[LUGOS] Pipin Odprti Termin: Nekaj vzorcnih primerov z mize varnostnega centra SI-CERT

Jernej Horvat j+lugos at aufbix.org
Mon Apr 10 13:18:51 CEST 2006


Morda vas bo zanimalo tudi to:

> From: Daniel Karrenberg <daniel.karrenberg at ripe.net>
> To: RIPE Mailing List <ripe-list at ripe.net>
> Subject: Proposal for a RIPE "IP Spoofing" Task Force
> List-Id: General announcements / discussions about RIPE <ripe-list.ripe.net>

> Dear colleagues,
> 
> unfortunately DoS amplification attacks are still with us.  There are
> indications that the damage caused by such attacks is increasing;
> certainly their visibility has increased recently.  The only way to
> effectively stop amplification attacks is to prevent IP source address
> spoofing.  Without spoofing there is no amplification and no obfuscation
> of the real source of DoS attack traffic.  RIPE needs to encourage
> operators to prevent IP source address spoofing.  Hence I propose to
> establish an "IP Spoofing" task force. 
> 
> I include a document outlining the motivation for the task force, a
> proposed charter and a proposed time-line; it also has a refeerence list
> that can be used to as a starting point to learn more. 
> 
> In order to collect suggestions and gather people working on the task
> force, I propose a BoF session at RIPE-52.  Tuesday around 17:15 after
> the plenary and before the social is a good time.  If you are interested
> I will see you there.  If you would like to help but you will not be in
> Istanbul, please contact me off-list with specifics of what you can
> contribute.  I am specifically looking for people from equipment vendors
> who can provide how-to documents and network operators who can relate
> deployment experiences. 
> 
> Daniel

> 
> Proposal for a RIPE "IP Spoofing" Task Force
> ============================================
> 
> Daniel Karrenberg
> 
> <daniel.karrenberg at ripe.net>
> 
> 1.0
> 
> Thu Apr  6 16:04:35 CEST 2006
> 
> 
> 
> Introduction
> ------------
> 
> IP source address spoofing is the practice of originating IP datagrams
> with source addresses other than those assigned to the host of origin. 
> In simple words the host pretends to be some other host. 
> 
> This can be exploited in various ways, most notably to execute DoS
> amplification attacks which cause an amplifier host to send traffic to
> the spoofed address. 
> 
> There are many recommendations to prevent IP spoofing by ingress
> filtering, e.g.  checking source addresses of IP datagrams close to the
> network edge. 
> 
> Most equipment vendors support ingress filtering in some form. 
> 
> Yet recently significant DoS amplification attacks have happened which
> would be impossible without spoofing. 
> 
> This demonstrates that ingress filtering is definitely not deployed
> sufficiently.  Unfortunately there are no direct benefits to an ISP that
> deploys ingress filtering.  Also there is a widely held belief that
> ingress filtering only helps when it is universally deployed. 
> 
> RIPE as an operational forum should promote deployment of ingress
> filtering at the network edge by creating a task force that raises
> awareness and provides indirect incentives for deployment. 
> 
> 
> 
> Proposed Charter
> ----------------
> 
> This task force shall 
> 
>    - raise awareness about this issue among network operators,
> 
>    - inform about operational methods to implement ingress filtering,
> 
>    and 
> 
>    - seek ways to provide incentives and benefits to operators 
>      that do implement ingress filtering.
> 
> 
> The taskforce shall have completed its task when 
> 
>    - network operators cannot reasonably claim not to be aware of the issue,
> 
>    - information about ways to deploy ingress filtering are readily available 
> 
>    and
> 
>    - and any incentives it may have devised have become available.
> 
> 
> The task force shall be disbanded when these tasks have been completed 
> or when there is consensus withing RIPE that completion of the tasks 
> is no longer realistic.
> 
> 
> 
> Suggested Time-Line 
> -------------------
> 
> RIPE-52: BoF and Establishment of Task Force
> 
> Quickly draft and publish RIPE recommendation citing existing work.
> Compile How-To with (pointers to) vendor documentation and operational
> experience reports.
> Establish liaison with MIT ANA Spoofer Project, promote their tools.
> Analyse Spoofer data for RIPE region.
> 
> 
> RIPE-53: Published RIPE Recommendation on Ingress Filtering
>          Published First Edition of "Ingress Filtering How-To"
>          First analysis of Spoofer data.
>          Discuss possible incentive schemes.
> 
> Revise and extend How-To.
> Devise possible incentive schemes like a "Source Address Clean" 
> network logo, suitable RIPE DB attributes ...
> 
> 
> RIPE-54: Published Second Edition of "IP Source Address Filtering How-To"
>          Further analysis of Spoofer data for RIPE region.
>          Launch of any incentive scheme.
> 
> Implement incentive scheme.
> Monitor progress and effectiveness.
> 
> 
> RIPE-55: Evaluation and Disbanding of Task Force
> 
> 
> 
> References
> ----------
> 
> RFC2827 
> Network Ingress Filtering: 
> Defeating Denial of Service Attacks which employ IP Source Address Spoofing
> http://www.ietf.org/rfc/rfc2827.txt
> 
> SSAC004
> Securing the Edge
> http://www.icann.org/committees/security/sac004.txt
> 
> SSAC008
> DNS Distributed Denial of Service (DDoS) Attacks 
> http://www.icann.org/committees/security/dns-ddos-advisory-31mar06.pdf
> 
> ripe-66
> RIPE Task Forces
> ftp://ftp.ripe.net/ripe/docs/ripe-066.txt
> 
> MIT Spoofer Project
> http://spoofer.csail.mit.edu/


More information about the lugos-list mailing list