0% found this document useful (0 votes)
66 views

Source Routing: A Simple Explanation of The Dangers

The document describes how source routing works in computer networks and the security risks it poses. It uses a scenario with four nodes - Ivan, Alice, Bob, and Eddie - to illustrate how source routing allows Eddie to spoof his location and send packets that appear to come from other nodes, potentially enabling man-in-the-middle attacks. By specifying the path a packet should take, source routing gives senders control over routing and allows spoofing of source addresses.

Uploaded by

alaadeen100
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Source Routing: A Simple Explanation of The Dangers

The document describes how source routing works in computer networks and the security risks it poses. It uses a scenario with four nodes - Ivan, Alice, Bob, and Eddie - to illustrate how source routing allows Eddie to spoof his location and send packets that appear to come from other nodes, potentially enabling man-in-the-middle attacks. By specifying the path a packet should take, source routing gives senders control over routing and allows spoofing of source addresses.

Uploaded by

alaadeen100
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Source Routing

A Simple Explanation of the Dangers

The Players

Ivan

Alice

Bob

Eddie

The Setup
Backbone

Ivan

Linksys

10.2.1.8
Alice
10.5.0.1

Bob

Eddie

10.5.0.2
3

Who Controls What


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob

Linksys
?
Eddie

10.5.0.2
4

The Setup...
Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

10.27.1.7
Linksys
10.5.0.50

Bob

Eddie

10.5.0.2

10.5.0.2
5

Eddie Sends a Packet


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
6

Eddie Sends a Packet


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
6

Eddie Sends a Packet


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
6

Eddie Sends a Packet


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

Unreachable
10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
6

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

What if we spoofed it?


Backbone

Ivan
10.2.1.8
Bob
Alice
Reset!
10.5.0.1
10.5.0.2

>

10.5.0.1

10.27.1.7
Linksys
192.168.1.1
Eddie
192.168.1.100
7

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

> 10.27.1.7

10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
8

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

> 10.27.1.7

10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
8

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
> 10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
9

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
> 10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
9

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
> 10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
9

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
> 10.2.1.8
10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
9

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic


Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

Source Routing Magic

2 Way
Spoofed
Communication!

Backbone

Ivan
10.2.1.8
Alice
10.5.0.1

Bob
10.5.0.2

10.27.1.7
10.2.1.8
> 10.5.0.1

10.27.1.7
Linksys
10.5.0.50
Eddie
10.5.0.2
10

You might also like