RE: iptables spof address problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 29 Sep 2005, Derick Anderson wrote:

I reiterate: a properly spoofed packet is completely identical to a genuine one. It is not Netfilter's or the kernel stack's fault, it is a simple fact of life that bits are bits. With an intelligent switch this kind of attack can be stopped provided the switch is set to use a 1-to-1 ratio of ports to MACs and to drop invalid packets. However, it is not possible prevent this attack when nothing separates the two boxes but twisted pair.

Well, if all you have between the boxes is a twisted pair, then identifying who sent the spoofed packet is trivial (you know where the other end of that cable is, don't you?). And also making anti-spoof rules is equially trivial. You know both MAC and IPs that box should use so making a filter ruleset to drop everything else is trivial. In this case you should not even need to care about MAC spoofing and as the MAC addrssing is only relevant between the two boxes.. (unless ofcourse if you act as a bridge to some other interface)

Problems to trace spoofing in an Ethernet arise if there is a HUB or switch without MAC locking features. In HUB based networks it is really bad as all you can tell is that the packet came from some station in the network connected to that HUB. In the switched network you may be able to find the originating port by querying the switch for its MAC forwarding table (each time a switch sees a new source MAC address on a port it is registered in the MAC forwarding table).

Regards
Henrik


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux