On 4 April 2010 18:56, Pete Vickers <p...@systemnet.no> wrote:
> On 31. mars 2010, at 20.01, Claudio Jeker wrote:
>
>> On Wed, Mar 31, 2010 at 08:08:01PM +0300, Eugene Yunak wrote:
>>> On 31 March 2010 19:27, N. Arley Dealey <arley.dea...@gmail.com> wrote:
>>>> It would appear to me that antispoof and URPF achieve similar results. Is
>>>> there a reason to prefer one over the other?
>>>
>>> Not at all. antispoof blocks ip packets that came in from the wrong
>>> interface, while URPF blocks packets from "aliens" (no entry in
>>> routing table for the source address). Just look at the output of
>>> pfctl -sr
>>>
>>
>> Not at all. URPF does not only check if a route exists it also checks that
>> the route is pointing to the interface the packet came in.
>>
>> Antispoof is only for the LAN while URPF is actually capable of tracking
>> stuff further down. This is at the same time the problem of URPF if you
>> have asymetric routing URPF fails. Antispoof works in this case since it
>> is hard to get asymetric routing on the LAN.
>>
>> --
>> :wq Claudio
>>
>
>
> uRPF (at least recent incarnations of it) can be /configured/ to drop packets
> based of presence of /either/ :
>
> - a matching FIB prefix outbound on the same interface the packet arrived on
> (strict mode)
> - a matching FIB prefix outbound on any interface (loose mode)
>
> you can also mask uRPF effect to only a subset of packets/prefixes with an
> ACL.
>
>
> pretty extensive explanation here:
>
> http://www.cisco.com/web/about/security/intelligence/urpf.pdf
>

Do you realise that this is an OpenBSD mailing list, and we are
discussing OpenBSD's pf implementation of uRPF?


-- 
The best the little guy can do is what
the little guy does right

Reply via email to