Adam Thompson [athom...@athompso.net] wrote:
> Yes, OT... But unless you've chosen to do something silly (like enabling 
> MVRP, or blindly allowing all VLANs to an untrusted host) saying "VLANs 
> aren't secure" is about as useful as "ICMP isn't secure".
> Please explain how VLANs are not secure when you have control of the devices 
> on both ends of an 802.1Q-tagged link?  That's no more or less secure than 
> having multiple links to a switch running un-tagged ports on different VLANs. 
>  Or are you saying I should have a separate physical switch for each subnet?

When OpenBSD first impelemented if_vlan, not all vlan tagging switches
were created equal. I ported and improved if_vlan (we had it working in
an OS release _before_ FreeBSD did.) So I was paying attention to this
area fairly closely. Vlan hopping bugs with 802.1Q (and ISL) were not
entirely unheard of!

Certain switches had designs that paid attention to the MAC address
tables and didn't properly filter based on the vlan tag, even when
ports were set to only pass packets with a certain vlan tag.
This would depend on certain configuration options or combinations
of options.

Some would only exhibit this behavior under certain stress
situations. For instance, when the MAC address table was full, the
switch would basically turn into a sort of full-duplex hub.

This is well documented by security researchers who were proving these
bugs at the time. And this was some 14 years ago. If you're still using
a 14+ year old switch that hasn't failed by now, (even a nice, high-end
one) you are doing better than many others. Realize that these issues
were taken fairly seriously by vendors because vlans were being used
as a security mechanism. 

This situation is made more complicated because plenty of low-end
switches still exhibit odd behavior under stress situations. Don't
use them if you are using vlans for privacy. (If you are being paid
for co-location or ISP services, don't buy shit. You are being
paid for privacy.) Hopefully Broadcom and whoever else makes
switch ASICs has fixed their bugs by now, too.

Many networks use vlans for privacy very extensively these days.
Open source implementatons rule on 802.11 based wireless (Ubiquiti,
Mikrotik, Deliberant, and all the companies that use their
hardware in similar products with some Linux derivative kernel),
also there is a variety of Linux and BSD in firewall and router
gear. I hope most gear configures their vlan tagging kernel
interfaces and bridges correctly, configures their switch ASICs
or FPGAs correctly, and so on. Don't forget the NSA loves your
routers :)

If you want to test your gear, there are various tools
out there that you can test with. There are some MAC-
address-table flooding tools. You can also use if_vlan, arp -s
and ping to test for MAC address forwarding (for instance, will
a software bridge or switch send a packet to a MAC address
destination that in a different vlan that is learned on a
port configured to only pass traffic for a certain vlan.)

Basically anything that your users could possibly do, you can
test for. I'd be curious if anyone who has done this kind of
testing with recent hardware and software implementations can
share their results.

> 
> I recall the performance question coming up at BSDCan, and Henning saying 
> that under ideal circumstances, yes, OpenBSD could usefully fill a 10GE pipe, 
> but that non-ideal circumstances would degrade performance faster than the 
> equivalent $250k+ hardware 10GE router.
> 
> Reyk@ is, I believe, running an entire company predicated on high-performance 
> routing, including multiple-10GE but that's second-hand knowledge.
> 
> Certainly OpenBSD is easily capable of pushing many gigabits per second of 
> traffic, I just don't know what the absolute upper limits are today.
> 

Reyk's new company is Esdenera Networks. He hasn't released much in
the way of technical details but he did recently commit if_vxlan which
just might be one component of the Esdenera secret sauce :)

OpenBSD's networking capabilities are constantly being improved.

Some people are looking at improving OpenBSD's MP networking 
performance these days. Right now all routers and firewalls should
be on SP kernels or you will actually have worse performance.
There is a chance than this situation may improve in later
releases, a remote chance for 5.6.

Chris

Reply via email to