[50779] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

[lamour@mail.argfrp.us.uu.net: Fwd: Re: If you have nothing to hide]

daemon@ATHENA.MIT.EDU (Todd MacDermid)
Thu Aug 8 18:19:31 2002

Date: Thu, 8 Aug 2002 18:14:22 -0400
From: Todd MacDermid <tmacd@synacklabs.net>
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu


In message <20020805225221.82473.qmail@sidehack.sat.gweep.net>, bdragon@gweep.n
et writes:
>
>I was not aware that responses to source-routed packets were themselves
>source-routed. I also don't believe it is the case, but am open to being
>contradicted. If the responses aren't source-routed, then the packets would
>only return through your network if your network was the path back to the
>spoofed source.

A friend of mine directed me to this thread. Source routed packets
can indeed be used to spoof IP connections, and I've written a tool
to do it. It's available at http://www.synacklabs.net/projects/lsrtunnel

If you simply want to check host behaviour to see if you can spoof
connections, I've written a scanner at
http://www.synacklabs.net/projects/lsrscan

Short story is Solaris < 8 will reverse source routes by default, and
Windows boxes will reverse source routes by default. The BSDs and
Linuces I've tested mostly block source routed packets by default.

Todd


home help back first fref pref prev next nref lref last post