nanog mailing list archives
Layer 2 broadcast address aggregation and SMURF: Was RE: Smurf Amp Nets
From: "Martin, Christian" <CMartin () mercury balink com>
Date: Sat, 20 Jun 1998 13:10:08 -0400
On Thu, Jun 18, 1998 at 10:16:38PM -0700, Vern Paxson wrote:0.0.0.0 10.0.4.0 127.0.0.0 255.255.255.0These are pretty cool, I must say. Exactly how does the smurf attacker route their echo requests to them? VernThey are straight forged packet flows.
These also can be situations where layer two devices have private networks mixed in with public networks on the same VLAN. Remember broadcast address translation between layer 3 & 2 through a store-and-forward (or cut-through - any MIN type box will do this) switch will generate MAC layer frames and deliver them out of each port in the VLAN. I know broadcast pings on a Cisco device that is connected to a switch, where the output interface has IP block A, and the VLAN has IP blocks C, D, E, will result in replies from all networks connected to the VLAN, not just the IP block configured on the router. This is why on almost every attack we've seen here, there have been RFC 1918 addresses involved as amplifiers. Christian
Current thread:
- Layer 2 broadcast address aggregation and SMURF: Was RE: Smurf Amp Nets Martin, Christian (Jun 20)