North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Implementing anti-abuse techniques on ISP networks....

  • From: Christopher Masto
  • Date: Thu Aug 07 11:59:46 1997

On Wed, Aug 06, 1997 at 04:00:14PM -0700, J.D. Falk wrote:
> > I don't know about the "huge players", but we're an Internet Service
> > Provider, not an Internet Blockage Provider.  We don't allow spoofing,
> > and we don't allow relaying, but we're not about to put filters
> > to prevent dialup customers from connecting wherever they want.
> 
> 	How 'bout to stop them from connection wherever they want,
> 	spoofing their IP address so it looks like it's your box at
> 	home that's hacking into the NSA instead of them?
> 
> 	This is an extreme example, but hopefully it illustrates the
> 	reason that a little simple filtering is a Good Thing[TM].

In as much as filtering each dial-up port to only allow packets from
its own source address is an operational issue.. :-)  I said "we don't
allow spoofing".

Operational question: will a Livingston Portmaster allow source IP
spoofing?  That is, if you have been given an address of x, can you
send a packet from y?  If the answer is "yes" (and I can think of a
reason or two why it should be), and given the current implementation
of RADIUS and its method of supplying filter rules, one immediate
solution comes to mind.  Set up a filter rule for every possible IP
address that may be assigned, and have the RADIUS server supply the
rule that goes with the Framed-IP-Address.  Hmmm.
-- 
= Christopher Masto        = [email protected] = http://www.netmonger.net/  =
= NetMonger Communications = finger for  PGP key = $19.95/mo unlimited access =
= Director of Operations   =   (516)  221-6664 	 = mailto:[email protected]  =

v---(cut here)---v
    --
    [email protected]
    "Keep in mind that anything Kibo says makes a great sig."  -- Kibo
^---(cut here)---^