On Mon, 1 May 2006 12:50:04 -0700, "radish"
<[EMAIL PROTECTED]> said:
> 
> peter Wrote: 
> >  IP
> > filters are impenetrable without attackers having cracked his (or her)
> > ISP first and then it's not just you who's in trouble.
> 
> Could you explain this? I've seen you state it a few times in other
> threads, and I'm not sure I believe it. I'm not a security expert, but
> I play one on the weekends. 
> 
> For those who are interested, this page :
> http://www.securityfocus.com/infocus/1674 gives a nice overview of IP
> spoofing. Having some form of "control" of any specific ISP or network
> is certainly not a pre-requisite.

In practice all ISP routers have (or should very much have)
ingres/egress filtering. This means that incoming packets with an inside
source address and outgoing packets with an inside source address are
blocked omn the routers. This makes spoofing very hard on the attacker,
because the attacker should be able to transmit packets with a source
address outside of his own range (that's the point). So to be able to
send IP packet with a forged source address is already quite hard.

If you manage to do this anyway, you are able to send spoofed IP
packets, spoofed UDP packets to your victim. Just don't expect a reply,
because the reply packets will be returned to the spoofed address over
which you have no control unless you are able to reprogram the routers
on the way which is about as hard as getting on the ISP's 'lan'. It is
possible to use spoofed UDP packets to attack (trigger a buffer
overflow) because the UDP packets are passed on by the TCP stack to the
server software. A malformed UDP packet with a spoofed IP address could
be used to attack a DNS server via a buffer overflow.

As I see it, in the case of a connection oriented protocol like TCP
(which is what we're talking about here) it is impossible to gain access
to the application (slimserver) by just sending packets and ignoring the
replies. For the TCP connection to work the handshake must be completed.
AFAIK there's no way around this. Session hijacking as described in the
article is only possible when you're on the same subnet or somewhere in
the data path. Spoofed TCP setup packets are very popular in DOS attacks
of course, but they work without replies.

Then if (and I don't think that's possible) you get access to
slimserver, you'd have to be able to gain access to the system beyond
slimserver. This is usually done through buffer overflows, which, in the
case of a Perl application are rather unlikely IMO. Perl (as a language)
has dynamic memory allocation, so there'd have to be a bug in the Perl
runtime itself. It's possible I guess...

And of course, we'd need a hacker. One that not only knows you're
running slimserver but also knows on what port (ok, he could just try
all of them) and what IP addresses you have given access. And he'd need
a motive.

> What I would agree with, however, is that IP spoofing is hard, and to
> be quite honest the risk of someone taking the trouble to attack your
> slimserver is pretty remote. I'd still use a tunnel though, as I don't
> find them hard to setup and it's better to be safe than sorry.

I'd like to hear how a spoofing attack against a filtered router TCP
port could work, if you know of a way.

If you do, I'll be glad to open up a port on my router, supply you with
all the necessary info and wait for you to take over control of my
living room Squeezebox. I'll give a Squeezebox to the first person who
manages to do that ;)

Regards,
Peter
_______________________________________________
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to