Hi,

we've just stumbled over an interesting denial-of-service case at IETF. 
I was playing with a custom startup script to auto-configure local 
interfaces, part of which sent out an ARP request "borrowing" the IP 
address of the gateway as source address (e.g. "who-has X tell X").

It seems that most/all BSDs do ARP snooping, and will happily add the 
apparent "new" MAC address of the gateway to their ARP table, possibly 
flushing the existing one of the default gateway. This of course causes 
everybody's packets to fall on the floor until the fake ARP entry times 
out. (RFC826 seems to imply that snooping is allowed, the "packet 
reception" section doesn't seem to limit *how* packets are received.)

Maybe ARP entries should only be updated when replies are received in 
response to locally originated requests? Initial latency might be a bit 
higher, since the ARP table won't be pre-loaded, but it will add some 
protection against this particular DOS attack.

Lars
-- 
Lars Eggert <[EMAIL PROTECTED]>           USC Information Sciences Institute

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to