Lots of other vendor products can thwart network hijacking, especially
those products that support IP-level encryption. These products include
COTS "all-in-one" firewall products that support IP-level encryption or
router devices that support IP-level encryption. Hence, you are leaving
out a lot of vendor products.
Note that network hijacking can be prevented between two nodes that employ
IP-level encryption. The tunnel (Virtual Private Network) between the two
nodes is protected (for node-to-node communications). An attacker cannot
hijack a connection that is flowing between these two nodes (unless they
break the encryption mechanism). They may be able to spoof a packet but
the decryption process will fail on the packet, the packet will be dropped.
With some products, integrity checking (e.g., MD5) can be employed along
with IP-level encryption. This ensures that the packet received from a
given device actually came from that device.
In summary, you need a device at each end of the tunnel to protect
connections across the tunnel. This does not protect connections that are
outside of this tunnel. For example, nodeA has an encryption device to
communicate with nodeB (who also has an encryption device). NodeA also
accepts connections from other nodes, nodes that do not have encryption
devices. These "other" connections (especially session-oriented protocols)
are vulnerable to network hijacking attacks.
I would read the CERT Advisory (CA 95:01) on IP Spoofing and Network
Hijacking for background information.
>> From: frankw @
net (Frank Willoughby)
>> Date: Wed, 20 Dec 95 14:58:20 -0500
>> Subject: Re: re Shiva / SecureID
>>>[ I lost track of who said what .... ]
>>>>>> I humbly disagree with the last sentence. To my knowledge, only 3
>>>>>> vendors (out of 69+) are able to stop session hijacking:
>>>>>> o V-ONE's SmartWall firewall
>>>>>> o Raptor's Eagle firewall
>>>>>> o DEC's IP Encryption Tunnel
>>> I believe that FW-1 2.0 prevents session hijacking as well. Am
>> Fortified Networks Inc. - Management & Information Security Consulting
>> Phone: (317) 573-0800 - http://www.fortified.com/fortified
>What's session hijacking (if this is in a FAQ someplace, please forgive me
>and simply point me to the FAQ. Thanks)?
>Vic Serbe (vic @
com), Applications Engineer/Webmaster
>Central Data Corp. - Makers of the scsiTerminal Server
>800/482-0315 or (+1) 217/366-9237 (MAIN 359-8010) (FAX 359-6904)
>WWW: http://www.cd.com Ftp: ftp.cd.com