RE: iptables spof address problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 

> -----Original Message-----
> From: Henrik Nordstrom [mailto:hno@xxxxxxxxxxxxxxx] 
> Sent: Friday, September 30, 2005 8:22 AM
> To: Derick Anderson
> Cc: Piotr Holubniak; netfilter@xxxxxxxxxxxxxxxxxxx
> Subject: RE: iptables spof address problem
> 
> On Thu, 29 Sep 2005, Derick Anderson wrote:
> 
> > I reiterate: a properly spoofed packet is completely identical to a 
> > genuine one. It is not Netfilter's or the kernel stack's 
> fault, it is 
> > a simple fact of life that bits are bits. With an 
> intelligent switch 
> > this kind of attack can be stopped provided the switch is 
> set to use a 
> > 1-to-1 ratio of ports to MACs and to drop invalid packets. 
> However, it 
> > is not possible prevent this attack when nothing separates the two 
> > boxes but twisted pair.
> 
> Well, if all you have between the boxes is a twisted pair, 
> then identifying who sent the spoofed packet is trivial (you 
> know where the other end of that cable is, don't you?). And 
> also making anti-spoof rules is equially trivial. You know 
> both MAC and IPs that box should use so making a filter 
> ruleset to drop everything else is trivial. In this case you 
> should not even need to care about MAC spoofing and as the 
> MAC addrssing is only relevant between the two boxes.. 
> (unless ofcourse if you act as a bridge to some other interface)

Apologies for not being more precise... Yes the hub/dumb switch is
necessary.

> Problems to trace spoofing in an Ethernet arise if there is a 
> HUB or switch without MAC locking features. In HUB based 
> networks it is really bad as all you can tell is that the 
> packet came from some station in the network connected to 
> that HUB. In the switched network you may be able to find the 
> originating port by querying the switch for its MAC 
> forwarding table (each time a switch sees a new source MAC 
> address on a port it is registered in the MAC forwarding table).

Which is essentially what I said above.

> 
> Regards
> Henrik
> 

Derick Anderson



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux