Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Client Roam, DoS and Disconnect by Controller

This thread has been viewed 2 times
  • 1.  Client Roam, DoS and Disconnect by Controller

    Posted Apr 09, 2012 03:44 PM

    Need help, why my controller DoS the client when it roam?

    Controller: 3600, AOS 6.1.2.5

    We are testing new laptops to be used for doctors in the hospital.  During test, the laptop roamed and suddenly disconnected.  When the laptop disconnected the log showed the laptop was DoS  

    (WC01) #show log all | include a0:88:b4:07:35:5c
    Apr  9 12:06:43  sapd[902]: <127109> <WARN> |AP MOBW.1.120A@172.18.8.42 sapd| |ids-ap| AP(d8:c7:c8:23:0e:40): Power Save DoSn AP detected a Power Save DoS attack on client a0:88:b4:07:35:5c and access point (BSSID d8:c7:c8:18:4d:61 and SSID btnrh_wNEL 6). SNR of client is 7. Additional Info: Pwr-Mgmt-On-Pkts:49; Pwr-Mgmt-Off-Pkts:61.
    
    Apr  9 12:08:21  sapd[902]: <127109> <WARN> |AP MOBW.1.120A@172.18.8.42 sapd| |ids-ap| AP(d8:c7:c8:23:0e:40): Power Save DoSn AP detected a Power Save DoS attack on client a0:88:b4:07:35:5c and access point (BSSID d8:c7:c8:23:0a:71 and SSID btnrh_wNEL 6). SNR of client is 24. Additional Info: Pwr-Mgmt-On-Pkts:54; Pwr-Mgmt-Off-Pkts:66.
    
    Apr  9 14:01:31  sapd[902]: <127109> <WARN> |AP MOBW.1.120B@172.18.15.128 sapd| |ids-ap| AP(d8:c7:c8:23:0c:80): Power Save D An AP detected a Power Save DoS attack on client a0:88:b4:07:35:5c and access point (BSSID d8:c7:c8:23:0d:10 and SSID btnrhANNEL 11). SNR of client is 8. Additional Info: Pwr-Mgmt-On-Pkts:172; Pwr-Mgmt-Off-Pkts:72.

     

    During the client de-auth, show auth-tracebuf indicated the client tried but failed re-authentication

    Apr  9 13:58:32  station-down           *  a0:88:b4:07:35:5c  00:0b:86:8e:42:c8           -      -
    Apr  9 13:58:32  station-up             *  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           -      -     wpa tkip
    Apr  9 13:58:32  eap-id-req            <-  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           1      5
    Apr  9 13:58:32  eap-start             ->  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           -      -
    Apr  9 13:58:32  eap-id-req            <-  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           1      5
    Apr  9 13:58:32  eap-id-resp           ->  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           1      39    host/nerh123910.btnrh.boystown.org
    Apr  9 13:58:32  rad-req               ->  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           65409  237
    Apr  9 13:58:32  eap-id-resp           ->  a0:88:b4:07:35:5c  00:0b:86:8e:2c:c8           1      39    host/nerh123910.btnrh.boystown.org

     

    The only way to make this client came back is disconnect and reconnect the ssid.

     

    Thanks,

    Trinh Nguyen

     


    #3600


  • 2.  RE: Client Roam, DoS and Disconnect by Controller

    Posted Apr 09, 2012 05:13 PM

    Update:

     

    It seems like when the client is fast roaming, hitting the 6th or 7th AP in a short period, controller (or AP) will IDS DoS this client.

    Can we adjust these parameters: number of APs in x seconds clients can hit before being DoS?  For the hospital environment, roaming is essential.

     

    Thanks,

     



  • 3.  RE: Client Roam, DoS and Disconnect by Controller

    Posted Apr 19, 2012 05:34 PM

     

    Just redo the test with user-debug and send log to TAC.

    The problem is consistent, after 7-9 APs roam, in about 5 minutes, client will be deauth and DoS by the AP with error reason 255.  Anyone knows the meaning of error 255?

    TAC is working on this case .



  • 4.  RE: Client Roam, DoS and Disconnect by Controller

    EMPLOYEE
    Posted Apr 19, 2012 10:35 PM

    That is a generic error.  There are association thresholds that could be exceeded for that client.

     



  • 5.  RE: Client Roam, DoS and Disconnect by Controller

    Posted Apr 23, 2012 10:03 AM

    In "ids dos-profile default" a knob  "Detect Power Save DoS Attack" was enable by default. 

     

    From the UG 6.1:

    "Detect Meiners Power Save DoS Attack
    To save on power, wireless clients will "sleep" periodically, during which they cannot transmit or receive. A
    client indicates its intention to sleep by sending frames to the AP with the Power Management bit ON. The
    AP then begins buffering traffic bound for that client until it indicates that it is awake. An intruder could
    exploit this mechanism by sending (spoofed) frames to the AP on behalf of the client to trick the AP into
    believing the client is asleep. This will cause the AP to buffer most, if not all, frames destined for the client."

     

    I am going to disable this IDS Detect Power Save DoS Attack.  Any advices?

     

    Regards,

     

     

     



  • 6.  RE: Client Roam, DoS and Disconnect by Controller

    Posted May 04, 2012 11:56 PM

    Any update on this?  I see a lot of "Power Save DoS attacks" in our logs and....well I am pretty sure it's just clients going to sleep....



  • 7.  RE: Client Roam, DoS and Disconnect by Controller

    Posted May 07, 2012 09:51 AM

    TAC suggested disabling 'mode-aware' in arm profile.  I disagreed because we deployed APs in hospital where client roaming is critical, so the APs were deployed at high density, about 20 feet apart.  In this environment ‘mode-aware’ is important to help avoid high level of interference.  

    At this time, disable PowerSave DoS in IDS work for us. 



  • 8.  RE: Client Roam, DoS and Disconnect by Controller

    Posted May 17, 2012 02:08 PM

    We have PC's go into power save mode and trigger the power dos attack which then blacklists them. Aside from disabling the feature - which metric should be modified below to prevent normal laptop operations from trigerring a blacklisting? 

     

    Detect Power Save DoS Attack  X

    Power Save DoS Detection Threshold  90%

     Power Save DoS Detection Minimum Frames  60

    Power Save DoS Detection Quiet Time  900 sec



  • 9.  RE: Client Roam, DoS and Disconnect by Controller
    Best Answer

    Posted May 30, 2012 10:31 AM

    UPDATE from TAC:

     

    In "ids dos-profile default", double "Power Save DoS Detection Minimum Frames" to 120

     

    We re-enable "Detect Power Save DoS Attack" and still testing. it seems ok.



  • 10.  RE: Client Roam, DoS and Disconnect by Controller

    Posted Jun 05, 2012 08:39 AM

    Ok I'll try that setting and reenable dos power detection.  Thanks,  Ian