19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.49 Abuse of Source Routing<br />

Abuse of the source routing mechanism and protocol is a very simple<br />

protocol-based method possibility for attacks. In an IP packet it is possible to<br />

prescribe the route by which the packet is intended to reach its target, or the<br />

route the answer packets should take. <strong>The</strong> description of the route may,<br />

however, be manipulated during the transmission so that the secure routes<br />

provided for by the routing entries are not used (e.g. via the firewall), whilst<br />

other uncontrolled routes are.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!