Download presentation
Presentation is loading. Please wait.
Published byRudolf Grant Modified over 9 years ago
1
BCP-38 demo Alan Barrett Geert Jan de Groot & cast of thousands
2
Agenda BCP-38 DNS DDOS demo Build spoofed packet traffic generator –“be the bad-behaving customer” Configure the network to filter –“be the responsible ISP”
3
Basic network ClientDNS DNS request DNS response
4
Network diagram R PC Row A R PC Row B R PC Row C R PC Row J …. DNSVICTIM
5
Step 1: install and run software Download packet spoofing software Configure Run More details on next pages
6
1(a): Download packet spoofing software cd $HOME mkdir spoofing-demo; cd spoofing-demo ftp 196.200.222.1 –login as “anonymous” –cd /pub/e2/bcp38 –binary –mget * (enter “a” to get all files)
7
1(b): Configure From your PC, ping the IP address of your router: ping -c 1 ip.ad.re.ss Find out and write down the MAC address of your router: arp -an Edit spoof_script and change: –TABLE_ROW –ROUTER_MAC
8
1(c): Run the spoofer chmod 755 spoof_script tcpreplay Start the generator (as root):./spoof_script
9
Step 2: Observe spoofed packets and responses Instructors use “tcpdump” to capture traffic on backbone. Observe the spoofed packets, and responses to them.
10
Step 3: Enable unicast reverse-path filtering (URPF) Login to router Configure interface fastEthernet0/0 ip verify unicast reverse-path For all destinations that are routed outwards through this interface, incoming traffic in the opposite direction is allowed.
11
Step 4: See that it worked Observe that the tcpdump display stops showing spoofed packets show ip interface fastEthernet0/0 –Near the end, see “verification drops”
12
URPF variant for multi-homed customer ! access-list 42 will permit the routes ! that would otherwise fail the test ! (e.g. downlink through a different ISP) ip access-list 42 permit 192.0.2.0 0.0.0.255 interface fastEthernet0/0 ip verify unicast reverse-path 42
13
Another variant: Filtering using access-group ! access-list 123 permits all packets ! from the customer ip access-list 123 permit ip 192.0.2.0 0.0.0.255 0.0.0.0 255.255.255.255 interface fastEthernet0/0 ip access-group 123 in This is less efficient and more difficult to configure
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.