:
> > Actually, ICMP redirects may help if you're not local to the 
> > endpoint. Blow a couple of redirects against a router between
> > the peers and make it send the traffic to you instead. BGP 
> > injection works too, but that's really overkill :-) :-) 
> > (But yes, ARP spoofing is by far the most common way of session 
> > hijacking)


Well.. I must admit that routing games (except for ARP, that is;
it's just soo much easier to experiment with) isn't one of my 
stronger areas.
I'm leaning quite heavily on friends in-the-know here when making
broad assertions like the ones above :)

First, a sidenote: I wasn't talking about remotely hijacking a 
session between two hosts residing on the same broadcast network. 
My post was more about hijacking traffic passing across the 
Internet. Some of it may still apply, but I really don't want 
to wrack my brains to figure out _how_ just now :)


ICMP Redirects
--------------

  As far as _I_ know, ICMP redirects ought to work if you 
  can fool a router in the communication path, and all routers 
  between said router and a system under your control, to divert 
  traffic to said system. (This "system" could of course be your
  own computer, if you're a stupid hacker. A smart hacker would
  use someone else's :))

  Getting the traffic to the original target after you're 
  done with it (if this is indeed what you want to do) is a 
  different matter entirely. You would need another path to forward 
  the packets on that doesn't go through the router that you've 
  subverted (lest you just get the packets back to you again; wash, 
  rinse and repeat). 

  This path could, of course, be any kind of tunnel to a point 
  that is "past" the subverted router. For that matter, it could 
  be a dial-up connection to an ISP on the other side of the 
  Internet.


BGP Injection
-------------

  BGP? Ehm. My knowledge in BGP is, unfortunately, very 
  limited. I assume that one would need access (as in "being
  able to push BGP announcements into") to a BGP exchange in the 
  path of the communication channel. One such exchange is usually
  the backbone networks, but there could be other, more local 
  ones, with less clued admins.

  This becomes a bit trickier since some (I don't know the 
  percentage) providers filter BGP from their customers, to keep 
  them from playing these games.

  The ICMP redirect problems apply here too -- even if you
  manage to subvert the routers in the BGP exchange, you
  need to get the traffic to a system under your control,
  and, if you want the traffic to reach its real destination,
  you will, again, need a path that doesn't pass through 
  said exchange.


ARP spoofing
------------

  I mentioned ARP spoofing in my post. ARP spoofing will, of 
  course, only work if you control a system on the same 
  broadcast network as (one of) the peers. If they are separate, 
  it could also be on any network that speaks ARP in between;
  in this case, you spoof the address of the routers carrying
  the traffic between the peers.


Getting even more complicated
-----------------------------

  Also, there's the issue of RIP and OSPF spoofing, that I,
  for some reason, didn't bring up in that mail. The 
  implications are pretty much the same. 

  And, to complicate matters even more, any and all of these 
  techniques could be used in combination. Using BGP 
  injection to get the packets to your provider's main router 
  could be followed up by, for instance, RIP spoofing to get 
  the packets to the system under your control.


> Do you know where I can find more information on that?

Nope. I haven't seen any step-by-step guides on wide-scale
traffic redirection. There _could_ be a couple floating around 
the 'net, but something tells me that such a "guide" would be 
kept on a need-to-know basis, probably by people that we'd 
rather didn't know about it in the first place. :)

The up side to all of this is that it's so d*mn convoluted
that none but the most tecno-savvy attackers would try something 
this hard, and, even then, not before trying pretty much all the
other tricks in the book (which, almost invariably, will have 
resulted in a successful intrusion long before having to take
this kind of "drastic" measures).


The only reference I can give you right now is in regard 
to ARP spoofing. However, it is a very fine one:
http://www.monkey.org/~dugsong/dsniff/


Hope this helps... somehow :)
/Mike

-- 
Mikael Olsson, EnterNet Technologies
Storgatan 12, Box 393, SE-891 28  ÖRNSKÖLDSVIK
Phone: +46 (0)660 29 92 00   Mobile: +46 (0)70 66 77 636
Fax: +46 (0)660 122 50       WWW: http://www.enternet.net

"Smile; today is the tomorrow that you worried about yesterday"
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to