Re: IP Spoofing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2003-11-05 at 14:51, Antony Stone wrote:
> On Wednesday 05 November 2003 7:31 pm, Leandro Takashi Hirano wrote:
> 
> > Now I would like to know about the IP Spoofing rule, how does it works?
> >
> > -	iptables -A INPUT -s 192.168.1.0/24 -i ! eth0 -j DROP
> 
> Any packet with a source address in the Class C range 192.168.1.x which does 
> not come from eth0 will be DROPped.

Funny I was similarly confused. What happens to packets from the LAN
given that they don't originate from eth0?
> 
> > I don´t know how can it block ip spoofing attack...
> 
> These rules assume that eth0 is your internal network, and your internal 
> network range is 192.168.1.0/24.
> 
> No packets with your own source address should come from outside (rule 1) and 
> all packets from inside should have your own source address (rule 2).
> 
> Therefore these two rules stop people on the outside pretending that they 
> live on your network, and people on the inside pretending that they don't.
> 
> Antony.

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux