Figure 5: The routing table proving that the packets sent
back for the response are misoriginated.
In Figure 5, it is shown that the router encircled
in purple in Figure 2 catches the ICMP packets from
the sender whose IP address is 172.16.0.2, which are
bound for the receiver whose IP address is
192.168.0.2, even though this router exists in the
outside of the optimal route, which is stated in
Figure 2, connecting the lower left PC which is the
destination with its IP address 192.168.0.2 and the
upper central PC which is the origin with its IP
address 172.16.0.2.
Figure 6: The routing table recording a malicious route for
disguised transfer.
In Figure 6, the routing table of the upper central
router encircled in black in Figure 2 shows that there
exists simultaneously the route leading to the left-
hand area which a serial interface with its IP address
192.168.0.0/22 advertises and the route leading to the
right-hand area which another serial interface with its
IP address 192.168.0.0/23 advertises. This is the
reason why the longest matching prefix rule forces
all the response to transfer at the disguised route
whose destination is different for the original sender.
3 MALICIOUS APPLICATION OF
THE MISORIGINATION TO
DHCP SPOOFING
DHCP relay agent is defined as the function for
packet transfer enabling any gateway router to
forward DHCP transactions, to an authenticated and
designated DHCP server, on condition that the this
DHCP server cannot share its network segment with
the authenticated DHCP clients. By the way, the
DNS server translates a human-readable domain
name such as example.com into a numerical IP
address which is used to route communications
between nodes. Normally, if the server does not
know a requested name translation, it will ask another
server, which is designated as this master server, and
the process for inquiry continues recursively. To
increase high quality performance, any DNS server will
typically remember or cache these name translations
for a certain amount of time. This means, if it
receives another request for the same name
translation, it can reply without asking any other
DNS servers, until that cache expires. When a DNS
server has received a false translation and caches it
for the DNS server's performance optimization, it is
considered poisoned, and it supplies the false data to
the authenticated clients. If a DNS server is
poisoned, it may return with an incorrect IP address,
diverting trac to another computer administrated
by a certain malicious attacker. These facts show us
that mis- origination leading to malicious DNS
servers, which is called DNS cache poisoning, can
be broght about by DHCP spoofing. In this section,
we can see the sequential process of misorigination
in the course of establishing DHCP session by
commuting DHCP packets such as DHCP discover,
DHCP oer, DHCP request and DHCP
acknowledge, as the following:
Figure 7: The difference he network segment requiring
DHCP relay agents and the network segment not requiring
DHCP relay agents.