Mitigating 802.1x bypass by transparent bridging
Clash Royale CLAN TAG#URR8PPP
up vote
1
down vote
favorite
The talk DEFCON talk "A Bridge Too Far" details a means to bypass wired 802.1x network access controls by setting up a transparent bridge between a genuine machine and the network. Once authentication is performed, the transparent bridge is free to tamper with and inject traffic.
Are there controls that can be put in place to mitigate this risk?
security ieee-802.1x
New contributor
add a comment |Â
up vote
1
down vote
favorite
The talk DEFCON talk "A Bridge Too Far" details a means to bypass wired 802.1x network access controls by setting up a transparent bridge between a genuine machine and the network. Once authentication is performed, the transparent bridge is free to tamper with and inject traffic.
Are there controls that can be put in place to mitigate this risk?
security ieee-802.1x
New contributor
add a comment |Â
up vote
1
down vote
favorite
up vote
1
down vote
favorite
The talk DEFCON talk "A Bridge Too Far" details a means to bypass wired 802.1x network access controls by setting up a transparent bridge between a genuine machine and the network. Once authentication is performed, the transparent bridge is free to tamper with and inject traffic.
Are there controls that can be put in place to mitigate this risk?
security ieee-802.1x
New contributor
The talk DEFCON talk "A Bridge Too Far" details a means to bypass wired 802.1x network access controls by setting up a transparent bridge between a genuine machine and the network. Once authentication is performed, the transparent bridge is free to tamper with and inject traffic.
Are there controls that can be put in place to mitigate this risk?
security ieee-802.1x
security ieee-802.1x
New contributor
New contributor
New contributor
asked 1 hour ago
Cybergibbons
1093
1093
New contributor
New contributor
add a comment |Â
add a comment |Â
2 Answers
2
active
oldest
votes
up vote
2
down vote
Frankly, no.
802.1X authenticates the port and as long as it is authenticated it participates in the network. Inserted or even modified frames by an otherwise transparent network device cannot be detected.
802.1X has had some serious attack vectors from the start and can only be regarded as a "better than nothing" approach. If you want serious port security you'll need 802.1AE aka MACsec.
add a comment |Â
up vote
1
down vote
Welcome to Network Engineering! You might want to ask this on Information Security SE, but here are a few thoughts:
- If one has physical access to the network, an attacker can do lots
of things. Attacking 802.1x is just one. - The presentation lists some mitigation techniques, but they all rely
on careful monitoring of network traffic -- something rarely done
except on the most secure networks. - Since it's really a physical attack, the best defense is physical
security. - If 802.1x is used correctly, this attack has minimal effect. Yes,
you can hide your attack box behind the printer and gain access, but
the printer VLAN should have limited access anyway (no initiating
connections). Any attempts to start probing should generate alerts. - 802.1ae might be another way to stop it, but it's not common.
- Finally, I think the risk is overstated. Physical attacks are hard,
expensive, and very risky. That's why they're very rare.
add a comment |Â
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
Frankly, no.
802.1X authenticates the port and as long as it is authenticated it participates in the network. Inserted or even modified frames by an otherwise transparent network device cannot be detected.
802.1X has had some serious attack vectors from the start and can only be regarded as a "better than nothing" approach. If you want serious port security you'll need 802.1AE aka MACsec.
add a comment |Â
up vote
2
down vote
Frankly, no.
802.1X authenticates the port and as long as it is authenticated it participates in the network. Inserted or even modified frames by an otherwise transparent network device cannot be detected.
802.1X has had some serious attack vectors from the start and can only be regarded as a "better than nothing" approach. If you want serious port security you'll need 802.1AE aka MACsec.
add a comment |Â
up vote
2
down vote
up vote
2
down vote
Frankly, no.
802.1X authenticates the port and as long as it is authenticated it participates in the network. Inserted or even modified frames by an otherwise transparent network device cannot be detected.
802.1X has had some serious attack vectors from the start and can only be regarded as a "better than nothing" approach. If you want serious port security you'll need 802.1AE aka MACsec.
Frankly, no.
802.1X authenticates the port and as long as it is authenticated it participates in the network. Inserted or even modified frames by an otherwise transparent network device cannot be detected.
802.1X has had some serious attack vectors from the start and can only be regarded as a "better than nothing" approach. If you want serious port security you'll need 802.1AE aka MACsec.
answered 25 mins ago
Zac67
20.3k21047
20.3k21047
add a comment |Â
add a comment |Â
up vote
1
down vote
Welcome to Network Engineering! You might want to ask this on Information Security SE, but here are a few thoughts:
- If one has physical access to the network, an attacker can do lots
of things. Attacking 802.1x is just one. - The presentation lists some mitigation techniques, but they all rely
on careful monitoring of network traffic -- something rarely done
except on the most secure networks. - Since it's really a physical attack, the best defense is physical
security. - If 802.1x is used correctly, this attack has minimal effect. Yes,
you can hide your attack box behind the printer and gain access, but
the printer VLAN should have limited access anyway (no initiating
connections). Any attempts to start probing should generate alerts. - 802.1ae might be another way to stop it, but it's not common.
- Finally, I think the risk is overstated. Physical attacks are hard,
expensive, and very risky. That's why they're very rare.
add a comment |Â
up vote
1
down vote
Welcome to Network Engineering! You might want to ask this on Information Security SE, but here are a few thoughts:
- If one has physical access to the network, an attacker can do lots
of things. Attacking 802.1x is just one. - The presentation lists some mitigation techniques, but they all rely
on careful monitoring of network traffic -- something rarely done
except on the most secure networks. - Since it's really a physical attack, the best defense is physical
security. - If 802.1x is used correctly, this attack has minimal effect. Yes,
you can hide your attack box behind the printer and gain access, but
the printer VLAN should have limited access anyway (no initiating
connections). Any attempts to start probing should generate alerts. - 802.1ae might be another way to stop it, but it's not common.
- Finally, I think the risk is overstated. Physical attacks are hard,
expensive, and very risky. That's why they're very rare.
add a comment |Â
up vote
1
down vote
up vote
1
down vote
Welcome to Network Engineering! You might want to ask this on Information Security SE, but here are a few thoughts:
- If one has physical access to the network, an attacker can do lots
of things. Attacking 802.1x is just one. - The presentation lists some mitigation techniques, but they all rely
on careful monitoring of network traffic -- something rarely done
except on the most secure networks. - Since it's really a physical attack, the best defense is physical
security. - If 802.1x is used correctly, this attack has minimal effect. Yes,
you can hide your attack box behind the printer and gain access, but
the printer VLAN should have limited access anyway (no initiating
connections). Any attempts to start probing should generate alerts. - 802.1ae might be another way to stop it, but it's not common.
- Finally, I think the risk is overstated. Physical attacks are hard,
expensive, and very risky. That's why they're very rare.
Welcome to Network Engineering! You might want to ask this on Information Security SE, but here are a few thoughts:
- If one has physical access to the network, an attacker can do lots
of things. Attacking 802.1x is just one. - The presentation lists some mitigation techniques, but they all rely
on careful monitoring of network traffic -- something rarely done
except on the most secure networks. - Since it's really a physical attack, the best defense is physical
security. - If 802.1x is used correctly, this attack has minimal effect. Yes,
you can hide your attack box behind the printer and gain access, but
the printer VLAN should have limited access anyway (no initiating
connections). Any attempts to start probing should generate alerts. - 802.1ae might be another way to stop it, but it's not common.
- Finally, I think the risk is overstated. Physical attacks are hard,
expensive, and very risky. That's why they're very rare.
answered 13 mins ago
Ron Trunk
31.6k22668
31.6k22668
add a comment |Â
add a comment |Â
Cybergibbons is a new contributor. Be nice, and check out our Code of Conduct.
Cybergibbons is a new contributor. Be nice, and check out our Code of Conduct.
Cybergibbons is a new contributor. Be nice, and check out our Code of Conduct.
Cybergibbons is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f53635%2fmitigating-802-1x-bypass-by-transparent-bridging%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password