HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.49 Abuse of Source Routing

T 5.49 Abuse of Source Routing

Abuse of the source routing mechanism and protocol is a very simple protocol-based method possibility for attacks. In an IP packet it is possible to prescribe the route by which the packet is intended to reach its target, or the route the answer packets should take. The description of the route may, however, be manipulated during the transmission so that the secure routes provided for by the routing entries are not used (e.g. via the firewall), whilst other uncontrolled routes are.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home