IP address impersonation

Derek Ragona derek at computinginnovations.com
Thu Sep 28 16:27:36 PDT 2006


Taking over an IP is a known way to inspect traffic.  Essentially if done 
well the spoofing server will act like a proxy server, inspecting the data 
and sending it along to the correct server.  Another way, particularly at a 
data center is to setup a server running the NIC in promiscuous mode so 
that nic will catch any packets on the netowrk.

Is the data center bringing up a server with a duplicate IP?  Or are they 
attempting to change your server's IP when they bring up a server on your 
assigned address?

It also could be just bad book keeping on the data center's part, having 
re-used an IP and not taken it completely out of another server's 
configuration files.

         -Derek

At 05:53 PM 9/28/2006, Robin Becker wrote:
>We have a remotely hosted 6.0 server that has apparently been impersonated 
>by a colocated server. The provider allows root access and we have set up 
>our server from a base 6.0 installation. We were allocated an ip address 
>and mostly we have had a good experience with this setup. However, twice 
>in three weeks we have had difficulty in logging in and have had to crash 
>boot the server. Analysis of the logs revealed that another machine on the 
>hoster's network had assigned itself our ip address. Even when we provided 
>the suspect mac address it seemed the hoster had trouble in finding 
>out/appreciating what the problem was.
>
>I have little experience of this sort of thing, but can anyone else offer 
>some advice on
>
>1) is this a recognized form of attack? I can see that it could be used 
>for password harvesting and traffic interception, but are there other 
>implications.
>
>2) Are there ways to mitigate this kind of problem? We have other hosted 
>servers on machines with similar (root) access. They presumably could also 
>be impersonated. We found this out by inspection of our own log files; 
>could the provider be doing something more to prevent this?
>--
>Robin Becker
>_______________________________________________
>freebsd-questions at freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-questions
>To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"
>
>--
>This message has been scanned for viruses and
>dangerous content by MailScanner, and is
>believed to be clean.
>MailScanner thanks transtec Computers for their support.
>

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
MailScanner thanks transtec Computers for their support.



More information about the freebsd-questions mailing list