Presentation is loading. Please wait.

Presentation is loading. Please wait.

BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands.

Similar presentations


Presentation on theme: "BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands."— Presentation transcript:

1 BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands

2 Agenda BCP-38 DNS DDOS demo Build spoofed packet traffic generator –“be the bad-behaving customer” Configure the network to filter –“be the responsible ISP”

3 Basic network ClientDNS DNS request DNS response

4 Network diagram R PC Row A R PC Row B R PC Row C R PC Row J …. DNSVICTIM

5 Step 1: install and run software Download packet spoofing software Configure Run More details on next pages

6 1(a): Download packet spoofing software cd $HOME mkdir spoofing-demo; cd spoofing-demo ftp 196.200.222.1 –login as “anonymous” –cd /pub/e2/bcp38 –binary –mget * (enter “a” to get all files)

7 1(b): Configure From your PC, ping the IP address of your router: ping -c 1 ip.ad.re.ss Find out and write down the MAC address of your router: arp -an Edit spoof_script and change: –TABLE_ROW –ROUTER_MAC

8 1(c): Run the spoofer chmod 755 spoof_script tcpreplay Start the generator (as root):./spoof_script

9 Step 2: Observe spoofed packets and responses Instructors use “tcpdump” to capture traffic on backbone. Observe the spoofed packets, and responses to them.

10 Step 3: Enable unicast reverse-path filtering (URPF) Login to router Configure interface fastEthernet0/0 ip verify unicast reverse-path For all destinations that are routed outwards through this interface, incoming traffic in the opposite direction is allowed.

11 Step 4: See that it worked Observe that the tcpdump display stops showing spoofed packets show ip interface fastEthernet0/0 –Near the end, see “verification drops”

12 URPF variant for multi-homed customer ! access-list 42 will permit the routes ! that would otherwise fail the test ! (e.g. downlink through a different ISP) ip access-list 42 permit 192.0.2.0 0.0.0.255 interface fastEthernet0/0 ip verify unicast reverse-path 42

13 Another variant: Filtering using access-group ! access-list 123 permits all packets ! from the customer ip access-list 123 permit ip 192.0.2.0 0.0.0.255 0.0.0.0 255.255.255.255 interface fastEthernet0/0 ip access-group 123 in This is less efficient and more difficult to configure


Download ppt "BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands."

Similar presentations


Ads by Google