RIPE "IP Anti-Spoofing" Task Force
- Publication date:
- 16 May 2006
- State:
- Published
- Author
- File(s)
- PDF (16.7 KB)
1. Introduction
IP source address spoofing is the practice of originating IP datagrams with source addresses other than those assigned to the host of origin. In simple words, the host pretends to be some other host.
This can be exploited in various ways, most notably to execute Denial of Service (DoS) amplification attacks that cause an amplifier host to send traffic to the spoofed address.
There are many recommendations to prevent IP spoofing by ingress filtering, e.g. checking source addresses of IP datagrams close to the network edge.
Most equipment vendors support ingress filtering in some form.
Yet recently, significant DoS amplification attacks have happened that would be impossible without spoofing.
This demonstrates that ingress filtering is definitely not deployed sufficiently. Unfortunately, there are no direct benefits to an Internet Service provider (ISP) that deploys ingress filtering. Also, there is a widely held belief that ingress filtering only helps when it is universally deployed.
At RIPE 52 in Istanbul, RIPE established a task force that promotes deployment of ingress filtering at the network edge by raising awareness and provide indirect incentives for deployment.
2. Charter
This task force shall
- raise awareness about this issue among network operators,
- inform about operational methods to implement ingress filtering,
- collect and channel requirements to equipment vendors where appropriate,
and
-
seek ways to provide incentives and benefits to operators that do implement ingress filtering.
The task force shall have completed its task when
-
network operators cannot reasonably claim not to be aware of the issue,
-
information about ways to deploy ingress filtering are readily available
and
-
any incentives that it may have devised have become available.
The task force shall be disbanded when these tasks have been completed or when there is consensus within RIPE that completion of the tasks is no longer realistic.
3. Time-Line
RIPE 52: |
BoF and Establishment of Task Force Quickly draft and publish a RIPE recommendation citing existing work. Compile How-To with (pointers to) vendor documentation and operational experience reports. Establish liaison with MIT ANA Spoofer Project and promote their tools. Analyse Spoofer data for the RIPE region. |
RIPE 53: |
Published "RIPE Recommendation on Ingress Filtering". Published first edition of "Ingress Filtering How-To". Collect any critical requirements to be communicated to equipment vendors. First analysis of Spoofer data. Discuss possible incentive schemes. Revise and extend How-To. Devise possible incentive schemes like a "Source Address Clean" network logo, suitable RIPE Database attributes ... |
RIPE 54: |
Published second edition of "IP Source Address Filtering How-To". Further analysis of Spoofer data for the RIPE region. Launch of any incentive scheme. Implement incentive scheme. Monitor progress and effectiveness. |
RIPE 55: |
Evaluation and Disbanding of Task Force. |
4. Contacts
The task force mailing list is <[email protected]>.
The web interface for subscriptions and the archive are at
http://www.ripe.net/mailman/listinfo/spoofing-tf .
The task force is co-chaired by Nina Hjorth Bargisen (NINA1-RIPE) and Daniel Karrenberg (DK58).
A web page detailing current activities will be set up.
5. References
RFC2827 aka BCP38
Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source Address Spoofing
http://www.ietf.org/rfc/rfc2827.txt
SSAC004
Securing the Edge
http://www.icann.org/committees/security/sac004.txt
SSAC008
DNS Distributed Denial of Service (DDoS) Attacks
http://www.icann.org/committees/security/dns-ddos-advisory-31mar06.pdf
ripe-66
RIPE Task Forces
ftp://ftp.ripe.net/ripe/docs/ripe-066.txt
MIT Spoofer Project
http://spoofer.csail.mit.edu/
RFC3024 - Reverse Tunneling for Mobile IP, revised
ftp://ftp.rfc-editor.org/in-notes/rfc3024.txt