rpsec-3----Page:9
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

Exploit #2 - Resource Consumption
“Phantom LSAs” are Router/Network LSAs sent on behalf of non-existing OSPF peers
These entries are ignored by the Shortest Path First (SPF) algorithm (do not produce topology changes)
“Phantom LSAs” are entered in the Link State Database
Each entry is kept for MaxAge (1hour)
No fight back is triggered since there is no legitimate owner
Exhausting Link-State Database resources will put OSPF in a very delicate state and stress implementation’s robustness

PPT Version