On 10 Sep 2001, at 14:24, Paul Robertson wrote:

> On Mon, 10 Sep 2001 [EMAIL PROTECTED] wrote:
> 
> > On 8 Sep 2001, at 22:41, Paul D. Robertson wrote:
> >
> > > Some switches will still broadcast packets when their buffers
> > > start to get saturated, or if they get too many entries in their
> > > ARP tables- if you really need seperation, then things should be
> > > physically seperated and routed (per-port costs go up for users in
> > > that scenerio, but on the good side you get big routers to play
> > > with.)
> >
> >   Some?  That's the *correct* behaviour for a switch when it receives
> > a packet whose destination MAC address is not in its tables, whether
> > because it just hasn't yet seen traffic from the destination box yet,
> > or whether its tables have filled and can't hold any more addresses.
> 
> I differentiated for a particular reason- if you have MAC latching on for
> all ports, then you shouldn't be able to get more than $num_ports MAC
> addresses if it's a stand-alone switch - which can be modled, tested and
> validated for a particular implementation (though I still agree that it's
> a poor thing to depend on for seperation.)  That's not the same as a
> failure case where full buffers start broadcast behaviour- and it's
> important (IMO) to seperate the failure of the modes (full ARP
> tables ~= unknown MAC from the logic perspective v.s. heavy traffic.)

  Okay, I'll grant that for some switches, MAC address => port number 
(LATCHED) could imply port number => MAC address (ONLY).  And if 
you're relying on the switch for security, you should verify that 
this is true of the model you have.
 
> >   In either case, the switch doesn't know  which is the correct
> > destination port, and the safe fallback is to forward the packet to
> > all ports on the VLAN/broadcast domain.  Any switch that doesn't do
> > that is broken, and anyone who considers this a security issue should
> > stop relying on switches as a security mechanism....
> 
> It's most certainly a security issue if you're relying on latching a port
> to a MAC address and expecting that to save you from the broadcast of what
> should be unicast packets because the switch theoretically knows who everyone
> connected to it is- though now that switches are getting higher-bandwidth
> handling capabilities, I suspect that testing for all failure modes is
> going to be pretty darned difficult.

  I agree that it's a security issue -- my tone was meant to be 
mildly sarcastic.  (Probably a bad idea, in hindsight....)
  I'm not comfortable with the suggestion that people *should* be 
relying on switches to provide security, and this is only one of the 
reasons why.  While this issue might be addressable by selecting a 
siwtch whose behaviour in this case is as desired, I don't think it's 
prudent to assume that that approach scales well to all of the 
possible security concerns with switches.
 
DG


_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to