Rant: stupid 4 port switch

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

InlineFive

Diamond Member
Sep 20, 2003
9,599
2
0
Originally posted by: goku
Originally posted by: Pepsi90919
Originally posted by: InlineFive
Now I'm curious, would that create an infinite loop?

switches like to forward things. it will create a perpetual fowarding machine; eventually the buffer will fill up, the host switch will start creating collisions to shut up all the 'real' traffic, nothing goes anywhere.

STP was brought up because it is designed to eliminate inefficient loops. STP is also a good band and shady snake oil company.

I thought it was hubs that like to forward things?

Broadcasting (networks) at Wikipedia

Switches broadcast too, but all other information is managed "intelligently."
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
-
Originally posted by: goku
Originally posted by: Pepsi90919
Originally posted by: InlineFive
Now I'm curious, would that create an infinite loop?

switches like to forward things. it will create a perpetual fowarding machine; eventually the buffer will fill up, the host switch will start creating collisions to shut up all the 'real' traffic, nothing goes anywhere.

STP was brought up because it is designed to eliminate inefficient loops. STP is also a good band and shady snake oil company.

I thought it was hubs that like to forward things?

I'm not going to teach how to break a switch, but needless to say they are nothing more than multiport bridges. figure it out from there.

-edit- jebus, does that wiki need editing. Yet another reason to not trust wiki.
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: spidey07
-
Originally posted by: goku
Originally posted by: Pepsi90919
Originally posted by: InlineFive
Now I'm curious, would that create an infinite loop?

switches like to forward things. it will create a perpetual fowarding machine; eventually the buffer will fill up, the host switch will start creating collisions to shut up all the 'real' traffic, nothing goes anywhere.

STP was brought up because it is designed to eliminate inefficient loops. STP is also a good band and shady snake oil company.

I thought it was hubs that like to forward things?

I'm not going to teach how to break a switch, but needless to say they are nothing more than multiport bridges. figure it out from there.

-edit- jebus, does that wiki need editing. Yet another reason to not trust wiki.

according to the Luftwaffe, bombs were very good at destroying bridges;)
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: goku
Originally posted by: Pepsi90919
Originally posted by: InlineFive
Now I'm curious, would that create an infinite loop?

switches like to forward things. it will create a perpetual fowarding machine; eventually the buffer will fill up, the host switch will start creating collisions to shut up all the 'real' traffic, nothing goes anywhere.

STP was brought up because it is designed to eliminate inefficient loops. STP is also a good band and shady snake oil company.

I thought it was hubs that like to forward things?

hubs are simply multiport repeaters. they suck
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: spidey07
Originally posted by: EyeMWing
I was wondering if you were referring to the spanning tree part of 802.1D or not. Yeah, those little fvckers are dangerous weapons on networks with non-spanning switches. I actually saw it demonstrated in a network security class. "Your end users are going to cause problems, your predecessors and colleagues are going to cause a bunch of their own, but your REAL problems come from someone that knows the standards as well, or better than you do, and has $5, access to two ethernet ports and a reason to take down the entire damned network."

The easy solution to that attack, though, is to use exclusively switches of your own which support spanning tree - that way, the only disruption someone can cause is within an unauthorized extension of the network"

I can take down most networks with a hub or a switch in my hands. Not trying to brag. But if the access layer isn't using the proper security measures (most) you can bring the entire broadcast domain down very easily, if not the layer3 routing (processor flooded with broadcasts.)

As to inlinefives request - think about this....

You have a layer2 loop that spanning-tree cannot stop, it happens and it's easy to cause this. I won't go into details on how to make this happen. Each and every frame is received on one port and forwarded out the other (switches are bridges). After a few minutes of normaly activity that broadcast domain is full of nothing but layer2 broadcasts - pegging even the most hardened switches without the employment of broadcast suppression.

It is a layer2 loop, and it happens. thankfully there are features to prevent this. But suffice to say, it is easy to do.

teach us oh great wise one!:D


seriosuly though, I had never heard of broadast suppression...sounds cool:D
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: spidey07
Originally posted by: Goosemaster
seriosuly though, I had never heard of broadast suppression...sounds cool:D

You never read the fargin manual??? RTFM

I don't have any good switches:( I basically use the switch ports on unused routers for that:eek:
 

KLin

Lifer
Feb 29, 2000
29,543
156
106
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.


I had to deal with that a few months ago. My network at work was being flooded for some reason, and I traced it to a netgear cheapo switch (daisy chained off of an intel 510t switch) with a patch cable looped into it. Damn cabling limitations forcing me to install these switches :(.
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: KLin
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.


I had to deal with that a few months ago. My network at work was being flooded for some reason, and I traced it to a netgear cheapo switch (daisy chained off of an intel 510t switch) with a patch cable looped into it. Damn cabling limitations forcing me to install these switches :(.

STP and the like didn't let it get bad, no?
 

Paulson

Elite Member
Feb 27, 2001
10,689
0
0
www.ifixidevices.com
I bought a netgear 24port switch from justdeals.com (well their ebay store) and even though it took forever for them to finally ship it and it didn't come with the power cord, it was basically brand new and I only paid $33 shipped for it (retails for $99 on newegg.com)
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.

OK, I don't know much about networking beyond how to share a connection for home use, or setting up some PCs for a LAN party, so bear with me here. Are you saying take a four port switch, and run two wires from 2 of the ports on the switch to 2 ports on another, bigger switch, and that will take down the bigger network? Or do you mean something else entirely?

 

MichaelD

Lifer
Jan 16, 2001
31,528
3
76
All this talk about bringing down networks is very educational and all...but getting back on topic. ;)

A hissing electronic device is not good. You probably have a leaking capacitor in there and eventually it will pop. Having the device wrapped in highly flammable bubble wrap isn't the brightest of ideas.
 

Kadarin

Lifer
Nov 23, 2001
44,296
15
81
Originally posted by: Goosemaster
Originally posted by: goku
Originally posted by: Pepsi90919
Originally posted by: InlineFive
Now I'm curious, would that create an infinite loop?

switches like to forward things. it will create a perpetual fowarding machine; eventually the buffer will fill up, the host switch will start creating collisions to shut up all the 'real' traffic, nothing goes anywhere.

STP was brought up because it is designed to eliminate inefficient loops. STP is also a good band and shady snake oil company.

I thought it was hubs that like to forward things?

hubs are simply multiport repeaters. they suck

Well, actually, they have one good purpose now: When put inline, they will allow you to connect a host to a spare port and capture packets on the network.
 

MichaelD

Lifer
Jan 16, 2001
31,528
3
76
Originally posted by: Madwand1
10/100 switches should go straight to landfill. Cut out the middleman :)

The vast majority of businesses are still on 10/100 switches. Granted, most are aggregated with Gigabit uplinks to the switch farm, but the departmental/wiring closet switches are still 100MB.
 

Raduque

Lifer
Aug 22, 2004
13,140
138
106
Originally posted by: Special K
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.

OK, I don't know much about networking beyond how to share a connection for home use, or setting up some PCs for a LAN party, so bear with me here. Are you saying take a four port switch, and run two wires from 2 of the ports on the switch to 2 ports on another, bigger switch, and that will take down the bigger network? Or do you mean something else entirely?

I'd like to know how this works as well, and how to defend against it.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: Raduque
I'd like to know how this works as well, and how to defend against it.

To guard against it your switch should have features to prevent such a thing and shut the ports down if it detects a bridging loop. Cisco calls it loopguard and bpduguard.

bpduguard works very well. if the port receives a spanning-tree bdpu it shuts it down. In the 4 port switch example here's what the "closet switch" would see.

port 1 - send out bpdus
porr 2 - send out bpdus
Neither port should ever receive bdpus and run bpdu guard on them.

user plugs in little 4 port switch to ports 1 and 2, since it doesn't run spanning tree, a bridging loop is created and traffic is forwarded endlessly, broadcasts go through the roof as frames never stop being forwarded everywhere. Very quickly the entire broadcast domain becomes unusable as every port is spitting out 100 to 1000 megabits/sec of broadcasts. layer3 switch/router has to process (in processor) these broadcasts, processor goes to 100%, router/switch has trouble even routing now...more than likely other segments are affected because of this.

but with bpduguard, this scenario of the rogue switch:
port 1 - receives a spanning-tree bpdu from port 2
port 2 - receives a bpdu from port 1
Both ports shut down, loop broken.
 

Goosemaster

Lifer
Apr 10, 2001
48,775
3
81
Originally posted by: spidey07
Originally posted by: Raduque
I'd like to know how this works as well, and how to defend against it.

To guard against it your switch should have features to prevent such a thing and shut the ports down if it detects a bridging loop. Cisco calls it loopguard and bpduguard.

bpduguard works very well. if the port receives a spanning-tree bdpu it shuts it down. In the 4 port switch example here's what the "closet switch" would see.

port 1 - send out bpdus
porr 2 - send out bpdus
Neither port should ever receive bdpus and run bpdu guard on them.

user plugs in little 4 port switch to ports 1 and 2, since it doesn't run spanning tree, a bridging loop is created and traffic is forwarded endlessly, broadcasts go through the roof as frames never stop being forwarded everywhere. Very quickly the entire broadcast domain becomes unusable as every port is spitting out 100 to 1000 megabits/sec of broadcasts. layer3 switch/router has to process (in processor) these broadcasts, processor goes to 100%, router/switch has trouble even routing now...more than likely other segments are affected because of this.

but with bpduguard, this scenario of the rogue switch:
port 1 - receives a spanning-tree bpdu from port 2
port 2 - receives a bpdu from port 1
Both ports shut down, loop broken.

wow..that's hot.
 

Thraxen

Diamond Member
Dec 3, 2001
4,683
1
81
LOL... what's with all the hate toward 4-port switches? I have a 4-port SMC switch downstairs from my internet connection in my entertainment center. All it's doing is providing internet connectivity for my XBox and Xbox 360. WTF would I want a 12/24/48/etc... switch there? I wouldn't. The 4-port is small, discrete, and does its job perfectly.
 

sswingle

Diamond Member
Mar 2, 2000
7,183
45
91
Originally posted by: Thraxen
LOL... what's with all the hate toward 4-port switches? I have a 4-port SMC switch downstairs from my internet connection in my entertainment center. All it's doing is providing internet connectivity for my XBox and Xbox 360. WTF would I want a 12/24/48/etc... switch there? I wouldn't. The 4-port is small, discrete, and does its job perfectly.

Get a 5 port. Still small and discrete, but no one seems to hate them ;)
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Originally posted by: Raduque
Originally posted by: Special K
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.

OK, I don't know much about networking beyond how to share a connection for home use, or setting up some PCs for a LAN party, so bear with me here. Are you saying take a four port switch, and run two wires from 2 of the ports on the switch to 2 ports on another, bigger switch, and that will take down the bigger network? Or do you mean something else entirely?

I'd like to know how this works as well, and how to defend against it.

Yes. This would work, but it would only take out a single link in switching tree (i.e. a single switch). Depending on where the switch is located in the network topology, this could cause anything from MASSIVE traffic disruptions to a few clients losing connectivity altogether. Connecting them into multiple switches on the same network does much more damage.

There are several facets to effectively defending against this sort of attack:

First, you should NEVER have accessible network drops connected into your transport core switches.

Second, your switching topology should correspond to your actual geographic topology - switches close to each other in the switching topology should be close to each other physically. This makes it much harder to initiate a loop that spans a large part of the heirarchy, because you have to run cable much further.

Third, you should keep unused ports DEAD as much as possible. MAC filtering will not defend against this.

Fourth, as much of your switching equipment should support 802.1D "Spanning Tree" protocol. If both end-segments of the loop support this protocol, the loop will automatically be deactivated. (Spanning tree is also useful because you can intentionally create loops in your network which will be shut down and used as failovers in the case that a switch goes bad, eliminating single point of failure scenarios)

Fifth, your technical responders should know to check client equipment connected to switches that no longer appear to be switching and do not respond to in-band management (but they DO normally respond to out-of-band management)

Time is also of the essence, and during troubleshooting the directly affected part of heirarchy should be DISCONNECTED from the rest of the network, because if ANY broadcast packets are sent, they will loop as well - very quickly taking down the entire network.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
Originally posted by: EyeMWing
Originally posted by: Raduque
Originally posted by: Special K
Originally posted by: spidey07
Originally posted by: EyeMWing
That sentence hurt to read. Switching gear has NOTHING to do with your "connection". It has EVERYTHING to do with how many and what sort of equipment you use on the premesis running what applications.

And yeah, I'll be the first to admit that my home setup is beyond abnormal, and indeed, beyond geeky experimentation. That still doesn't change the fact that there isn't a 4-port switching-only product on the market that I wouldn't laugh at.

Not only that, they don't even run 802.1d.

In otherwords, they are to be avoided at all costs. Wanna take down a network? Use a four port switch and plug it into two network ports. fun will ensue.

OK, I don't know much about networking beyond how to share a connection for home use, or setting up some PCs for a LAN party, so bear with me here. Are you saying take a four port switch, and run two wires from 2 of the ports on the switch to 2 ports on another, bigger switch, and that will take down the bigger network? Or do you mean something else entirely?

I'd like to know how this works as well, and how to defend against it.

Yes. This would work, but it would only take out a single link in switching tree (i.e. a single switch). Depending on where the switch is located in the network topology, this could cause anything from MASSIVE traffic disruptions to a few clients losing connectivity altogether. Connecting them into multiple switches on the same network does much more damage.

There are several facets to effectively defending against this sort of attack:

First, you should NEVER have accessible network drops connected into your transport core switches.

Second, your switching topology should correspond to your actual geographic topology - switches close to each other in the switching topology should be close to each other physically. This makes it much harder to initiate a loop that spans a large part of the heirarchy, because you have to run cable much further.

Third, you should keep unused ports DEAD as much as possible. MAC filtering will not defend against this.

Fourth, as much of your switching equipment should support 802.1D "Spanning Tree" protocol. If both end-segments of the loop support this protocol, the loop will automatically be deactivated. (Spanning tree is also useful because you can intentionally create loops in your network which will be shut down and used as failovers in the case that a switch goes bad, eliminating single point of failure scenarios)

Fifth, your technical responders should know to check client equipment connected to switches that no longer appear to be switching and do not respond to in-band management (but they DO normally respond to out-of-band management)

Time is also of the essence, and during troubleshooting the directly affected part of heirarchy should be DISCONNECTED from the rest of the network, because if ANY broadcast packets are sent, they will loop as well - very quickly taking down the entire network.

How do you make an unused port dead? Is this something that can only be done on higher-end switches, as opposed to the cheapo Netgears you can pickup at any Best Buy?

Second, if I am understanding that correctly, it sounds like causing one of these feedback loops requires you to physically interfere with the network in some way (i.e. deliberately placing a cable in such a way that will cause a problem). Wouldn't this be much easier to "defend" against than some attack that runs remotely? I mean it sounds like all you have to do is prevent unauthorized personnel from entering your server/network rooms.

Finally, in the more severe attack you were describing, you are saying to take a small switch, run one cable from a port on that switch to a port on a larger switch in the network, and then run another cable from the smaller switch to a different switch on the larger network? Is there any reason to do this other than to cause trouble? Why wouldn't any switch just detect that as an invalid connection? So basically that causes your network to be flooded with BS traffic, preventing anything else from going through?