03.04.2013 Views

The menace came from below - Hack.lu

The menace came from below - Hack.lu

The menace came from below - Hack.lu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Counter-measures<br />

Anti-spoofing is sufficient to block the attack.<br />

Reverse path filtering is our friend:<br />

Only accept packet coming to an interface if we have a route to the<br />

source IP.<br />

This will avoid that the kernel handles the attack packet.<br />

Is this that easy to be protected?<br />

Éric Leblond, Victor Julien (OISF) <strong>The</strong> <strong>menace</strong> <strong>came</strong> <strong>from</strong> <strong>below</strong> <strong>Hack</strong>.<strong>lu</strong> 2012 25 / 66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!