Chinaunix首页 | 论坛 | 博客
  • 博客访问: 557210
  • 博文数量: 772
  • 博客积分: 4000
  • 博客等级: 上校
  • 技术积分: 4940
  • 用 户 组: 普通用户
  • 注册时间: 2008-10-16 19:52
文章分类

全部博文(772)

文章存档

2011年(1)

2008年(771)

我的朋友

分类:

2008-10-16 20:03:56

    网络尖兵原来采用的检测技术主要是:

    1、检查从下级IP出来的IP包的IP-ID是否是连续的,如果不是连续的,则判定下级使用了nat.

    2、检查从下级IP出来的IP包的ttl值是否是32、64、128这几个值,如果不是,刚判定下级使用了nat.

    3、检查从下级IP出来的http请求包中是否包含有proxy的字段,如果有,则下级用了http代理。

    由于检测和防检查技术的对抗升级,现在可能增加了检测的内容:

    一、通过行为统计:

    1. 在三秒内同一IP對兩個以上的網站進行Request,將此IP視為透過NAT進行傳輸。"

    2. 在兩秒內,若同一IP對同一個網站,進行兩次以上的Request,將此IP視為透過NAT進行傳輸。

    二、深度检测数据包内容:

    1.检测并发连接数量

    2.检测下级IP出来的QQ号码数量,如果同时有5个QQ号,则判定为共享。

    3.更多的检测方法

    Detecting NAT Routers Thursday, April 24 2003 @ 08:35 AM CDT Contributed by: opticfiber A great paper written by Peter Phaal explains the simple method used in his companies product, Sflow, to detect multiple host behind a NAT firewall. The secret, it would seem is simply monitoring of the TTL of out going packets and comparing them to a host know not to be using a NAT firewall.

    Another method only touched upon by Phaal is passive OS finger printing, although this method is less reliable, an statistical analasys could determine if multiple operating systems were using the same network network device. If this were the case it would be reasonable to assume that that host was in fact a NAT device.

    AT&T Labs has published a paper explaining how to count the number of devices behind a NAT device. The method AT&T uses, relies on the fact that most operating systems (excluding Linux and Free BSD) use IP header ID's as simple counters. By observing out of sequence header ID's, an analasys can calculate how many actual hosts are behind a NAT device./

    Each of these methods can be easily defeated through better sterilization by the router itself. In the first example, if the TTL for each TCP packet was re-written by the router for each packet to the value of 128, the first method would no longer function. For the second method, sterilizing IP header information and stripping unneeded TCP flags would successfully undermine this scheme. For the last Method, counting hosts behind a router. Striping the fragmentation flag for syn packets, and setting the IP ID to '0', (like Linux and Free BSD both do) would make it impossible to count hosts behind a NAT router. P

    转自:

【责编:Peng】

--------------------next---------------------

阅读(717) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~