Security Incidents mailing list archives
RE: spoofed packets to RFC 1918 addresses
From: "Sterling, Chuck" <csterlin () smtp3 wstf nasa gov>
Date: Fri, 28 Jun 2002 08:27:21 -0600
FWIW, how does one get the various Internet widgets to route packets addressed to 192.168.*, especially to a different network? I was under the impression that they were unroutable over the Internet. Is this incorrect, or is someone messing with routing tables somewhere, or what? If this is taking place I need some more education... probably do anyway. The reason I ask is that when I see packets with 192.168.* or other similarly defined addresses, it is invariably as a source address, and I assume that, if it was done intentionally, the sender does not really expect an answer (to an unroutable (?) address). So far as I know there have been no inbound external packets addressed _to_ 192.168.*. If I saw some within my net, I would hunt within my net for the transmitter. An example of this is some leakage from a small SAN we have that uses 10.* addresses internally. Occasionally I would see some of those hit the internal side of the firewall, and after tracing them I found that more-or-less legitimate source for them. Chuck Sterling Magic is REAL, unless declared INTEGER
---------- From: HggdH[SMTP:hggdh () attbi com] Sent: Thursday, June 27, 2002 4:05 PM To: Incidents Subject: Fw: spoofed packets to RFC 1918 addresses I wonder ... I just remembered that at least the Linksys DSL/Cable routers, by default, sit at 192.168.1.x; the DMZ is, usually, on the same subnet. Would someone be looking for Windows hosts there? As Linksys puts it, a machine in the DMZ is completely exposed to the Internet. No firewall protection. ..hggdh.. ----- Original Message ----- From: "Robert E. Lee" <rel () leefam org> (snip) My organization saw some connection attempts to an rfc1918 space on our firewall in the past few days as well. Specifically ip's in the 192.168.1.0/24 space, and specifically on tcp port 137. The firewall marked the packets as being spoofed, and dropped them. (snip) -------------------------------------------------------------------------- -- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- spoofed packets to RFC 1918 addresses Dirk Koopman (Jun 26)
- Re: spoofed packets to RFC 1918 addresses measl (Jun 27)
- RE: spoofed packets to RFC 1918 addresses Kent Hundley (Jun 27)
- Re: spoofed packets to RFC 1918 addresses Barry Irwin (Jun 28)
- Re: spoofed packets to RFC 1918 addresses Daniel Polombo (Jun 27)
- Re: spoofed packets to RFC 1918 addresses jon schatz (Jun 27)
- Re: spoofed packets to RFC 1918 addresses Robert E. Lee (Jun 27)
- <Possible follow-ups>
- RE: spoofed packets to RFC 1918 addresses Shane Carroll (Jun 27)
- Fw: spoofed packets to RFC 1918 addresses HggdH (Jun 27)
- RE: spoofed packets to RFC 1918 addresses Sterling, Chuck (Jun 28)
- RE: spoofed packets to RFC 1918 addresses Keith T. Morgan (Jun 28)