just to add my $0.02. The best they could hope for would be disallowing your
default gateway from connecting to your ssh server... whoop-de-doo.

On 9/23/05, Wolfgang S. Rupprecht <
[EMAIL PROTECTED]> wrote:
>
> <[EMAIL PROTECTED]> writes:
> > My only question is what if I traceroute to you, find out the IP number
> of your upstream router? Then I make a bunch of connection attempts to your
> IP but forge the packets to make them look like they came from your
> upstream. Don't *you* end up blacklisting your default route and you become
> 'so long suckah'd?
>
> This isn't a problem for 2 reasons.
>
> 1) The upstream router isn't likely to be the destination of any
> packet in a consumer-isp situation. Only if you are running some
> routing protocol that uses that upstream router as an endpoint
> (eg. rip, ospf, etc) will a block against that router's IP matter
> to you.
>
> I've heard of cases where folks intentionally add an IP-level block
> against their ISP's whole infrastructure. (Some ISP's don't allow
> any "servers". If they find an sshd hanging on port 22 are they
> going to hassle you? Just block 'em.)
>
> 2) Forging the source IP in a TCP packet and succeeding in negotiating
> the 3-way handshake isn't all that simple any more. I wouldn't
> worry about it. If someone could forge that reliably, there is
> much better game to go after (like breaking into machines that
> still use IP addresses for authorization.) Someone spoofing an IP
> so that you mistakenly block an innocent party is pretty much
> wasting a good trick.
>
> -wolfgang

Reply via email to