Title: Introduction to HP OpenView Project at INAC
1IP Spoofing Attacks Defenses
Tao Wan Digital Security Group School of Computer
Science Carleton University Oct 30, 2003
2Outline
- Introduction
- IP Spoofing Attacks
- IP Spoofing Defenses
- Concluding Remarks
3Introduction
4Protocol Stacks
HTTP
SNMP
802.3
802.11
others
OSI Model
5Protocol Stacks
HTTP
SNMP
802.3
802.11
others
6Data Transmissions
Application
data
data
Application
TCP UDP
TCP UDP
IP
IP
routing
Data link/physical
Data link/physical
A
B
7IP Header
8TCP Header
9Security Services
- Entity Authentication
- What do you know
- What do you have
- What do you inherit
- Integrity
- Message authentication
- Confidentiality
- Encryption
10IP Spoofing Attacks
11IP Spoofing Attacks
- IP Spoofing
- DoS by Ping
- TCP Sync Flooding
- Session Hijacking
12IP Spoofing
http//www.carleton.ca
spoofing
13IP Spoofing Attacks Smurf IP DoS
A
ICMP Echo Reply Source T1 Dest V
V
14Mail Address Spoofing Attacks Mail-bombs
Catalog Request Return Addr V
Sears
A
Canadian Tire
Phonebook Request Return Addr V
Pizza orders Return Addr V
Bell Canada
V
Boston Pizza
15IP Spoofing Attacks TCP 3 Way Handshake
A
TCP SYN
Half-open buffer
TCP SYNACK
A
B
TCP ACK
A
Open buffer
Half-open buffer has limited size
Half-open connection has a timer associated with
16IP Spoofing Attacks TCP Sync Flooding (DDos)
A
B
C
D
J
V
I
E
Half-open buffer is full
F
G
H
17IP Spoofing Defenses
18IP Spoofing Defenses
- It is a VERY hard problem
- Ingress/Egress Filtering
- IP Authentication (IPsec AH)
- Cryptographic Generated Address (CGA)
19IP Spoofing Defenses Ingress/Egress Filtering
if src_addr is from 10.10.0.0 then drop else
forward
if src_addr is from 10.10.10.0 then forward else
drop
10.10.0.0
10.10.10.0
if src_addr is from 10.10.0.0 then forward else
drop
20IP Spoofing Defenses IPSec (???)
- Two Protocols
- Authentication Header (AH)
- Encapsulating Security Payload
- Two Modes
- Transport Mode
- Tunnel Mode
21IP Spoofing Defenses IP Authentication Header
(AH)
22IP Spoofing Defenses IP Authentication Header
(AH)
23IP Spoofing Defenses IPSec (???)
- Data Origin Authentication
- IP address is not modified en route
- Is it a real or spoofed IP ??
- Message Integrity
- Replay Prevention
24IP Spoofing Defenses Cryptographic Generated
Address (CGA)IPv6
25IP Spoofing Defenses Cryptographic Generated
Address (CGA)IPv6
- How about IPv4
- Does everyone have a pair of private/public keys
(authenticated)? - DoS by engaging a recipient into a endless
process of verifying CGAs
26Concluding Remarks
- IP spoofing is a common technique for attacks
- There is not too much we can do about it
27Thanks !