BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Static Routing Exercise. What will the exercise involve?  Unix network interface configuration  Cisco network interface configuration  Static routes.
Basic IP Traffic Management with Access Lists
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Chapter 13: Troubleshooting network connectivity Unit objectives Identify TCP/IP troubleshooting tools Discuss the Telnet utility and its functions Discuss.
Standard, Extended and Named ACL.  In this lesson, you will learn: ◦ Purpose of ACLs  Its application to an enterprise network ◦ How ACLs are used to.
Network Analyzer Example
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Assessing Path Control Network Performance Issues.
CPIT 470 Lab 2 Lab Instructor: Aisha Ehsan.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Module 1: Reviewing the Suite of TCP/IP Protocols.
CISCO NETWORKING ACADEMY Chabot College ELEC Access Control Lists - Introduction.
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
ARP Scenarios CIS 81 and CST 311 Rick Graziani Fall 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
CCNA2 v3 Module 4 v3 CCNA 2 Module 4 JEOPARDY K. Martin.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
1 How to Enable IPv6 in Your Subnet Quincy Wu March 10, 2004.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Access Control Lists (ACLs)
Networking Colin Alworth May 26, Quick Review IP address: four octets Broadcast addresses –IP addresses use all 1’s for the host bits, and whatever.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
CISCO NETWORKING ACADEMY Chabot College ELEC Extended Access Control Lists.
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Access Control Lists Accessing the WAN – Chapter 5.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Hands On Networking IPv4 Routing Veena S (MCA Dept) Shruti Kadam, MCA Dept Arpita Kulkarni, MCA Dept June 28, 2012.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
N ETWORKING L AB. A CCESS TO C OMMAND P ROMPT PC: Start Button > search bar > type cmd Or Start Button > accessories folder > Command Prompt MAC: Applications.
Restricting Access in the network
Sniffer, tcpdump, Ethereal, ntop
ACCESS CONTROL LIST.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Jose Luis Flores / Amel Walkinshaw
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
Access Control Lists (ACL). Access-List Overview 4 A Filter through which all traffic must pass 4 Used to Permit or Deny Access to Network 4 Provides.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
In 60 Days – ICND2 Access Lists Traffic Cops Decides what can pass through router Set of YES/NO filters Have several uses…
In 60 Days – ICND2 Configuring Access Lists Standard IP ACLs Source network or Source host IP Source: Destination: Port 80.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
MAC Address Tables on Connected Switches
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Filtering Spoofed Packets
IP Network Layer and Ethernet Encapsulation
Access Control Lists CCNA 2 v3 – Module 11
Chapter 2: Static Routing
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Firewalls Jiang Long Spring 2002.
Presentation transcript:

BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands

Agenda BCP-38 DNS DDOS demo Build spoofed packet traffic generator –“be the bad-behaving customer” Configure the network to filter –“be the responsible ISP”

Basic network ClientDNS DNS request DNS response

Network diagram R PC Row A R PC Row B R PC Row C R PC Row J …. DNSVICTIM

Step 1: install and run software Download packet spoofing software Configure Run More details on next pages

1(a): Download packet spoofing software cd $HOME mkdir spoofing-demo; cd spoofing-demo ftp –login as “anonymous” –cd /pub/e2/bcp38 –binary –mget * (enter “a” to get all files)

1(b): Configure From your PC, ping the IP address of your router: ping -c 1 ip.ad.re.ss Find out and write down the MAC address of your router: arp -an Edit spoof_script and change: –TABLE_ROW –ROUTER_MAC

1(c): Run the spoofer chmod 755 spoof_script tcpreplay Start the generator (as root):./spoof_script

Step 2: Observe spoofed packets and responses Instructors use “tcpdump” to capture traffic on backbone. Observe the spoofed packets, and responses to them.

Step 3: Enable unicast reverse-path filtering (URPF) Login to router Configure interface fastEthernet0/0 ip verify unicast reverse-path For all destinations that are routed outwards through this interface, incoming traffic in the opposite direction is allowed.

Step 4: See that it worked Observe that the tcpdump display stops showing spoofed packets show ip interface fastEthernet0/0 –Near the end, see “verification drops”

URPF variant for multi-homed customer ! access-list 42 will permit the routes ! that would otherwise fail the test ! (e.g. downlink through a different ISP) ip access-list 42 permit interface fastEthernet0/0 ip verify unicast reverse-path 42

Another variant: Filtering using access-group ! access-list 123 permits all packets ! from the customer ip access-list 123 permit ip interface fastEthernet0/0 ip access-group 123 in This is less efficient and more difficult to configure