The common term that has emerged is "spoof" rather than
"forge", and the short answer is that very few bits of the Internet
bother to apply any check to source IP addresses.  Almost 
anybody, almost anywhere, can generate packets that carry
your IP address as their source.  Naturally, a bunch of nasty
threats take advantage of this, either to hide their origin, or
to perform a "bounce" attack where innocent bystanders try
to send replies which all go to the real target of the attack,
often amounting to a DoS whose perpetrator is effectively
untraceable.

  What's harder, though, is to spoof a bidirectional (e.g. TCP)
connection.  In order for that to work, packets directed *to*
your IP address must pass somewhere where the attacker can 
see them.  (Depending on the technique used, they may or 
may not continue on to your real machine.)  Unless the attacker
is figuratively on your (or the remote machine's) doorstep, he
may need to compromise a routing table somewhere....

  >99% of Internet traffic flows over three protocols:  TCP, UDP,
and ICMP.  Since TCP requires a bidirectional connection,
most places don't worry too much about spoofing on it.  Good
border security, though, heavily restricts the ICMP and UDP traffic 
that is permitted.
  ISPs have been slow to implement egress filters that ensure
that the only traffic leaving their networks is traffic whose source
shows that it originated there.  Most large end-user organizations
probably do this, though.  (It's not as trivial for ISPs as it sounds.
Many also carry traffic for third parties, and would be in big trouble
if they accidentally blocked that....)

David Gillett


> -----Original Message-----
> From: Hanuska Ivo [mailto:[EMAIL PROTECTED]
> Sent: July 1, 2003 23:27
> To: [EMAIL PROTECTED]
> Subject: IP address forging
> 
> 
> I have question which does not make me sleep:
> 
> Is it possible to forge my IP address? Imagine situation that 
> I am connected with some sort of link (not Ethernet like 
> device, there is answer simple, just use ARP manipulation 
> methods) possibly by modem to Internet and I want to forge my 
> IP address (so I do want to pretend, that my IP address is 
> different that really is).
> 
> Is there somewhere some information about such a procedure 
> and how to protect my resources from connections from such 
> forged IP address?
> 
> Thank you all,
> 
> Ivo Hanuška
> 
> 
> --------------------------------------------------------------
> -------------
> Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by 
> top analysts!
> The Gartner Group just put Neoteris in the top of its Magic Quadrant,
> while InStat has confirmed Neoteris as the leader in marketshare.
>      
> Find out why, and see how you can get plug-n-play secure 
> remote access in
> about an hour, with no client, server changes, or ongoing maintenance.
>           
> Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
> --------------------------------------------------------------
> --------------
> 

---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------

Reply via email to