Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.

Similar presentations


Presentation on theme: "1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses."— Presentation transcript:

1 1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses

2 2 Outline Introduction IP Spoofing Attacks IP Spoofing Defenses Concluding Remarks

3 3 Introduction

4 4 Protocol Stacks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer OSI Model 802.3802.11others IP TCP UDP HTTPSNMP

5 5 Protocol Stacks 802.3802.11others IP TCP UDP HTTPSNMP

6 6 Data Transmissions Data link/physical IP TCP UDP Application IP TCP UDP data TCP header IP header data TCP header data TCP header IP header data TCP header data AB routing Data link/physical Application

7 7 IP Header

8 8 TCP Header

9 9 Security Services Entity Authentication What do you know What do you have What do you inherit Integrity Message authentication Confidentiality Encryption …

10 10 IP Spoofing Attacks

11 11 IP Spoofing Attacks IP Spoofing DoS by Ping TCP Sync Flooding Session Hijacking

12 12 IP Spoofing A 10.10.10.1 www.carleton.ca 134.117.1.60 http://www.carleton.ca 10.10.10.1 Src_IP 134.117.1.60 dst_IP Any (>1024) Src_port 80 dst_port 11.11.11.1 Src_IP 134.117.1.60 dst_IP Any (>1024) Src_port 80 dst_port spoofing

13 13 IP Spoofing Attacks Smurf IP DoS A T1T1 T2T2 T3T3 TnTn 192.168.1.0 ICMP Echo Request Dest: 192.168.1.255 Source: V V ICMP Echo Reply Source: T1; Dest V

14 14 Mail Address Spoofing Attacks Mail-bombs A Sears Canadian Tire Bell Canada Catalog Request Return Addr: V V Boston Pizza Phonebook Request Return Addr: V Pizza orders Return Addr: V

15 15 IP Spoofing Attacks TCP 3 Way Handshake AB TCP SYN TCP SYN+ACK TCP ACK Half-open buffer Open buffer A A Half-open buffer has limited size Half-open connection has a timer associated with

16 16 IP Spoofing Attacks TCP Sync Flooding (DDos) A V BC D E FGH J I TCP SYN TCP SYN/ACK A B C D E Half-open buffer is full

17 17 IP Spoofing Defenses

18 18 IP Spoofing Defenses It is a VERY hard problem Ingress/Egress Filtering IP Authentication (IPsec AH) Cryptographic Generated Address (CGA)

19 19 IP Spoofing Defenses Ingress/Egress Filtering 10.10.10.0 10.10.0.0 if src_addr is from 10.10.10.0 then forward else drop if src_addr is from 10.10.0.0 then forward else drop if src_addr is from 10.10.0.0 then drop else forward

20 20 IP Spoofing Defenses IPSec (???) Two Protocols Authentication Header (AH) Encapsulating Security Payload Two Modes Transport Mode Tunnel Mode

21 21 IP Spoofing Defenses IP Authentication Header (AH) IP Header Payload IP Header Payload AH Header Original IP Packet New IP Packet AH in Transport Mode

22 22 IP Spoofing Defenses IP Authentication Header (AH) IP Header Payload New IP Header AH Header IP Header Payload New Payload Original IP Packet New IP Packet AH in Tunnel Mode

23 23 IP Spoofing Defenses IPSec (???) Data Origin Authentication IP address is not modified en route Is it a real or spoofed IP ?? Message Integrity Replay Prevention

24 24 IP Spoofing Defenses Cryptographic Generated Address (CGA) IPv6 MD5 64-bit Routing prefix Public KeyNonceDigital Signature 128-bit IPv6 addr Sent within IPv6 hdr

25 25 IP Spoofing Defenses Cryptographic Generated Address (CGA) IPv6 How about IPv4 Does everyone have a pair of private/public keys (authenticated)? DoS by engaging a recipient into a endless process of verifying CGAs

26 26 Concluding Remarks IP spoofing is a common technique for attacks There is not too much we can do about it

27 27 Thanks !


Download ppt "1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses."

Similar presentations


Ads by Google