티스토리 뷰

   훈련 시스템에 접속하기 위한 아이디와 패스워드는 아래와 같습니다.
Question 23
> 훈련 시스템 접속 주소 : 118.216.64.54
> 해당 아이디(ID) : level23
> 해당 패스워드(PW) : passwd=23


스머프(Smurf) 공격은 ICMP의 네트워크 broadcast를 이용하는 서비스 거부 공격이며 현재 가장 널리
알려져 있는 위험한 공격이다. 증폭 호스트로 이용되지 않도록 서버를 설정하여라
서버의 버전은 Solraris 2.6 IP 주소는 172.16.5.130 이다.


Solution

# ndd -set /dev/ip ip_respond_to_echo_broadcast 0
# finish

Description

UNIX IP Stack Tunning Guide v2.7
출처 : http://www.cymru.com/Documents/ip-stack-tuning.html

7. Broadcast ECHO response

Smurf attacks work by sending ICMP 8 0 (ECHO REQUEST) messages to a broadcast address from a spoofed address. Some IP stacks will respond, by default, to such messages. This should be disabled. Further, if the host is a firewall (router), it should not propogate directed broadcasts.

A. AIX
    /usr/sbin/no -o directed_broadcast=0
    Do not respond to directed broadcasts.

B. Solaris
    /usr/sbin/ndd -set /dev/ip ip_respond_to_echo_broadcast 0
    Do not respond to directed broadcasts.

    /usr/sbin/ndd -set /dev/ip ip_forward_directed_broadcasts 0
    Do not forward directed broadcasts.

C. Tru64 UNIX
    No tuning recommendations.

D. HP-UX
    ndd -set /dev/ip ip_respond_to_echo_broadcast 0
    Do not respond to directed broadcasts.

    ndd -set /dev/ip ip_forward_directed_broadcasts 0
    Do not forward directed broadcasts.

E. Linux kernel 2.2
    /sbin/sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1
    Do not respond to directed broadcasts.

F. FreeBSD
    sysctl -w net.inet.icmp.bmcastecho=0

G. IRIX
    /usr/sbin/systune allow_brdaddr_srcaddr to 0


댓글