SlideShare a Scribd company logo
1 of 48
Download to read offline
Preventing Traffic with
Spoofed Source IP Addresses
Presented by
Md. Abdullah Al Naser
Sr. Systems Specialist
MetroNet Bangladesh Ltd
Founder, mn-LAB
info@mn-lab.net
Network Operational Tutorial
Internet Routing Security
The routing system of the Internet is vulnerable to many
security threats such as:
Presented by – Md. Abdullah Al Naser Page # 2
Internet Routing Security
The routing system of the Internet is vulnerable to many
security threats such as:
Presented by – Md. Abdullah Al Naser Page # 3
Internet Routing Security
Prefix Hijacks
Presented by – Md. Abdullah Al Naser Page # 4
Internet Routing Security
Prefix Hijacks
Presented by – Md. Abdullah Al Naser Page # 5
Solution:
Inbound Prefix
Filtering
Internet Routing Security
Route Leaks
Presented by – Md. Abdullah Al Naser Page # 6
Internet Routing Security
Route Leaks
Presented by – Md. Abdullah Al Naser Page # 7
Internet Routing Security
Route Leaks
Presented by – Md. Abdullah Al Naser Page # 8
Solution:
Outbound Prefix
Filtering
Internet Routing Security
Control Plane vs Data Plane Security
Control Plane
● Prefix filtering can protect your BGP Table/control plane
● ROA/RPKI can also be used to protect control plane
Data Plane
● But what about if anyone sends packets with spoofed
source IP address?
● Source address validation should be there to deal with
that!!
Presented by – Md. Abdullah Al Naser Page # 9
Internet Routing Security
IP Address Spoofing
● IP source address spoofing is the practice of originating
IP datagrams with source addresses other than those
assigned to the host of origin
● Put simply, the host pretends to be some other host
● Normally when your router receives unicast IP packets
it only cares about one thing:
What is the destination IP address of this IP packet so
I can forward it?
Presented by – Md. Abdullah Al Naser Page # 10
Internet Routing Security
IP Address Spoofing
Presented by – Md. Abdullah Al Naser Page # 11
Internet Routing Security
IP Address Spoofing (Sample Attack)
Presented by – Md. Abdullah Al Naser Page # 12
Internet Routing Security
IP Address Spoofing Implications
Spoofing can be exploited in various ways, most notably
to execute a DDoS Reflection-Amplification attack
Presented by – Md. Abdullah Al Naser Page # 13
Internet Routing Security
IP Address Spoofing Implications
● DDoS Amplification is achieved by small queries
resulting in much larger responses
● Open DNS resolvers and NTP servers are commonly
used as reflectors/amplifiers
● IP Spoofing can be more destructive if a valid TCP
session is hijacked
Presented by – Md. Abdullah Al Naser Page # 14
Internet Routing Security
IP Address Spoofing Implications
● Significant DoS attacks are
costing Service Providers
● These costs hurt the brand,
damage customer operations,
and have collateral
operational/cost impact
on other customers
Presented by – Md. Abdullah Al Naser Page # 15
Spoofing Tools
Spoofing Tools
● nping (available in Zenmap and other tools)
● synner
● kali linux (popular to pen testers)
● even IP Spoofing can be done from Windows CMD
Presented by – Md. Abdullah Al Naser Page # 16
Anti-Spoofing
Anti-Spoofing
● Implementing anti-spoofing filtering to prevent packets
with incorrect source IP address from entering the
network
● DDoS Reflection-Amplification attacks would be
impossible without spoofing – however, they are
preventable
Presented by – Md. Abdullah Al Naser Page # 17
Anti-Spoofing
Anti-Spoofing Techniques
● Access Control Lists
● Dynamic Access Lists
● unicast Reverse Path Forwarding
Presented by – Md. Abdullah Al Naser Page # 18
Anti-Spoofing
Anti-Spoofing Considerations
● Identify points/devices in the network topology where
anti-spoofing measures should be applied
● Identify adequate techniques to be used (for example,
uRPF, or ACL filtering)
● Apply configuration commands
● Verify that the protection works, is permanent and is
kept up-to-date
Presented by – Md. Abdullah Al Naser Page # 19
Anti-Spoofing
Anti-Spoofing Techniques
To prevent source IP address spoofing, it's recommended
to implement Ingress Filtering methods which include:
ACL, uRPF etc
Presented by – Md. Abdullah Al Naser Page # 20
Anti-Spoofing
Anti-Spoofing Techniques - ACL
● ACLs are used to filter traffic at the router's interfaces
● ACLs are configured to allow specific address ranges
and deny all others
● ACLs are commonly deployed on the Provider Edge /
Customer Edge (PE / CE) boundary
● ACLs should be deployed on the downstream interfaces
of the ISP in order to verify the source addresses used
by its customers
Presented by – Md. Abdullah Al Naser Page # 21
Anti-Spoofing
Anti-Spoofing Techniques - ACL
Presented by – Md. Abdullah Al Naser Page # 22
Anti-Spoofing
Anti-Spoofing Techniques - ACL
ip access-list extended customer1-in-ipv4
permit ip 192.0.2.0 0.0.0.255 any
!
ipv6 access-list customer1-in-ipv6
permit ipv6 2001:db8:1001::/48 any
!
interface gi0/0
ip access-group customer1-in-ipv4 in
ipv6 traffic-filter customer1-in-ipv6 in
Presented by – Md. Abdullah Al Naser Page # 23
Anti-Spoofing
Anti-Spoofing Techniques - ACL
firewall {
family inet {
filter customer1-in-ipv4 {
term allowed-sources {
from {
source-address {
192.0.2.0/24;
}
}
then accept;
}
}
}
Presented by – Md. Abdullah Al Naser Page # 24
Anti-Spoofing
Anti-Spoofing Techniques - ACL
/ip firewall filter add action=drop chain=forward 
comment="spoofed from AS64501“
in-interface=$interface log-prefix="“
src-address=!192.0.2.0/24
/ipv6 firewall filter add action=drop chain=forward
comment="spoofed from AS64501“
in-interface=$interface log-prefix="“
src-address=!2001:db8:1001::/48
Presented by – Md. Abdullah Al Naser Page # 25
uRPF
Anti-Spoofing Techniques - uRPF
● uRPF is a security feature that prevents these spoofing
attacks. Whenever your router receives an IP packet it
will check if it has a matching entry in the routing table
for the source IP address. If it doesn’t match, the
packet will be discarded
● uRPF as defined in RFC 3704
● uRPF is often implemented on the edges of the networks
where customers, servers, and/or clients are connected
Presented by – Md. Abdullah Al Naser Page # 26
uRPF
Anti-Spoofing Techniques - uRPF
Presented by – Md. Abdullah Al Naser Page # 27
uRPF
Anti-Spoofing Techniques - uRPF
Presented by – Md. Abdullah Al Naser Page # 28
uRPF
Anti-Spoofing Techniques - uRPF
Presented by – Md. Abdullah Al Naser Page # 29
uRPF
There are four modes for uRPF:
● Loose Mode ● Strict Mode
● Feasible Mode ● VRF Mode
● For single-homed stub customers, it's recommended
that uRPF strict mode is implemented
● For dual-homed stub customers, it is best to use uRPF
feasible mode instead
Presented by – Md. Abdullah Al Naser Page # 30
uRPF
uRPF Strict Mode
In Strict mode router will perform two checks:
1. Do I have a matching entry for the source in
the routing table?
2. Do I use the same interface to reach this source as
where I received this packet on?
Presented by – Md. Abdullah Al Naser Page # 31
uRPF
uRPF Strict Mode
When the incoming IP packets passes both checks, it will be
permitted. Otherwise it will be dropped. This is perfectly fine
for IGP routing protocols since they use the shortest path to the
source of IP packets.
Presented by – Md. Abdullah Al Naser Page # 32
uRPF
uRPF Strict Mode
Presented by – Md. Abdullah Al Naser Page # 33
uRPF
uRPF Loose Mode
In Loose mode router will perform only single check:
1. Do I have a matching entry for the source in
the routing table?
Presented by – Md. Abdullah Al Naser Page # 34
uRPF
uRPF Loose Mode
When it passed this check, the packet is permitted. It doesn’t
matter if we use this interface to reach the source or not.
Loose mode is useful when you are connected to more than
one ISP and you use asymmetric routing.
Presented by – Md. Abdullah Al Naser Page # 35
uRPF
Additional Features
● Logging and Exemptions: uRPF allows the usage of an
access-list so you can decide what sources it should check
and if required, log the packets that are dropped using
access-list logging
● Self-pinging: Allow the router to ping itself using uRPF
strict mode on the interface
Presented by – Md. Abdullah Al Naser Page # 36
uRPF
Additional Features
● Default route: You can configure uRPF to check source
IP addresses against a default route. You can use this
when you want to accept all packets from your internet
connection while protecting yourself against spoofed
packets with source IP address from your internal
network
Presented by – Md. Abdullah Al Naser Page # 37
uRPF
Anti-Spoofing Techniques – uRPF
interface gi0/0
ip verify unicast reachable-via rx
ipv6 verify unicast reachable-via rx
Presented by – Md. Abdullah Al Naser Page # 38
uRPF
Anti-Spoofing Techniques – uRPF
family inet {
rpf-check;
}
family inet6 {
rpf-check;
}
Presented by – Md. Abdullah Al Naser Page # 39
uRPF
Anti-Spoofing Techniques – uRPF
/ip settings set rp-filter=strict
Presented by – Md. Abdullah Al Naser Page # 40
MANRS
Mutually Agreed Norms for Routing Security
● MANRS community is made up of
security-minded network operators
● MANRS care about routing security
● MANRS is prepared to spend resources
on routing security
● MANRS is prepared to be held
accountable by the community
Presented by – Md. Abdullah Al Naser Page # 41
www.manrs.org
MANRS
MANRS defines four concrete actions
Presented by – Md. Abdullah Al Naser Page # 42
MANRS
Global Validation
In order to facilitate validation of routing information on
a global scale, network operators must publish their
routing information so that other parties can validate it.
Presented by – Md. Abdullah Al Naser Page # 43
MANRS
Filtering
In order to prevent propagation of incorrect routing
information, network operators must ensure the
correctness of their own announcements, and
announcements from their customers to adjacent
networks with prefix and AS-path granularity.
Presented by – Md. Abdullah Al Naser Page # 44
MANRS
Anti-Spoofing
In order to prevent traffic with spoofed source IP
addresses, network operators must enable source address
validation for at least single-homed stub customer
networks, their own end-users, and infrastructure.
Presented by – Md. Abdullah Al Naser Page # 45
MANRS
Coordination
In order to facilitate global operational communication
and coordination between network operators, they must
maintain globally accessible, and up-to-date contact
information.
Presented by – Md. Abdullah Al Naser Page # 46
Acknowledgement
● Rene Molenaar
● MANRS
● Cisco Networking Academy
● MikroTik Wiki
Presented by – Md. Abdullah Al Naser Page # 47
Keep Internet Secure 
Thank You

More Related Content

What's hot

What's hot (20)

Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
Cours3 ospf-eigrp
Cours3 ospf-eigrpCours3 ospf-eigrp
Cours3 ospf-eigrp
 
SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
Eigrp new
Eigrp newEigrp new
Eigrp new
 
Vlan
Vlan Vlan
Vlan
 
OSPF
OSPF OSPF
OSPF
 
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
 
network performance measurement using Iperf
network performance measurement using Iperfnetwork performance measurement using Iperf
network performance measurement using Iperf
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
Dynamic Routing with FRR - pfSense Hangout December 2017
Dynamic Routing with FRR - pfSense Hangout December 2017Dynamic Routing with FRR - pfSense Hangout December 2017
Dynamic Routing with FRR - pfSense Hangout December 2017
 
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
 

Similar to Preventing Traffic with Spoofed Source IP address

Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
Hanaysha
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
All about routers
All about routersAll about routers
All about routers
agwanna
 
Switch and Router Security Testing
Switch and Router Security TestingSwitch and Router Security Testing
Switch and Router Security Testing
Conferencias FIST
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summary
moonmanik
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
PROIDEA
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
Marrion Kujinga
 

Similar to Preventing Traffic with Spoofed Source IP address (20)

Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
ARUBA - Remote Branch-networking-fundamentals-2014
ARUBA - Remote Branch-networking-fundamentals-2014ARUBA - Remote Branch-networking-fundamentals-2014
ARUBA - Remote Branch-networking-fundamentals-2014
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Peering Asia 2.0: Security in Peering
Peering Asia 2.0: Security in PeeringPeering Asia 2.0: Security in Peering
Peering Asia 2.0: Security in Peering
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
All about routers
All about routersAll about routers
All about routers
 
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian PasternackiPLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
PLNOG16: Bezpieczeństwo w sieci operatora, Sebastian Pasternacki
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
Switch and Router Security Testing
Switch and Router Security TestingSwitch and Router Security Testing
Switch and Router Security Testing
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summary
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 

More from Bangladesh Network Operators Group

More from Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 
Measuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create ValueMeasuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create Value
 

Recently uploaded

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 

Recently uploaded (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 

Preventing Traffic with Spoofed Source IP address

  • 1. Preventing Traffic with Spoofed Source IP Addresses Presented by Md. Abdullah Al Naser Sr. Systems Specialist MetroNet Bangladesh Ltd Founder, mn-LAB info@mn-lab.net Network Operational Tutorial
  • 2. Internet Routing Security The routing system of the Internet is vulnerable to many security threats such as: Presented by – Md. Abdullah Al Naser Page # 2
  • 3. Internet Routing Security The routing system of the Internet is vulnerable to many security threats such as: Presented by – Md. Abdullah Al Naser Page # 3
  • 4. Internet Routing Security Prefix Hijacks Presented by – Md. Abdullah Al Naser Page # 4
  • 5. Internet Routing Security Prefix Hijacks Presented by – Md. Abdullah Al Naser Page # 5 Solution: Inbound Prefix Filtering
  • 6. Internet Routing Security Route Leaks Presented by – Md. Abdullah Al Naser Page # 6
  • 7. Internet Routing Security Route Leaks Presented by – Md. Abdullah Al Naser Page # 7
  • 8. Internet Routing Security Route Leaks Presented by – Md. Abdullah Al Naser Page # 8 Solution: Outbound Prefix Filtering
  • 9. Internet Routing Security Control Plane vs Data Plane Security Control Plane ● Prefix filtering can protect your BGP Table/control plane ● ROA/RPKI can also be used to protect control plane Data Plane ● But what about if anyone sends packets with spoofed source IP address? ● Source address validation should be there to deal with that!! Presented by – Md. Abdullah Al Naser Page # 9
  • 10. Internet Routing Security IP Address Spoofing ● IP source address spoofing is the practice of originating IP datagrams with source addresses other than those assigned to the host of origin ● Put simply, the host pretends to be some other host ● Normally when your router receives unicast IP packets it only cares about one thing: What is the destination IP address of this IP packet so I can forward it? Presented by – Md. Abdullah Al Naser Page # 10
  • 11. Internet Routing Security IP Address Spoofing Presented by – Md. Abdullah Al Naser Page # 11
  • 12. Internet Routing Security IP Address Spoofing (Sample Attack) Presented by – Md. Abdullah Al Naser Page # 12
  • 13. Internet Routing Security IP Address Spoofing Implications Spoofing can be exploited in various ways, most notably to execute a DDoS Reflection-Amplification attack Presented by – Md. Abdullah Al Naser Page # 13
  • 14. Internet Routing Security IP Address Spoofing Implications ● DDoS Amplification is achieved by small queries resulting in much larger responses ● Open DNS resolvers and NTP servers are commonly used as reflectors/amplifiers ● IP Spoofing can be more destructive if a valid TCP session is hijacked Presented by – Md. Abdullah Al Naser Page # 14
  • 15. Internet Routing Security IP Address Spoofing Implications ● Significant DoS attacks are costing Service Providers ● These costs hurt the brand, damage customer operations, and have collateral operational/cost impact on other customers Presented by – Md. Abdullah Al Naser Page # 15
  • 16. Spoofing Tools Spoofing Tools ● nping (available in Zenmap and other tools) ● synner ● kali linux (popular to pen testers) ● even IP Spoofing can be done from Windows CMD Presented by – Md. Abdullah Al Naser Page # 16
  • 17. Anti-Spoofing Anti-Spoofing ● Implementing anti-spoofing filtering to prevent packets with incorrect source IP address from entering the network ● DDoS Reflection-Amplification attacks would be impossible without spoofing – however, they are preventable Presented by – Md. Abdullah Al Naser Page # 17
  • 18. Anti-Spoofing Anti-Spoofing Techniques ● Access Control Lists ● Dynamic Access Lists ● unicast Reverse Path Forwarding Presented by – Md. Abdullah Al Naser Page # 18
  • 19. Anti-Spoofing Anti-Spoofing Considerations ● Identify points/devices in the network topology where anti-spoofing measures should be applied ● Identify adequate techniques to be used (for example, uRPF, or ACL filtering) ● Apply configuration commands ● Verify that the protection works, is permanent and is kept up-to-date Presented by – Md. Abdullah Al Naser Page # 19
  • 20. Anti-Spoofing Anti-Spoofing Techniques To prevent source IP address spoofing, it's recommended to implement Ingress Filtering methods which include: ACL, uRPF etc Presented by – Md. Abdullah Al Naser Page # 20
  • 21. Anti-Spoofing Anti-Spoofing Techniques - ACL ● ACLs are used to filter traffic at the router's interfaces ● ACLs are configured to allow specific address ranges and deny all others ● ACLs are commonly deployed on the Provider Edge / Customer Edge (PE / CE) boundary ● ACLs should be deployed on the downstream interfaces of the ISP in order to verify the source addresses used by its customers Presented by – Md. Abdullah Al Naser Page # 21
  • 22. Anti-Spoofing Anti-Spoofing Techniques - ACL Presented by – Md. Abdullah Al Naser Page # 22
  • 23. Anti-Spoofing Anti-Spoofing Techniques - ACL ip access-list extended customer1-in-ipv4 permit ip 192.0.2.0 0.0.0.255 any ! ipv6 access-list customer1-in-ipv6 permit ipv6 2001:db8:1001::/48 any ! interface gi0/0 ip access-group customer1-in-ipv4 in ipv6 traffic-filter customer1-in-ipv6 in Presented by – Md. Abdullah Al Naser Page # 23
  • 24. Anti-Spoofing Anti-Spoofing Techniques - ACL firewall { family inet { filter customer1-in-ipv4 { term allowed-sources { from { source-address { 192.0.2.0/24; } } then accept; } } } Presented by – Md. Abdullah Al Naser Page # 24
  • 25. Anti-Spoofing Anti-Spoofing Techniques - ACL /ip firewall filter add action=drop chain=forward comment="spoofed from AS64501“ in-interface=$interface log-prefix="“ src-address=!192.0.2.0/24 /ipv6 firewall filter add action=drop chain=forward comment="spoofed from AS64501“ in-interface=$interface log-prefix="“ src-address=!2001:db8:1001::/48 Presented by – Md. Abdullah Al Naser Page # 25
  • 26. uRPF Anti-Spoofing Techniques - uRPF ● uRPF is a security feature that prevents these spoofing attacks. Whenever your router receives an IP packet it will check if it has a matching entry in the routing table for the source IP address. If it doesn’t match, the packet will be discarded ● uRPF as defined in RFC 3704 ● uRPF is often implemented on the edges of the networks where customers, servers, and/or clients are connected Presented by – Md. Abdullah Al Naser Page # 26
  • 27. uRPF Anti-Spoofing Techniques - uRPF Presented by – Md. Abdullah Al Naser Page # 27
  • 28. uRPF Anti-Spoofing Techniques - uRPF Presented by – Md. Abdullah Al Naser Page # 28
  • 29. uRPF Anti-Spoofing Techniques - uRPF Presented by – Md. Abdullah Al Naser Page # 29
  • 30. uRPF There are four modes for uRPF: ● Loose Mode ● Strict Mode ● Feasible Mode ● VRF Mode ● For single-homed stub customers, it's recommended that uRPF strict mode is implemented ● For dual-homed stub customers, it is best to use uRPF feasible mode instead Presented by – Md. Abdullah Al Naser Page # 30
  • 31. uRPF uRPF Strict Mode In Strict mode router will perform two checks: 1. Do I have a matching entry for the source in the routing table? 2. Do I use the same interface to reach this source as where I received this packet on? Presented by – Md. Abdullah Al Naser Page # 31
  • 32. uRPF uRPF Strict Mode When the incoming IP packets passes both checks, it will be permitted. Otherwise it will be dropped. This is perfectly fine for IGP routing protocols since they use the shortest path to the source of IP packets. Presented by – Md. Abdullah Al Naser Page # 32
  • 33. uRPF uRPF Strict Mode Presented by – Md. Abdullah Al Naser Page # 33
  • 34. uRPF uRPF Loose Mode In Loose mode router will perform only single check: 1. Do I have a matching entry for the source in the routing table? Presented by – Md. Abdullah Al Naser Page # 34
  • 35. uRPF uRPF Loose Mode When it passed this check, the packet is permitted. It doesn’t matter if we use this interface to reach the source or not. Loose mode is useful when you are connected to more than one ISP and you use asymmetric routing. Presented by – Md. Abdullah Al Naser Page # 35
  • 36. uRPF Additional Features ● Logging and Exemptions: uRPF allows the usage of an access-list so you can decide what sources it should check and if required, log the packets that are dropped using access-list logging ● Self-pinging: Allow the router to ping itself using uRPF strict mode on the interface Presented by – Md. Abdullah Al Naser Page # 36
  • 37. uRPF Additional Features ● Default route: You can configure uRPF to check source IP addresses against a default route. You can use this when you want to accept all packets from your internet connection while protecting yourself against spoofed packets with source IP address from your internal network Presented by – Md. Abdullah Al Naser Page # 37
  • 38. uRPF Anti-Spoofing Techniques – uRPF interface gi0/0 ip verify unicast reachable-via rx ipv6 verify unicast reachable-via rx Presented by – Md. Abdullah Al Naser Page # 38
  • 39. uRPF Anti-Spoofing Techniques – uRPF family inet { rpf-check; } family inet6 { rpf-check; } Presented by – Md. Abdullah Al Naser Page # 39
  • 40. uRPF Anti-Spoofing Techniques – uRPF /ip settings set rp-filter=strict Presented by – Md. Abdullah Al Naser Page # 40
  • 41. MANRS Mutually Agreed Norms for Routing Security ● MANRS community is made up of security-minded network operators ● MANRS care about routing security ● MANRS is prepared to spend resources on routing security ● MANRS is prepared to be held accountable by the community Presented by – Md. Abdullah Al Naser Page # 41 www.manrs.org
  • 42. MANRS MANRS defines four concrete actions Presented by – Md. Abdullah Al Naser Page # 42
  • 43. MANRS Global Validation In order to facilitate validation of routing information on a global scale, network operators must publish their routing information so that other parties can validate it. Presented by – Md. Abdullah Al Naser Page # 43
  • 44. MANRS Filtering In order to prevent propagation of incorrect routing information, network operators must ensure the correctness of their own announcements, and announcements from their customers to adjacent networks with prefix and AS-path granularity. Presented by – Md. Abdullah Al Naser Page # 44
  • 45. MANRS Anti-Spoofing In order to prevent traffic with spoofed source IP addresses, network operators must enable source address validation for at least single-homed stub customer networks, their own end-users, and infrastructure. Presented by – Md. Abdullah Al Naser Page # 45
  • 46. MANRS Coordination In order to facilitate global operational communication and coordination between network operators, they must maintain globally accessible, and up-to-date contact information. Presented by – Md. Abdullah Al Naser Page # 46
  • 47. Acknowledgement ● Rene Molenaar ● MANRS ● Cisco Networking Academy ● MikroTik Wiki Presented by – Md. Abdullah Al Naser Page # 47
  • 48. Keep Internet Secure  Thank You