Exploit #1 – Topology Changes Vulnerability: LSA Information Modification [3.2.4.3-4] Pre-condition: Being able to CONSTANTLY inject valid OSPF messages Weak MD5 key choice/Compromised Router No Cryptographic Authentication, etc… Possible Impact: Topology Changes Allow Eavesdropping Starve/Overload a network Expected Outcome: Highly unstable topology (loops, route-flapping) due to Fight Back of LSAs between attacker and legitimate owner Observed Outcome (as supported by the RFC!) PERMANENT or SEMI-PERMANENT topology changes due to ineffective Fight Back |