nanog mailing list archives
Re: Ping flooding (fwd)
From: Jordy <jordy () thirdwave net>
Date: Mon, 8 Jul 1996 22:21:49 -1000 (HST)
On Mon, 8 Jul 1996, Michael Dillon wrote:
Are there any procedures in place to track down this kind of network abuse. In particular, is it possible that it is a stealth attack? Before you answer, take note that this is going to appear in Bob Metcalfe's column next week.
you can easily forge the header on an ICMP packet to make it look like it came from any address you wish, to my knowledge, there really isn't a way you can track down. Denial of Service attacks like these are becoming common place, the only real course of action is to firewall, unfortunatly, they can just spoof from another source address.
Is it possible for someone to forged the source IP address of an icmp packet?
yes - - - - - - - - - - - - - - - - -
Current thread:
- Re: Ping flooding (fwd), (continued)
- Re: Ping flooding (fwd) Daniel W. McRobb (Jul 09)
- Re: Ping flooding (fwd) Per Gregers Bilse (Jul 10)
- Re: Ping flooding (fwd) John Hawkinson (Jul 10)
- Re: Ping flooding (fwd) Per Gregers Bilse (Jul 10)
- Re: Ping flooding (fwd) Daniel W. McRobb (Jul 09)
- Re: Ping flooding (fwd) Curtis Villamizar (Jul 09)
- Re: Ping flooding (fwd) Curtis Villamizar (Jul 09)
- Re: Ping flooding (fwd) Per Gregers Bilse (Jul 09)
- Re: Ping flooding (fwd) Dick St.Peters (Jul 09)
- Re: Ping flooding (fwd) Todd Graham Lewis (Jul 09)
- Re: Ping flooding (fwd) George Herbert (Jul 09)
- Re: Ping flooding (fwd) Forrest W. Christian (Jul 09)
- Re: Ping flooding (fwd) Curtis Villamizar (Jul 09)
- Re: Ping flooding Jerry Anderson (Jul 09)