| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: spoofing clients |
From: Mike N. On Wed, 5 Apr 2006 06:20:33 -0400, "Geo" wrote: >OIC, the packet would have a source address of x.x.x.x but the data part >would have 192.168.254.x so it would appear spoofed, and if the internal >subnet is real IP addresses but natted then there is no way to tell a false >positive. Thinking it through further, on the NAT case, we can detect a false test. The odd NAT translates the spoofed address to a WAN address before sending it out. So we'd see the packet come in with the real IP address. >> The relatively easy case is ActiveX, but this would cover only Windows >> and IE. > >I think that would cover at least 90% of the people browsing to the site so >plenty good enough for a start. What about the fact that W2K has raw sockets >but XP doesn't, does that present any problems? I think XP still has some remaining spoof capability. I forget the details now, but we should be able to find some spoofable protocol. Thinking further, I think it may be possible to coax some sort of ICMP packet from certain devices that will have the natted private IP address as an ICMP source address. In cases where it comes through, they aren't using BCP38. I've seen many of these on the network being blocked, but never investigated in detail how they were created. --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.