In a live network, you might (a) replace the NIC in a machine
(perhaps later installing the removed NIC in a different machine),
and (b) move a machine from one switch port to another.
  So the way node A, and the switch, handle this is to just keep
the last information they saw.  Node B can reply more than once
to the ARP request from A, and could even send out a gratuitous
ARP (broadcast ARP reply for which no request was received)
periodically.  The windows during which a sender has the real
address of C can be made quite small.

  (Note that if B wants to remain undetected, he needs to forward
those packets to C.  So in fact, any time B sees an ARP request 
for C, it should issue its own ARP for C as well.  It's pretty 
safe to assume that when it gets an answer from C, C has already 
sent its answer to A and so B can send a reply to A without fear
that it will arrive before C's.
  Here's some good logic for B:

when you see a broadcast ARP request for C
  send a broadcast ARP response advertising your MAC address as C's
  if the ARP request didn't come from us
    send a broadcast ARP request for C

Note that the sent request (last line) will be seen and trigger
an additional response (first two lines) but the "if" prevents it
from looping infinitely.)

David Gillett


> -----Original Message-----
> From: Vineet Mehta [mailto:[EMAIL PROTECTED]
> Sent: July 22, 2003 22:22
> To: [EMAIL PROTECTED]
> Subject: ARP Spoof Question
> 
> 
> Hi all members,
> 
> I have a small question. I was reading about ARP Spoofing and 
> here is my
> question.
> 
> When Node A wants to send some packets to Node C, it sends a ARP
> Broadcast to find out the MAC address of Node C. This 
> broadcast reaches
> all nodes in a network in a switched or Hub network. So when 
> Node B is a
> attacker he catches the ARP Request and sends his MAC address in reply
> to Node A. This way Node B gets the packets destined for Node C.
> 
> Q1.My Question is, Node C will also reply to that request of 
> Node A. SO
> now Node A has 2 different MAC for the same IP. How is Node A handling
> this situation???
> 
> Q2.The switch also updates its table of IP/MAC address 
> bindings, so how
> is switch handling this situation???
> 
> Is it "first-come-first-serve" methodology which Node 
> A/Switch takes???
> 
> Thanks in advance
> Regards,
> 
> -- 
> Vineet Mehta
> Network Security Consultant
> Kuwait Linux Company
> Kuwait
> Ph-2412552/2463633
> <vineet [at] linux [dot] com [dot] kw>
> www.linux.com.kw
> 

---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to