Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.

S-ARP : a secure address resolution protocol / D. Bruschi, A. Ornaghi, E. Rosti - In: 19th Annual Computer Security Applications Conference : proceedings : 8-12 December, 2003, Las Vegas, NevadaLos Alamitos : IEEE Computer Society, 2003 Dec. - ISBN 0769520413. - pp. 66-74 (( Intervento presentato al 19. convegno Annual Computer Security Applications Conference (ACSAC) tenutosi a Las Vegas nel 2003.

S-ARP : a secure address resolution protocol

D. Bruschi
Primo
;
E. Rosti
Ultimo
2003

Abstract

Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.
Information security, Secure channels, Protocol Analysis
Settore INF/01 - Informatica
dic-2003
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/258699
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 146
  • ???jsp.display-item.citation.isi??? 71
social impact