<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic &amp;quot;Not routable&amp;quot; means that a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013152#M135527</link>
    <description>&lt;P&gt;"Not routable" means that a private IP as the destination address will never find the way to the right destination. To make it more difficult, this is not true for&amp;nbsp;the ISP that connects your network. That ISP always can route&amp;nbsp;a private ip-range&amp;nbsp;to your network.&lt;/P&gt;
&lt;P&gt;For private IPs as the&amp;nbsp;source address, countermeasures like URPF are available. But these have to be configured as they are not default on all devices. And reality shows that it's not always the case.&lt;/P&gt;</description>
    <pubDate>Thu, 18 May 2017 06:03:50 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2017-05-18T06:03:50Z</dc:date>
    <item>
      <title>How an attacker spoof the source ip address</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013148#M135523</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IP address spoofing can be defined as the intentional misrepresentation of the source IP address in an IP packet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My question here is that, If an attacker is spoofing an address that belongs to an organizations Private ip segment, then how the packet will travel over the internet if the header contains Private ip address. Or is that an attacker spoof only a public ip address that belongs to an organizations server which has a public ip ??? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rajesh&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013148#M135523</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2019-03-12T09:22:21Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013149#M135524</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Although routing at ISP level is based on destination IPs only, most of them have basic measures to block spoofing such as denying traffic from source addresses in the RFC1918.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some of them go advanced but this is the minimum. So in short, providers will drop packets will private source IPs.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 05:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013149#M135524</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-05-16T05:34:29Z</dc:date>
    </item>
    <item>
      <title>In a perfect word I would</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013150#M135525</link>
      <description>&lt;P&gt;In a perfect word I would agree, but it seems that at least some ISPs don't follow these best practices. Many of my routers show ACL-hits like the following:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt; 10 deny ip 0.0.0.0 0.255.255.255 any&lt;BR /&gt; 20 deny ip 10.0.0.0 0.255.255.255 any (259 matches)&lt;BR /&gt; 30 deny ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt; 40 deny ip 169.254.0.0 0.0.255.255 any&lt;BR /&gt; 50 deny ip 172.16.0.0 0.15.255.255 any (39 matches)&lt;BR /&gt; 60 deny ip 192.0.2.0 0.0.0.255 any&lt;BR /&gt; 70 deny ip 192.168.0.0 0.0.255.255 any (1484 matches)&lt;BR /&gt; 80 deny ip 198.18.0.0 0.1.255.255 any (1 match)&lt;BR /&gt; 90 deny ip 198.51.100.0 0.0.0.255 any&lt;BR /&gt; 100 deny ip 203.0.113.0 0.0.0.255 any&lt;BR /&gt; 110 deny ip 224.0.0.0 31.255.255.255 any&lt;/PRE&gt;
&lt;P&gt;I'm pretty confident that these are not attacks that involve address-spoofing. That are just misconfigured NATs somewhere on the internet combined with the providers without proper ingress filtering.&lt;/P&gt;
&lt;P&gt;Back to original topic. There are two reasons that addresses are spoofed:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The attacker wants to look like an authorized source to start some activity on the destination system. I would consider this problem solved as at least on the internet it is very hard to achieve. But on the local LAN it is much easier.&lt;/LI&gt;
&lt;LI&gt;The attacker tries to hide his activity as it's done&amp;nbsp;in an (D)DOS attack. Here it&amp;nbsp;is quite common to spoof the source addresses and recent activities show that it's still easy to achieve that. &lt;A href="https://tools.ietf.org/html/bcp38"&gt;BCP38&lt;/A&gt; is one of the documents that&amp;nbsp;more ISPs have to read ...&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 16 May 2017 08:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013150#M135525</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-05-16T08:13:01Z</dc:date>
    </item>
    <item>
      <title>Dear All,</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013151#M135526</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;As per my Understanding any attacker from outside world cant change their source ip to Private ip address as it is not routable.. Hence they will find out any NATed server in any organization and will assign that NAT Public ip as Source and will try to do Dos attack and Spoof.. Please correct me if i am right... I am thinking from Attacker's point of view. Im sure that most of the firewalls will block such traffic by ip verify urf and antispoofing in ASA and checkpoint respectively.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Rajesh P&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 05:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013151#M135526</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2017-05-18T05:23:30Z</dc:date>
    </item>
    <item>
      <title>"Not routable" means that a</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013152#M135527</link>
      <description>&lt;P&gt;"Not routable" means that a private IP as the destination address will never find the way to the right destination. To make it more difficult, this is not true for&amp;nbsp;the ISP that connects your network. That ISP always can route&amp;nbsp;a private ip-range&amp;nbsp;to your network.&lt;/P&gt;
&lt;P&gt;For private IPs as the&amp;nbsp;source address, countermeasures like URPF are available. But these have to be configured as they are not default on all devices. And reality shows that it's not always the case.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 06:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013152#M135527</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-05-18T06:03:50Z</dc:date>
    </item>
    <item>
      <title>I still wonder how ISP will</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013153#M135528</link>
      <description>&lt;P&gt;I still wonder how ISP will send a packet when its source ip is Private&lt;/P&gt;
&lt;P&gt;(&lt;SPAN&gt;That ISP always can route&amp;nbsp;a private ip-range&amp;nbsp;to your network)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To travel thru internet your ip should be public right&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;im concerned about only source ip.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 06:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013153#M135528</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2017-05-18T06:12:02Z</dc:date>
    </item>
    <item>
      <title>Without any special</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013154#M135529</link>
      <description>&lt;P&gt;Without any special countermeasures, a routing device will not even look at the source address and it doesn't matter if it's a private IP, the right public IP or an IP that is assigned to someone else. The router just won't care about it.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 07:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013154#M135529</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-05-18T07:18:14Z</dc:date>
    </item>
    <item>
      <title>An user or attacker when it</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013155#M135530</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;An user or attacker when it has to reach a destination server, will always have public ip as source (either by modem or router or firewall will do nat) and destination as public.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As per my knowledge if any of these fields are Private, then it will never reach the destination.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If any source ip is private and it reaches the public without nat, then what is the use of PAT/Hide NAT concepts ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;More over as you said, ISP will look into only destination and not the source address&amp;nbsp;to pass the traffic to internet, then you are indirectly saying that ISP is going to do a NAT on the source ip. ? If its going to do a NAT, then again the source ip will be changed to another public ip and Spoofing attack needs the same ip address to be shown as a Servers address (either public or private), then only after reaching the firewall it will detect as a spoofed ip address and will block it if configure properly. Else the firewall will send sync ack to the Server thinking that this is the server who has sent a syn request and finally land up in DOS attack&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sorry to say that i am still not clear on what you have said earlier.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 13:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013155#M135530</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2017-05-18T13:58:41Z</dc:date>
    </item>
    <item>
      <title>You are incorrect in your</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013156#M135531</link>
      <description>&lt;P&gt;You are incorrect in your assumption that both IPs need to be public for the packet to reach it's destination.&lt;/P&gt;
&lt;P&gt;Using your example of a server across the internet the destination IP needs to be public but the source IP does not because routers usually&amp;nbsp;don't care about source IPs.&lt;/P&gt;
&lt;P&gt;You ask what is the purpose of PAT, that is so the return traffic can be routed back to the source IP.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 14:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013156#M135531</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-18T14:33:33Z</dc:date>
    </item>
    <item>
      <title>Agreed for the point that</title>
      <link>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013157#M135532</link>
      <description>&lt;P&gt;Agreed for the point that Return traffic is not sent Unless NAT. So Spoof is possible&lt;/P&gt;
&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; a lot&lt;/P&gt;
&lt;P&gt;Is there any tool available which can convert my ip to private while sending packet out.&amp;nbsp;kali linux ?&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 05:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-an-attacker-spoof-the-source-ip-address/m-p/3013157#M135532</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2017-05-19T05:36:55Z</dc:date>
    </item>
  </channel>
</rss>

