<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791725#M580383</link>
    <description>This won’t ever work though because if you leave both devices connected with the same MAC address (one real one spoofed), both devices will have severe communication problems. Even dumb switches are still MAC aware so it would have no idea which port to send the frames.&lt;BR /&gt;</description>
    <pubDate>Sat, 11 Mar 2023 00:16:12 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2023-03-11T00:16:12Z</dc:date>
    <item>
      <title>MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791313#M580373</link>
      <description>&lt;P&gt;I have a question regarding MAC-spoofing in an 802.1X solution. Let's say I have the following deployment:&lt;/P&gt;
&lt;P&gt;Authentication server: Cisco ISE&lt;BR /&gt;Authenticator: Cisco Catalyst 2960X&lt;BR /&gt;EAP-method: EAP-TLS&lt;BR /&gt;Supplicant: Single PC on a wall-outlet&lt;BR /&gt;Periodic re-authentication: Set to 1 hour&lt;/P&gt;
&lt;P&gt;---&lt;/P&gt;
&lt;P&gt;Now a hacker manages to get into the office and wants access to the network. The hacker removes the legitimate supplicant from the wall-outlet (switch-interface), identifies its MAC-address, adds a simple switch or HUB to the wall-outlet and reconnects the legitimate supplicant to the simple switch/HUB.&lt;/P&gt;
&lt;P&gt;Due tot the disconnect, the 802.1X authentication and authorization process starts and the valid supplicant is authenticated once more. The hacker then spoofs the MAC-address on a malicious device, adds this device to the simple switch/HUB and removes the legitimate supplicant.&lt;/P&gt;
&lt;P&gt;This way, the switch-interface behind the wall-outlet will not detect an interface change (down/up) and will not register a new MAC-address. I can imagine that the Authenticator will not attempt to re-authenticate in scenario.&lt;/P&gt;
&lt;P&gt;---&lt;/P&gt;
&lt;P&gt;The actual question: Does this mean that the malicious device now has access to the network? At least until the periodic re-authenticaton kicks in?&lt;/P&gt;
&lt;P&gt;If not, awesome!&lt;BR /&gt;If so, what is the recommended way to protect the network from this scenario?&lt;/P&gt;
&lt;P&gt;Things that come to mind are faster periodic re-authentication and proper monitoring, but I'm very curious if there are other ways to deal with it. (If it's an actual issue &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 12:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791313#M580373</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-10T12:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791687#M580381</link>
      <description>&lt;P&gt;Depends on how the switch is configured (multi-host, multi-domain, single host, multi-hosts).&amp;nbsp; Also the malicious device would not be able to perform the EAP-TLS authentication.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 21:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791687#M580381</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-03-10T21:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791720#M580382</link>
      <description>&lt;P&gt;Thanks for your reply. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The idea behind this scenario is that the Authenticator switch can't tell that the legitimate supplicant has been replaced by the malicious device because it uses the (spoofed) MAC address of the legitimate device that already did a successful reauthentication after being reconnected to the network through the non-intelligent switch or HUB.&lt;/P&gt;
&lt;P&gt;The authenticator switch won't detect a port down/up in this scenario (and thus won't force an 802.1x reauthentication) due to the extra non-intelligent switch or HUB that is placed between the Authenticator switch and the (malicious and legitimate) devices. The Authenticator switch also wouldn't see a second host on its interface since the MAC address of the malicious device is the same as that of the legimitate device.&lt;/P&gt;
&lt;P&gt;So how would the Authenticator switch recognize the difference between traffic of the legitimate device and the malicious device in this scenario? The traffic originates from the same MAC address and there's no legitimate supplicant check (or a permanent session between supplicant and Authenticator) after a succesful 802.1X authentication. I believe that's why periodic reauthentication was invented. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My apologies if my scenario is a little vague. I'll make sure to add a drawing next Monday to clear things up. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 00:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791720#M580382</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-11T00:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791725#M580383</link>
      <description>This won’t ever work though because if you leave both devices connected with the same MAC address (one real one spoofed), both devices will have severe communication problems. Even dumb switches are still MAC aware so it would have no idea which port to send the frames.&lt;BR /&gt;</description>
      <pubDate>Sat, 11 Mar 2023 00:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791725#M580383</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-03-11T00:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791728#M580384</link>
      <description>&lt;P&gt;I explained in my original post that the legitimate device is removed after it succesfully performs its 802.1X authentication through the added switch/HUB, before adding the malicious device.&lt;/P&gt;
&lt;P&gt;The port of the Authenticator switch stays up (since it is connected to the added switch), which means no 802.1X reauthentication takes place. This means that the Authenticator switchport still allows traffic for the legitimate device, since it doesn't know the legitimate device has been removed.&lt;/P&gt;
&lt;P&gt;Switches use MAC addresses to identify unique hosts and to forward traffic. Now we connect the malicious device to the added switch/HUB with the same MAC as the legitimate device.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How would the authenticator switch be able to tell the difference between the two? And what mechanic would prevent the malicious host from communicating in this scenario?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 00:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791728#M580384</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-11T00:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791733#M580385</link>
      <description>Right got it, I understand what you are asking now. See this link: &lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html#wp386865" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html#wp386865&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I could think of a couple ways to mitigate this: aggressive session re-auth timers, inactivity timer (as referenced in link above), and MACSEC.&lt;BR /&gt;&lt;BR /&gt;Also for this scenario you may also consider this to be more of a physical security problem too.&lt;BR /&gt;</description>
      <pubDate>Sat, 11 Mar 2023 00:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791733#M580385</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-03-11T00:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-spoofing through an 802.1X PNAC solution using a switch or HUB</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791734#M580386</link>
      <description>&lt;P&gt;So if I understand you correctly, the above scenario would allow the malicious device to communicate and thus this situation needs to be mitigated by taking extra measures. Preferably both physical and configurable.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help, it's appreciated! I'll make sure to check out the document you linked.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2023 01:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-spoofing-through-an-802-1x-pnac-solution-using-a-switch-or/m-p/4791734#M580386</guid>
      <dc:creator>RobKoerts</dc:creator>
      <dc:date>2023-03-11T01:21:13Z</dc:date>
    </item>
  </channel>
</rss>

