📄 502.txt
字号:
Rule: --Sid:502--Summary:This event is generated when an IPv4 packet set the strict source recordroute IP option.--Impact:Information could be gathered about network topology, and machinesrouting packets onto trusted links could be abused.--Detailed Information:Strict source record routing specifies a series of machines which must be exclusively used in the routing of a datagram. This can be useful tomap out routes ala the traceroute program by adding discovered intermediary routers one at a time. Furthermore, while a machine may normally be unreachable due to default gateways, a compliant router can be forced to hand off source routed packets to an intermediary capable of speaking both to the outside world and target machines; the packet may then be forwarded on to its destination.--Affected Systems:Any machine fully implementing RFC 791 set up as a router.--Attack Scenarios:By incrementing the TTL of successive packets, the topology of routes toa host can be determined. Each compliant node along the way will replywith an ICMP Time Exceeded bearing their address and the recorded route.--Ease of Attack:Tools are readily available to employ source routing for the purpose ofnetwork discovery; the bounce attack described is unlikely to surface ina properly configured network.--False Positives:None--False Negatives:Network discovery can be done using other means than source routing.--Corrective Action:Redesign network topologies so that routers are kept to a minimum;disable routing by other machines. To prevent network mapping, don'tallow source-routed packets at all. --Contributors:Snort documentation contributed by by Nick Black, Reflex Security <dank@reflexsecurity.com>Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:IP RFC:www.faqs.org/rfcs/rfc791.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -