Top Banner
Preventing Traffic with Spoofed Source IP Addresses in MikroTik Presented by Md. Abdullah Al Naser Sr. Systems Specialist MetroNet Bangladesh Ltd Founder, mn-LAB [email protected]
74

Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Jun 30, 2018

Download

Documents

dinhhuong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Preventing Traffic withSpoofed Source IP Addresses

in MikroTik

Presented by

Md. Abdullah Al NaserSr. Systems Specialist

MetroNet Bangladesh LtdFounder, mn-LAB

[email protected]

Page 2: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

The routing system of the Internet is vulnerable to many security threats such as:

Presented by – Md. Abdullah Al Naser Page # 2

Page 3: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

The routing system of the Internet is vulnerable to many security threats such as:

Presented by – Md. Abdullah Al Naser Page # 3

Page 4: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 4

Page 5: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 5

Page 6: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 6

Page 7: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 7

Page 8: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 8

Page 9: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 9

Page 10: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 10

Page 11: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 11

Page 12: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 12

Page 13: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 13

Page 14: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 14

Page 15: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 15

Page 16: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 16

Page 17: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 17

Page 18: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 18

Page 19: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 19

Solution:Inbound PrefixFiltering

Page 20: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Prefix Hijacks

Presented by – Md. Abdullah Al Naser Page # 20

Solution:Inbound PrefixFiltering

Page 21: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 21

Page 22: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 22

Page 23: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 23

Page 24: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 24

Page 25: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 25

Page 26: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 26

Page 27: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 27

Page 28: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 28

Page 29: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 29

Page 30: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 30

Page 31: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 31

Page 32: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 32

Page 33: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 33

Page 34: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 34

Solution:Outbound PrefixFiltering

Page 35: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Route Leaks

Presented by – Md. Abdullah Al Naser Page # 35

Solution:Outbound PrefixFiltering

Page 36: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

Control Plane vs Data Plane Security

Control Plane

● Prefix filtering can protect your BGP Table/control plane

● ROA/RPKI can also be used to protect control plane

Data Plane

● But what about if anyone sends packets with spoofed

source IP address?

● Source address validation should be there to deal with

that!!

Presented by – Md. Abdullah Al Naser Page # 36

Page 37: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing

● IP source address spoofing is the practice of originating

IP datagrams with source addresses other than those

assigned to the host of origin

● Put simply, the host pretends to be some other host

● Normally when your router receives unicast IP packets

it only cares about one thing:

What is the destination IP address of this IP packet so I can forward it?

Presented by – Md. Abdullah Al Naser Page # 37

Page 38: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing

Presented by – Md. Abdullah Al Naser Page # 38

Page 39: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing

Presented by – Md. Abdullah Al Naser Page # 39

Page 40: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing (Sample Attack)

Presented by – Md. Abdullah Al Naser Page # 40

Page 41: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing (Sample Attack)

Presented by – Md. Abdullah Al Naser Page # 41

Page 42: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing (Sample Attack)

Presented by – Md. Abdullah Al Naser Page # 42

Page 43: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing (Sample Attack)

Presented by – Md. Abdullah Al Naser Page # 43

Page 44: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

Spoofing can be exploited in various ways, most notably to execute a DDoS Reflection-Amplification attack

Presented by – Md. Abdullah Al Naser Page # 44

Page 45: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

Spoofing can be exploited in various ways, most notably to execute a DDoS Reflection-Amplification attack

Presented by – Md. Abdullah Al Naser Page # 45

Page 46: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

Spoofing can be exploited in various ways, most notably to execute a DDoS Reflection-Amplification attack

Presented by – Md. Abdullah Al Naser Page # 46

Page 47: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

Spoofing can be exploited in various ways, most notably to execute a DDoS Reflection-Amplification attack

Presented by – Md. Abdullah Al Naser Page # 47

Page 48: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

● DDoS Amplification is achieved by small queries

resulting in much larger responses

● Open DNS resolvers, NTP servers and Memcache

are commonly used as reflectors/amplifiers

● IP Spoofing can be more destructive if a valid TCP

session is hijacked

Presented by – Md. Abdullah Al Naser Page # 48

Page 49: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Internet Routing Security

IP Address Spoofing Implications

● Significant DoS attacks are

costing Service Providers

● These costs hurt the brand,

damage customer operations,

and have collateral

operational/cost impact

on other customers

Presented by – Md. Abdullah Al Naser Page # 49

Page 50: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Spoofing Tools

Spoofing Tools

● nping (available in Zenmap and other tools)

● synner

● kali linux (popular to pen testers)

● even IP Spoofing can be done from Windows CMD

Presented by – Md. Abdullah Al Naser Page # 50

Page 51: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing

● DDoS Reflection-Amplification attacks would be

impossible without spoofing – however, they are

preventable

● Implementing anti-spoofing filtering to prevent packets

with incorrect source IP address from entering the

network

Presented by – Md. Abdullah Al Naser Page # 51

Page 52: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques

● Ingress Packet Filtering

● unicast Reverse Path Forwarding

Presented by – Md. Abdullah Al Naser Page # 52

Page 53: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques Considerations

● Identify points/devices in the network topology where

anti-spoofing measures should be applied

● Identify adequate techniques to be used (for example,

uRPF, or filtering)

● Apply configuration commands

● Verify that the protection works

Presented by – Md. Abdullah Al Naser Page # 53

Page 54: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques

To prevent source IP address spoofing, it's recommended to implement Ingress Filtering methods which include:

Ingress Filtering, uRPF etc

Presented by – Md. Abdullah Al Naser Page # 54

Page 55: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques - Ingress Packet Filtering

Presented by – Md. Abdullah Al Naser Page # 55

Page 56: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques - Ingress Packet Filtering

Presented by – Md. Abdullah Al Naser Page # 56

Page 57: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Anti-Spoofing

Anti-Spoofing Techniques - Ingress Packet Filtering

/ip firewall filter add action=drop chain=forward \comment="spoofed from AS64501“\in-interface=$interface log-prefix="“\src-address=!192.0.2.0/24

/ipv6 firewall filter add action=drop chain=forward\comment="spoofed from AS64501“\in-interface=$interface log-prefix="“\src-address=!2001:db8:1001::/48

Presented by – Md. Abdullah Al Naser Page # 57

Page 58: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques - uRPF

● uRPF is a security feature that prevents these spoofing

attacks. Whenever your router receives an IP packet it

will check if it has a matching entry in the routing table

for the source IP address. If it doesn’t match, the

packet will be discarded

● uRPF as defined in RFC 3704

● uRPF is often implemented on the edges of the networks

where customers, servers, and/or clients are connected

Presented by – Md. Abdullah Al Naser Page # 58

Page 59: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques - uRPF

Presented by – Md. Abdullah Al Naser Page # 59

Page 60: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques - uRPF

Presented by – Md. Abdullah Al Naser Page # 60

Page 61: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques - uRPF

Presented by – Md. Abdullah Al Naser Page # 61

Page 62: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques - uRPF

Presented by – Md. Abdullah Al Naser Page # 62

Page 63: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

There are four modes for uRPF:

● Loose Mode ● Strict Mode

● Feasible Mode ● VRF Mode

MikroTik supports Loose Mode and Strict Mode

● For single-homed stub customers, it's recommended

that uRPF strict mode is implemented

● For dual-homed stub customers, it is best to use uRPF

feasible mode instead

Presented by – Md. Abdullah Al Naser Page # 63

Page 64: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

uRPF Strict Mode

In Strict mode router will perform two checks:

1. Do I have a matching entry for the source in

the routing table?

2. Do I use the same interface to reach this source as

where I received this packet on?

Presented by – Md. Abdullah Al Naser Page # 64

Page 65: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

uRPF Strict Mode

When the incoming IP packets passes both checks, it will be permitted. Otherwise it will be dropped. This is perfectly fine for IGP routing protocols since they use the shortest path to the source of IP packets.

Presented by – Md. Abdullah Al Naser Page # 65

Page 66: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

uRPF Strict Mode

Presented by – Md. Abdullah Al Naser Page # 66

Page 67: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

uRPF Loose Mode

In Loose mode router will perform only single check:

1. Do I have a matching entry for the source in

the routing table?

Presented by – Md. Abdullah Al Naser Page # 67

Page 68: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

uRPF Loose Mode

When it passed this check, the packet is permitted. It doesn’t matter if we use this interface to reach the source or not. Loose mode is useful when you are connected to more than one ISP and you use asymmetric routing.

Presented by – Md. Abdullah Al Naser Page # 68

Page 69: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

uRPF

Anti-Spoofing Techniques – uRPF

/ip settings set rp-filter=strict

Or

/ip settings set rp-filter=loose

Presented by – Md. Abdullah Al Naser Page # 69

Page 70: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Recap

To Keep Internet Routing Secure

Presented by – Md. Abdullah Al Naser Page # 70

Page 71: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Recap

Filtering

In order to prevent propagation of incorrect routing information, network operators must ensure the correctness of their own announcements, and announcements from their customers to adjacent networks with prefix and AS-path granularity.

Presented by – Md. Abdullah Al Naser Page # 71

Page 72: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Recap

Anti-Spoofing

In order to prevent traffic with spoofed source IP addresses, network operators must enable source address validation for at least single-homed stub customer networks, their own end-users, and infrastructure.

Presented by – Md. Abdullah Al Naser Page # 72

Page 73: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Acknowledgement

● Rene Molenaar

● MANRS

● MikroTik Wiki

Presented by – Md. Abdullah Al Naser Page # 73

Page 74: Preventing Traffic with Spoofed Source ... - mum.mikrotik.com · Anti-Spoofing Anti-Spoofing DDoS Reflection-Amplification attacks would be impossible without spoofing –however,

Keep Internet Secure ☺

Thank You