03-10-2023 04:14 AM - edited 03-10-2023 04:17 AM
I have a question regarding MAC-spoofing in an 802.1X solution. Let's say I have the following deployment:
Authentication server: Cisco ISE
Authenticator: Cisco Catalyst 2960X
EAP-method: EAP-TLS
Supplicant: Single PC on a wall-outlet
Periodic re-authentication: Set to 1 hour
---
Now a hacker manages to get into the office and wants access to the network. The hacker removes the legitimate supplicant from the wall-outlet (switch-interface), identifies its MAC-address, adds a simple switch or HUB to the wall-outlet and reconnects the legitimate supplicant to the simple switch/HUB.
Due tot the disconnect, the 802.1X authentication and authorization process starts and the valid supplicant is authenticated once more. The hacker then spoofs the MAC-address on a malicious device, adds this device to the simple switch/HUB and removes the legitimate supplicant.
This way, the switch-interface behind the wall-outlet will not detect an interface change (down/up) and will not register a new MAC-address. I can imagine that the Authenticator will not attempt to re-authenticate in scenario.
---
The actual question: Does this mean that the malicious device now has access to the network? At least until the periodic re-authenticaton kicks in?
If not, awesome!
If so, what is the recommended way to protect the network from this scenario?
Things that come to mind are faster periodic re-authentication and proper monitoring, but I'm very curious if there are other ways to deal with it. (If it's an actual issue
03-10-2023 01:52 PM - edited 03-10-2023 01:53 PM
Depends on how the switch is configured (multi-host, multi-domain, single host, multi-hosts). Also the malicious device would not be able to perform the EAP-TLS authentication.
03-10-2023 03:57 PM - edited 03-10-2023 04:06 PM
Thanks for your reply.
The idea behind this scenario is that the Authenticator switch can't tell that the legitimate supplicant has been replaced by the malicious device because it uses the (spoofed) MAC address of the legitimate device that already did a successful reauthentication after being reconnected to the network through the non-intelligent switch or HUB.
The authenticator switch won't detect a port down/up in this scenario (and thus won't force an 802.1x reauthentication) due to the extra non-intelligent switch or HUB that is placed between the Authenticator switch and the (malicious and legitimate) devices. The Authenticator switch also wouldn't see a second host on its interface since the MAC address of the malicious device is the same as that of the legimitate device.
So how would the Authenticator switch recognize the difference between traffic of the legitimate device and the malicious device in this scenario? The traffic originates from the same MAC address and there's no legitimate supplicant check (or a permanent session between supplicant and Authenticator) after a succesful 802.1X authentication. I believe that's why periodic reauthentication was invented.
My apologies if my scenario is a little vague. I'll make sure to add a drawing next Monday to clear things up.
03-10-2023 04:16 PM
03-10-2023 04:37 PM - edited 03-10-2023 04:55 PM
I explained in my original post that the legitimate device is removed after it succesfully performs its 802.1X authentication through the added switch/HUB, before adding the malicious device.
The port of the Authenticator switch stays up (since it is connected to the added switch), which means no 802.1X reauthentication takes place. This means that the Authenticator switchport still allows traffic for the legitimate device, since it doesn't know the legitimate device has been removed.
Switches use MAC addresses to identify unique hosts and to forward traffic. Now we connect the malicious device to the added switch/HUB with the same MAC as the legitimate device.
How would the authenticator switch be able to tell the difference between the two? And what mechanic would prevent the malicious host from communicating in this scenario?
03-10-2023 04:59 PM
03-10-2023 05:06 PM - edited 03-10-2023 05:21 PM
So if I understand you correctly, the above scenario would allow the malicious device to communicate and thus this situation needs to be mitigated by taking extra measures. Preferably both physical and configurable.
Thanks for your help, it's appreciated! I'll make sure to check out the document you linked.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide