Security in Computer Networks

8.3.2 Authentication Protocol ap2.0

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

From our study of the network and data link layers, we know that it is not that hard to create an IP datagram, put whatever IP source address we want into the IP datagram, and send the datagram over the link-layer protocol to the first-hop router.  From then on, the incorrectly source-addressed datagram would be dutifully forwarded.  This approach is a form of IP spoofing, a well-known security attack.  IP spoofing can be avoided if your first-hop router is configured to forward only datagrams containing your IP source address.  This capability is not universally deployed or enforced.

kurose_320719_c08f08.gif