Re: IP Spoofing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 05 November 2003 7:31 pm, Leandro Takashi Hirano wrote:

> Thanks for the port scanner help....
>
> Now I would like to know about the IP Spoofing rule, how does it works?
>
> -	iptables -A INPUT -s 192.168.1.0/24 -i ! eth0 -j DROP

Any packet with a source address in the Class C range 192.168.1.x which does 
not come from eth0 will be DROPped.

> -	iptables -A INPUT ! -s 192.168.1.0/24 -i eth0 -j DROP

Any packet which comes from eth0 and has a source address other than the 
Class C  192.168.1.x will be DROPped.

> I don´t know how can it block ip spoofing attack...

These rules assume that eth0 is your internal network, and your internal 
network range is 192.168.1.0/24.

No packets with your own source address should come from outside (rule 1) and 
all packets from inside should have your own source address (rule 2).

Therefore these two rules stop people on the outside pretending that they 
live on your network, and people on the inside pretending that they don't.

Antony.

-- 

In Heaven, the police are British, the chefs are Italian, the beer is 
Belgian, the mechanics are German, the lovers are French, the entertainment 
is American, and everything is organised by the Swiss.

In Hell, the police are German, the chefs are British, the beer is American, 
the mechanics are French, the lovers are Swiss, the entertainment is Belgian, 
and everything is organised by the Italians.
                                                     Please reply to the list;
                                                           please don't CC me.



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux