Mailing List Archive

Support open source code!


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IP spoofing



>>>>> "Craig" == Craig Oda <craig@example.com> writes:

    anil> I find the topic of IP spoofing much more interesting. Does
    anil> anyone have experience in this area? Anyone out there read
    anil> TakeDown (Tsutomo Shimamura)?

    Craig> I found the book by Tsutomo pretty interesting.

Another good book is "The Firewalls Book" (in real life, it's Bellovin 
and Cheswick, _Firewalls and Internet Security_).

    Craig> If you want to play with the stuff just get two Linux boxes
    Craig> and connect them with ethernet or a serial cable.
[snip]
    Craig> If you really get into it, you can follow CERT for Linux
    Craig> and try to hack into your box using the security report as
    Craig> a hint to how to recreate the attack.

Many, perhaps most CERT advisories refer to potential security holes,
and do not necessarily have security implications.  For example,
buffer overrun holes don't matter if you've already chroot'ed to a
read-only file system with no executables in it, since when you return
to the shell the extra characters die in that environment.  This
particular scenario is not likely, but it's one example that's easy to
understand.  Anyway, many security reports result from somebody
noticing that some characters leak from some user program into the
calling shell somehow.  It's not necessarily true that someone has
figured out how to exploit this and successfully subverted a system.

Such holes should be fixed, of course.  I'm not following CERT at the
moment, but I do watch for attempts to FTP my /etc/passwd, and the
like, and do occasionally review the security warnings on Web server
software I use.  I've repaired or replaced software about four times
for this reason.  I also ended up writing a cron job to clean out
anything bigger than 100kB from my /ftp/incoming....  I got tired of
jerks leaving erotic binaries in a write-only directory.  :-P

-- 
                           Stephen John Turnbull
University of Tsukuba                                        Yaseppochi-Gumi
Institute of Policy and Planning Sciences  http://turnbull.sk.tsukuba.ac.jp/
Tennodai 1-1-1, Tsukuba, 305 JAPAN                 turnbull@example.com
-----------------------------------------------------------------
a word from the sponsor will appear below
-----------------------------------------------------------------
The TLUG mailing list is proudly sponsored by TWICS - Japan's First
Public-Access Internet System.  Now offering 20,000 yen/year flat
rate Internet access with no time charges.  Full line of corporate
Internet and intranet products are available.   info@example.com
Tel: 03-3351-5977   Fax: 03-3353-6096


Home | Main Index | Thread Index

Home Page Mailing List Linux and Japan TLUG Members Links