Introduction to nd detection – H3C Technologies H3C S3100 Series Switches User Manual

Page 912

Advertising
background image

1-9

z

Router Advertisement (RA)

z

Redirect

The ND protocol functions powerfully, but without any security mechanism, it is apt to be used by

attackers.

ND attacks usually come from users. Normally, when the device Switch is a Layer-2 access device, ND

multiple packets sent by users are broadcast on the VLAN, and ND unicast packets are forwarded on

Layer 2. Attackers can imitate other users and gateways to send forged ND packets and attack the

network.

In

Figure 1-5

, Host A communicates with Host C through a switch. To intercept the traffic between Host

A and Host C, the hacker (Host B) forwards invalid ND packets to Host A and Host C respectively,

causing the two hosts to update the MAC address corresponding to the peer IPv6 address in their ND

entry with the MAC address of Host B. Then, the traffic between Host A and C will pass through Host B

which acts like a “man-in-the-middle” that may intercept and modify the communication information.

Figure 1-5 ND attack diagram

Switch

Host A

Host B

IP_A

MAC_A

IP_B

MAC_B

IP_C

MAC_C

Host C

Forged

ND packets

Forged

ND packets

A forged ND packet has the following features:

z

The source MAC address in the forged ND packet is inconsistent to that in the link layer address

option.

z

The mapping between the source IPv6 address and MAC address in the forged ND packet is not

real for legal users.

Introduction to ND Detection

The ND detection is mainly used in the access device to check users legality. Forward the ND packets

of legal users, otherwise, discard them directly to prevent the attack of imitated users and gateways.

The ND detection divides the ports on the access device into two types: ND trusted ports and untrusted

ports

z

For the trusted ports, the ND detection does not check the users legality;

z

For the untrusted ports, the received RA and RR messages are considered illegal and discarded

directly. If other types of ND packets are received, the ND detection checks their legality to prevent

the attack of imitated users.

Advertising