CN103840984B - Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict - Google Patents

Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict Download PDF

Info

Publication number
CN103840984B
CN103840984B CN201410071887.3A CN201410071887A CN103840984B CN 103840984 B CN103840984 B CN 103840984B CN 201410071887 A CN201410071887 A CN 201410071887A CN 103840984 B CN103840984 B CN 103840984B
Authority
CN
China
Prior art keywords
configuration file
information
sniff
message
checking information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410071887.3A
Other languages
Chinese (zh)
Other versions
CN103840984A (en
Inventor
唐小虎
王祝勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201410071887.3A priority Critical patent/CN103840984B/en
Publication of CN103840984A publication Critical patent/CN103840984A/en
Application granted granted Critical
Publication of CN103840984B publication Critical patent/CN103840984B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The present invention provides a kind of detection to be included without webmaster type Ethernet switch configuration file collision method, this method:Calculate configuration file checking information corresponding to the customizing messages of configuration file;Calculate loopback detection information;Send the first sniff message of the configuration file checking information and loopback detection information that carry generation;Receive the second sniff message;When the second sniff message configuration file checking information with generate configuration file checking information is identical and the loopback detection information of the second sniff message is different from the loopback detection information of generation, determine configuration file conflict.As can be seen here, the configuration file in the detectable network of the present invention without webmaster type Ethernet machine with the presence or absence of illegal copies.

Description

Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict
Technical field
The present invention relates to communication technique field, more particularly to a kind of detection to rush without webmaster type Ethernet switch configuration file Prominent method and apparatus.
Background technology
The devices such as CPU, memory, mac controller and PHY controllers are generally included without webmaster type Ethernet switch.Its Middle EEPROM(Electrically Erasable Programmable Read Only Memory, electronic type, which can erase, to be compiled Journey read-only memory)Or the less FLASH of capacity(Flash memory)Can be as the memory without webmaster type Ethernet switch.
After starting without webmaster type Ethernet switch, the bootstrap progress hardware for reading memory FX is initial Change, the configuration file in memory is then read by BootRom programs, MAC Address is set according to the parameter of configuration file And mac controller, complete whole start-up course.Do not allow to change device configuration by user without webmaster type Ethernet switch.
It is limited without webmaster type interchanger storage space, simple BootROM programs can only be run, it is difficult to pass through webmaster system System operation particular software application is false proof to carry out.Configurator without webmaster type Ethernet switch is generally in a manner of configuration file Solidification is in memory.Counterfeiter need not obtain software source code, and directly configuration file is copied, and can obtain and originate in The identical MAC register configurations of product, that is, can complete counterfeit software feature.
The content of the invention
The invention provides a kind of configuration file collision method and device of the detection without webmaster type Ethernet switch, can examine Measure in network and cause configuration file conflict without the configuration file illegally copied on webmaster type Ethernet switch.
For achieving the above object, rushed the invention provides one kind detection without webmaster type Ethernet switch configuration file Burst method, this method include:Calculate configuration file checking information corresponding to the customizing messages of configuration file;Calculate loopback detection letter Breath;Send the first sniff message of the configuration file checking information and loopback detection information that carry generation;Second is received to smell Visit message;When the configuration file checking information of the second sniff message is identical with the configuration file checking information of generation and the second sniff The loopback detection information of message is different from the loopback detection information of generation, determines configuration file conflict.
To achieve the above object, present invention also offers one kind detection without webmaster type Ethernet switch configuration file conflict Device, the device includes:Computing unit, for calculating configuration file checking information corresponding to the customizing messages of configuration file, And calculate loopback detection information;Transmitting element, configuration file checking information and the loopback inspection of generation are carried for sending First sniff message of measurement information;Receiving unit, for receiving the second sniff message;Detection unit, for when the second sniff report The configuration file checking information of text and generation configuration file checking information is identical and the loopback detection information of the second sniff message Different from the loopback detection information of generation, configuration file conflict is determined.
As can be seen here, the invention provides method of the detection without webmaster type Ethernet switch configuration file conflict, it is used for Detect in network without webmaster type Ethernet machine with the presence or absence of the configuration file illegally copied.
Brief description of the drawings
Fig. 1 is flow chart of the detection without webmaster type Ethernet switch configuration file conflict provided in an embodiment of the present invention.
Fig. 2 is sniff message structure figure in embodiment of the present invention.
Fig. 3 is a kind of building-block of logic of the false proof device of no webmaster type Ethernet switch in embodiment of the present invention.
Embodiment
For the objects, technical solutions and advantages of the present invention are more clearly understood, develop simultaneously embodiment referring to the drawings, right Scheme of the present invention is described in further detail.
Referring to Fig. 1, the present invention provides a kind of method for anti-counterfeit of no webmaster type Ethernet switch, performs following steps:
Step S101, calculate configuration file checking information corresponding to the customizing messages of configuration file and calculate loopback detection Information;
Step S102, send the first sniff report of the configuration file checking information and loopback detection information that carry generation Text.
Step S103, receive the second sniff message.
Step S104, when the configuration file checking information of the second sniff message is identical with the configuration file checking information generated And second sniff message loopback detection information be different from generation loopback detection information, determine configuration file authentication conflicts.
When starting without webmaster type Ethernet switch, integrality and legal can be carried out to configuration file by existing manner Property verification.For example, equipment vendors carry out CRC using special algorithm when compiling configuration file to whole configuration file content (Cyclic Redundancy Check, CRC)Verification, configuration file fixed position is stored in by check value(Example Such as end up place).After starting without webmaster type Ethernet switch, CRC schools are re-started to configuration file content according to same algorithm Test, then by check value compared with the CRC check value of configuration file fixed position, if the same think that configuration file is complete, Otherwise it is assumed that this document is imperfect.Having for legitimacy and integrality is carried out without webmaster type Ethernet switch verification configuration file Implementation has many kinds, and the present invention is no longer described in detail one by one.
After completing configuration file integrality and legitimacy verifies without webmaster type Ethernet switch, according to preset time period The sniff message for carrying configuration file checking information and loopback detection information is sent to current network.When wherein above-mentioned default Between the cycle should not set too short, otherwise may cause occur a large amount of sniff messages in network, take network bandwidth resources, and increase Facility load.Certainly preset time period should not also be set long, otherwise may bring difficulty to loopback detection.In the present embodiment In, configuration file checking information is to calculate checking information based on the information in configuration file with uniqueness using preset algorithm. Loopback detection information can be that no webmaster type Ethernet switch first generates one group of character string at random, then the word to generating at random Symbol string carries out HASH calculating, obtained hash value(Sample value)It can serve as loopback detection information.Therefore, no webmaster type ether Network switch is according to configuration file checking information, the configuration file as judging whether, and is sentenced according to loopback detection information The disconnected sniff message received whether be loopback sniff message, that is, judge the same configuration file whether be this equipment configuration text Part, in order to avoid erroneous judgement configuration file conflict.
Referring to Fig. 2, the standard architecture of two layers of ether network packet can be used to be constructed for sniff message.In the sniff message Purpose MAC is the specific reservation protocol multicast address of 01-80-C2-00-00-XX sections;Source MAC is for equipment bridge MAC itself Location;Type protocol numbers are special identifier, such as use 0x88DD;Configuration file checking is carried in the message content of the sniff message Information and loopback detection information.
In the present embodiment, no webmaster type Ethernet switch can be using MAC Address in configuration file as having uniqueness Customizing messages, the MAC Address in configuration file is calculated according to default HASH algorithms, using the hash value being calculated as matching somebody with somebody Put file verification information.
When receiving in network other sniff messages without webmaster type Ethernet switch without webmaster type Ethernet switch, solution The configuration file checking information and loopback detection information in the sniff message received are analysed, when the configuration file of the sniff message received Checking information is identical with the configuration file checking information generated to be judged as configuration file conflict;When the configuration of the sniff message received File verification information and loopback detection information and the configuration file checking information and loopback detection all same of generation, are judged as receiving Sniff message be this equipment that other equipment is sent back sniff message.
The number of the configuration file conflict detected can be also further recorded without webmaster type Ethernet switch, when detecting The number of configuration file conflict exceed predetermined threshold value(Such as 3 times), judge that anti-fake certificate fails, by default a series of anti- User is prompted in pseudo-operation.For example, the part or all of port LED of no webmaster type Ethernet switch is according to certain order light on and off Or flicker;Or without webmaster type Ethernet switch not allow new port to put enabled;Or without webmaster type Ethernet exchanging Machine MAC chips stop forwarding message.
When without webmaster type Ethernet switch because anti-fake certificate failure and stop the data message forwarding of MAC chips, this Sample copied illegal configuration file without webmaster type Ethernet switch and the legal configuration file of storage without webmaster type ether Network switch can not all participate in data forwarding in network, then user needs to match somebody with somebody without webmaster type Ethernet switch copy legal copy File is put, can just make whether there is webmaster type Ethernet switch normal work in network.
As shown in figure 3, device 300 of the detection without webmaster type Ethernet switch configuration file conflict provided by the invention wraps Include, computing unit 301, transmitting element 302, receiving unit 303, detection unit 304 and anti-dummy unit 305.
Computing unit 301, for calculating configuration file checking information corresponding to the customizing messages of configuration file, and calculate Loopback detection information;Transmitting element 302, the configuration file checking information and loopback detection information of generation are carried for sending The first sniff message;Receiving unit, 303, for receiving the second sniff message;Detection unit 304, for when the second sniff report The configuration file checking information of text and generation configuration file checking information is identical and the loopback detection information of the second sniff message Different from the loopback detection information of generation, configuration file authentication conflicts are determined.
Detection unit 304, it is additionally operable to when the configuration file checking information of the second sniff message is different from matching somebody with somebody for generation File verification information is put, determines that configuration file does not conflict.
The detection unit 304, it is additionally operable to configuration file checking information and loopback detection when the second sniff message Information is identical with the configuration file checking information and loopback detection information that generate, and it is the institute of loopback to determine the second sniff message State the first sniff message.
Anti- dummy unit 305, for the number of record profile conflict, when the number of the configuration file conflict of record reaches During predetermined threshold value, the false proof failure of configuration file is determined.
The computing unit is that the information with uniqueness is as customizing messages according to using in configuration file, and for example configuration is literary Device mac address in part.
Anti- dummy unit 305 can also further prompt to make prompting user anti-fake certificate failure.Anti- dummy unit 305 can be by equipment Part or all of port LED according to certain order light on and off or flicker, do not allow to enable new port and put enabled, or notice MAC chips stop forwarding message.
By the description of above example, it will be appreciated by those skilled in the art that the unit in embodiment in device can close And be a unit, multiple subelements can also be further split into.
These are only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements done etc., it should be included within the scope of protection of the invention.

Claims (8)

1. one kind detection is without webmaster type Ethernet switch configuration file collision method, it is characterised in that methods described includes:
Calculate configuration file checking information corresponding to the customizing messages of configuration file;
Calculate loopback detection information;Wherein, the loopback detection information to the character string generated at random by carrying out HASH calculating Obtain;
Send the first sniff message of the configuration file checking information and loopback detection information that carry generation;
Receive the second sniff message;
When the configuration file checking information of the second sniff message is identical with the configuration file checking information of generation and the second sniff report The loopback detection information of text is different from the loopback detection information of generation, determines configuration file conflict;
Wherein, the number of record profile conflict;
When the number of the configuration file conflict of record reaches predetermined threshold value, the false proof failure of configuration file is determined.
2. the method as described in claim 1, it is characterised in that methods described also includes:
When the second sniff message configuration file checking information be different from generation configuration file checking information, it is determined that configuration File does not conflict.
3. the method as described in claim 1, it is characterised in that methods described also includes:
Verify and believe with the configuration file of generation when the configuration file checking information and loopback detection information of the second sniff message Breath is identical with loopback detection information, and it is the first sniff message of loopback to determine the second sniff message.
4. the method as described in claim 1, it is characterised in that the customizing messages is the uniqueness letter in the configuration file Breath.
5. a kind of device of the detection without webmaster type Ethernet switch configuration file conflict, it is characterised in that described device includes:
Computing unit, for calculating configuration file checking information corresponding to the customizing messages of configuration file, and calculate loopback inspection Measurement information;Wherein, the loopback detection information is calculated by carrying out HASH to the character string generated at random;
Transmitting element, for sending the first sniff report of the configuration file checking information and loopback detection information that carry generation Text;
Receiving unit, for receiving the second sniff message;
Detection unit is identical with the configuration file checking information generated for the configuration file checking information when the second sniff message And second sniff message loopback detection information be different from generation loopback detection information, determine configuration file conflict;
Wherein, described device also includes:
Anti- dummy unit, for the number of record profile conflict, when the number of the configuration file conflict of record reaches default threshold During value, the false proof failure of configuration file is determined.
6. device as claimed in claim 5, it is characterised in that
The detection unit, it is additionally operable to when the configuration file checking information of the second sniff message is different from the configuration text of generation Part checking information, determine that configuration file does not conflict.
7. device as claimed in claim 5, it is characterised in that
The detection unit, it is additionally operable to the configuration file checking information when the second sniff message and loopback detection information and life Into configuration file checking information it is identical with loopback detection information, it is described the first of loopback to smell to determine the second sniff message Visit message.
8. device as claimed in claim 5, it is characterised in that the customizing messages is the uniqueness letter in the configuration file Breath.
CN201410071887.3A 2014-02-28 2014-02-28 Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict Active CN103840984B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410071887.3A CN103840984B (en) 2014-02-28 2014-02-28 Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410071887.3A CN103840984B (en) 2014-02-28 2014-02-28 Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict

Publications (2)

Publication Number Publication Date
CN103840984A CN103840984A (en) 2014-06-04
CN103840984B true CN103840984B (en) 2018-02-09

Family

ID=50804146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410071887.3A Active CN103840984B (en) 2014-02-28 2014-02-28 Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict

Country Status (1)

Country Link
CN (1) CN103840984B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399814B (en) * 2007-09-30 2012-08-08 华为技术有限公司 Method, system and device for verifying relation between data link layer address and sending side
CN101729262B (en) * 2009-11-03 2012-12-12 福建星网锐捷网络有限公司 Configuration method of non-webmaster type switchboard and non-webmaster type switchboard
US9215193B2 (en) * 2009-12-28 2015-12-15 Broadcom Corporation System and method for enhanced energy control policy for unmanaged switch applications
CN102006202A (en) * 2010-11-25 2011-04-06 杭州华三通信技术有限公司 Router identification collision detection method and router

Also Published As

Publication number Publication date
CN103840984A (en) 2014-06-04

Similar Documents

Publication Publication Date Title
US11636196B2 (en) Misuse detection method, misuse detection electronic control unit, and misuse detection system
US9674216B2 (en) Testing integrity of property data of a device using a testing device
JPWO2018105330A1 (en) Information processing method, information processing system, and program
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
KR101831604B1 (en) Method for transmitting data, method for authentication, and server for executing the same
KR100618379B1 (en) Apparatus for verifying integrity of device memory remotely and system thereof and method for verifying integrity
CN104579558A (en) Method for detecting integrity in data transmission process
CN104216830A (en) Method and system for detecting consistency of equipment software
CN110363010A (en) A kind of safety startup of system method based on MPSoC chip
CN112149066A (en) Activation verification method and device for software
JP2015098312A (en) On-vehicle network system
CN112000853A (en) Method, medium, client and server for generating/feeding back unique identifier of equipment
CN107632909B (en) Method and system for automatically testing device functions
CN109274636A (en) Data safe transmission method and its device, system, train
CN103840984B (en) Detect the method and apparatus without webmaster type Ethernet switch configuration file conflict
JP2015200971A (en) Control system equipped with falsification detection function
CN114389895B (en) Ethernet frame safe transmission method, device and system
CN106156548A (en) Authentication method and device for program encryption
CN107292172B (en) Method for automatically verifying a target computer file with respect to a reference computer file
JP2019029921A (en) Transmitter, receiver, and communication method
JP2020034486A (en) Inspection system
CN116341011B (en) Detection system and method
CN109561093A (en) Ultra vires act detection method, device, computer equipment and storage medium
JP2006140881A (en) Network identifier generation device with authenticating information and apparatus authenticating device
CN112468358B (en) Protocol detection method, system, equipment and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: Xinhua three Technology Co., Ltd.

Address before: 310053 Hangzhou hi tech Industrial Development Zone, Zhejiang province science and Technology Industrial Park, No. 310 and No. six road, HUAWEI, Hangzhou production base

Applicant before: Huasan Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant