Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 12 Nov 2001 20:00:13 -0800
From:      Greg White <gregw-freebsd-security@greg.cex.ca>
To:        Bill Fumerola <billf@mu.org>
Cc:        security@freebsd.org
Subject:   Source routed packets
Message-ID:  <20011112200013.C46767@greg.cex.ca>
In-Reply-To: <20011112191518.C81711@elvis.mu.org>; from billf@mu.org on Mon, Nov 12, 2001 at 07:15:18PM -0600
References:  <001201c16b82$4da9d1e0$9700a8c0@ezri> <20011112134317.A46767@greg.cex.ca> <20011112191518.C81711@elvis.mu.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon Nov 11/12/01, 2001 at 07:15:18PM -0600, Bill Fumerola wrote:
> On Mon, Nov 12, 2001 at 01:43:17PM -0800, Greg White wrote:
> 
> > 1. Remove the 'spoof' rules for RFC1918 addresses (temporarily).
> > 2. Get to a host on an outside network.
> > 3. On that host, "route add -net 192.168.0.0/24 ip.of.gate.way", where
> > the 192.168.0.0 matches your internal network, and 'ip.of.gate.way'
> > matches your host's external interface.
> > 4. Sit back and enjoy unfettered access to all those internal hosts.
> 
> no, if you actually tried this, you'd be sitting back and wondering why
> it doesn't work. continue reading.

Actually, I wouldn't have wondered. I might have been surprised (and
was, in fact surprised that two small ISPs I deal with are now doing the
right thing with this sort of packet. :) I'll admit, I had not tried this
'attack' in years... See below.

> 
> > 'Private' addresses are only private if all the routers on the internet
> > refuse to route them. Most do not. :(
> 
> incorrect, most do.
>
[snip routing lesson]
>
> 
> 
> OR
> 
> every router in-between is ({un,}willingly) participating in the attack.

When I first discovered the source routing 'attack', the problem of
accepting source routed packets was already well understood, but not
widely blocked. I was able to pass such an 'attack' in most cases
(about three years ago) on small ISP networks, and large incompetent
ones. The level of 'unwilling' participation was quite high. That level
has dropped to near-negligible now, apparently. Since it worked then,
and the problem was already well understood and all
current-best-practices explicitly contained workarounds or rules to
avoid them, I assumed incorrectly that most would never bother. :(
Any network I've ever bothered to work on has these rules in place, and
usually egress filters to prevent it outbound, so testing became
irrelevant and impractical. To me, those rules became like NetBIOS rules
on Windows networks, you just _know_ you need them. ;)

Live and learn.

-- 
Greg White

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011112200013.C46767>