.... under construction ....
This survey and backtracking analysis at Oak Ridge National Laboratory is sponsored by the Office of Counter Intelligence of the US Departmant of Energy.
Introduction
Spoofed addresses can be used to hide one's network identity or to direct return packets to another host/target. Spoofed addresses can also be used to masquerade as another host that is possibly trusted by the target host. Spoofed addresses have been used in the following Internet attacks:
Denial of Service Attacks
In February of 2000, more sophisticated distributed denial of service attacks were launched against major Internet sites. Tools for mounting distributed denial of service attacks began appearing in the fall of 1999, and CERT and others were aware of attack preparations. (See links below.) The attackers broke into a number of Internet computers (usually attached to high speed nets) and installed attack agents. The attackers used these distributed agents to mount simultaneous denial of service attacks against a targeted site.
Dropping spoofed packets
At ORNL we have developed a prototype program that an end-user can run to verify that his ISP has proper ingress filters enabled. The user can download this spoof-tester (versions would be needed for each OS). The spoof-tester contacts a server (with TCP) and obtains a spoofed address for testing. The spoof-tester then transmits a series of spoofed packets (TCP, UDP, ICMP) from the users machine to the server, some with the Record-Route option. The server then notifies the spoof-tester if the spoofed packets are detected. (The actual IP address of the user's machine is embedded in the spoofed packets.) If the spoofed packets are detected, the user or testing service could then notify the ISP. (The spoofed packets transport checksums are wrong so there are no packets reflected to the spoofed address.) A prototype web page was also developed for the spoof-tester. Also see ICSA's netlitmus anti-spoofing test tool or here.
Most routers are (should be) configured with egress filters that prevent spoofed internal addresses from being passed from an external interface. These egress filters reduce the risk of internal hosts using an IP address as the basis of trust decisions. SANS has some hints for testing your router configuration.
Back tracking
With Cisco routers one can use the "log-input" feature of an access control list. In 1996, MCI published a set of Perl scripts for Cisco routers that would login, set up an ACL in debug mode, determine the next-hop router, and login to the next-hop router and repeat the process. Robert Stone at UUNET reroutes the attack flow in his CenterTrack design to tunnel the traffic to instrumented routers. NCSU's Wu is working on "Deciduous: Intrusion Source Tracing". There have also been several backtracking papers (master's thesis) on using active networks to backtrack and block spoofed attack flows. (See the URL's below.)
Action items
Our preliminary tech report (PS, 120K)
More information
denial of service
back tracking