Artigo Acesso aberto Revisado por pares

Securing ARP/NDP From the Ground Up

2017; Institute of Electrical and Electronics Engineers; Volume: 12; Issue: 9 Linguagem: Inglês

10.1109/tifs.2017.2695983

ISSN

1556-6021

Autores

Dave Tian, Kevin Butler, Joseph I. Choi, Patrick McDaniel, Padma Krishnaswamy,

Tópico(s)

Distributed systems and fault tolerance

Resumo

The basis for all IPv4 network communication is the address resolution protocol (ARP), which maps an IP address to a device's media access control identifier. ARP has long been recognized as vulnerable to spoofing and other attacks, and past proposals to secure the protocol have often involved in modifying the basic protocol. Similarly, neighbor discovery protocol (NDP) is the basis for all IPv6 network communication, yet suffers from the same vulnerabilities as ARP. This paper introduces arpsec, a secure ARP/RARP protocol suite which does not require protocol modification, enables continual verification of the identity of the target (respondent) machine by introducing an address binding repository derived using a formal logic that bases additions to a host's ARP cache on a set of operational rules and properties, utilizes the trusted platform module (TPM), a commodity component now present in the vast majority of modern computers, to augment the logic-prover-derived assurance when needed, with TPM-facilitated attestations of system state achieved at viably low-processing cost, and supports IPv6 NDP (ndpsec) by extension of our previous work. Using commodity TPMs as our attestation base, we show that arpsec incurs an overhead ranging from 7% to 15.4% over the standard Linux ARP implementation, a comparable overhead against the standard Linux NDP implementation, and provides a first step towards a formally secure and trustworthy networking stack for both IPv4 and IPv6.

Referência(s)