Title: Introduction to HP OpenView Project at INAC
1IP Spoofing Attacks Defenses
Tao Wan Digital Security Group Carleton
University, Ottawa, Canada http//www.scs.carleton
.ca/twan November 04, 2004
2Outline
- Introduction
- IP Spoofing Attacks
- IP Spoofing Defenses
- Concluding Remarks
3Introduction
4An Example of Communication
1.1.2.0
1.1.1.0
5Protocol Stacks (1)
HTTP
SNMP
802.3
802.11
others
OSI Model
6Protocol Stacks (2)
HTTP
SNMP
802.3
802.11
others
7Data Transmissions
Application
data
data
Application
TCP UDP
TCP UDP
IP
IP
routing
Data link/physical
Data link/physical
A
B
8IP Header
9TCP Header
10IP Spoofing Attacks
- Denial of Services (DoS)
- DoS by Ping
- TCP Sync Flooding
11Basic Concept of IP Spoofing
http//www.carleton.ca
spoofed
12Smurf IP DoS
A
ICMP Echo Reply Source T1 Dest V
V
13Mail Address Spoofing Attacks
Catalog Request Return Addr V
Sears
A
Canadian Tire
Phonebook Request Return Addr V
Pizza orders Return Addr V
Bell Canada
V
Boston Pizza
14TCP Sync Flooding (1)TCP 3-Way Handshake
A
TCP SYN
Half-open buffer
TCP SYNACK
A
B
TCP ACK
A
Open buffer
Half-open buffer has a limited size
Each half-open connection is associated with a
timer
15TCP Sync Flooding (2)
A
B
C
D
J
V
I
E
Half-open buffer is full
F
G
H
16Session Hijack
X
X
17Session Hijack
B
18IP Spoofing Defenses
- IP Authentication (IPSec AH)
- Cryptographic Generated Address (CGA)
19Ingress/Egress Filtering (1)
if src_addr is from 10.10.0.0 then drop else
forward
10.10.0.0
10.10.10.0
if src_addr is from 10.10.0.0 then forward else
drop
20Ingress/Egress Filtering (2)
Exchange
Exchange
Exchange
Exchange
21Ingress/Egress Filtering (3)
Client Net
Client Net
Internet
ISP
Carleton U 134.117.x.x
if src_addr is from 134.117 then forward else
drop
22IP Traceback
23IP Security (IPSec)
- Two Protocols
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Two Modes
- Transport Mode
- Tunnel Mode
24Authentication Header (1)
25Authentication Header (2)
26Comments
- Data Origin Authentication
- IP address is NOT modified en route
- Is it a real or spoofed IP ???
- Message Integrity
- Replay Prevention
27Crypto Generated Address (IPv6)
28Comments on CGA
- Unrealistic assumptions of private/public key
pairs
- Creating new DoS problem (by engaging a recipient
into endless expensive crypto operations
29Concluding Remarks
- A common technique for many types of attacks
- An important problem to work on
30Thanks !