<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Pertahanan_Melawan_ARP_spoofing_di_Linux</id>
	<title>Pertahanan Melawan ARP spoofing di Linux - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Pertahanan_Melawan_ARP_spoofing_di_Linux"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Pertahanan_Melawan_ARP_spoofing_di_Linux&amp;action=history"/>
	<updated>2026-04-20T16:30:05Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Pertahanan_Melawan_ARP_spoofing_di_Linux&amp;diff=34685&amp;oldid=prev</id>
		<title>Onnowpurbo: New page: Sumber: http://kokikode.wordpress.com/2009/12/01/defense-against-arp-spoofing-in-linux/  ARP spoofing, also know as ARP Poisoning is one of the mechanisms commonly used in denial of servic...</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Pertahanan_Melawan_ARP_spoofing_di_Linux&amp;diff=34685&amp;oldid=prev"/>
		<updated>2012-10-01T06:09:49Z</updated>

		<summary type="html">&lt;p&gt;New page: Sumber: http://kokikode.wordpress.com/2009/12/01/defense-against-arp-spoofing-in-linux/  ARP spoofing, also know as ARP Poisoning is one of the mechanisms commonly used in denial of servic...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: http://kokikode.wordpress.com/2009/12/01/defense-against-arp-spoofing-in-linux/&lt;br /&gt;
&lt;br /&gt;
ARP spoofing, also know as ARP Poisoning is one of the mechanisms commonly used in denial of services attacks. We are only able to prevent or minimize these attacks. In this article I tried to summarize some points that are practical and easy to apply to the Linux-based server systems regardless of whether the subject security update to the kernel and applications installed.&lt;br /&gt;
&lt;br /&gt;
Some of these points in practice I will describe below:&lt;br /&gt;
&lt;br /&gt;
1. Essential configuration files in “/etc/host.conf” as shown below.&lt;br /&gt;
&lt;br /&gt;
 order hosts,bind&lt;br /&gt;
 multi on&lt;br /&gt;
 nospoof on&lt;br /&gt;
 spoofalert on&lt;br /&gt;
&lt;br /&gt;
2. The below are some tweaks that can be done in “/etc/sysctl.conf” nor “/proc/sys/net/ipv4/…” to avoid make kinds of attacks. They pretty simple yet effective.&lt;br /&gt;
&lt;br /&gt;
» Turn on Source Address Verification in all interfaces to prevent some spoofing attacks.&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/conf/all/rp_filter&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/conf/default/rp_filter&lt;br /&gt;
&lt;br /&gt;
» Disables TCP Window Scaling (http://lkml.org/lkml/2008/2/5/167)&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/tcp_syncookies&lt;br /&gt;
&lt;br /&gt;
» Do not accept ICMP redirects (prevent MITM attacks)&lt;br /&gt;
&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/all/accept_redirects&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/default/accept_redirects&lt;br /&gt;
&lt;br /&gt;
» Ignore ICMP broadcasts will stop gateway from responding to broadcast pings.&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts&lt;br /&gt;
&lt;br /&gt;
» Ignore bogus ICMP errors.&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses&lt;br /&gt;
&lt;br /&gt;
» Do not send ICMP redirects.&lt;br /&gt;
&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/all/send_redirects&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/default/send_redirects&lt;br /&gt;
&lt;br /&gt;
» Do not accept IP source route packets.&lt;br /&gt;
&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/all/accept_source_route&lt;br /&gt;
 echo 0 &amp;gt; /proc/sys/net/ipv4/conf/default/accept_source_route&lt;br /&gt;
&lt;br /&gt;
» Turn on log Martian Packets with impossible addresses.&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/conf/all/log_martians&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/conf/default/log_martians&lt;br /&gt;
&lt;br /&gt;
3. Use the DHCP service on the server to provide IP restrictions based on the client MAC address.&lt;br /&gt;
&lt;br /&gt;
4. MAC address list of each client and its IP address defined by the following instructions.&lt;br /&gt;
&lt;br /&gt;
 arp -s 192.168.0.24 00:9a:7c:3d:15:8f&lt;br /&gt;
&lt;br /&gt;
or can be defined in the file “/etc/ethers” like this.&lt;br /&gt;
&lt;br /&gt;
 192.168.0.24 00:9a:7c:3d:15:8f&lt;br /&gt;
 192.168.0.25 00:e9:18:7c:15:78&lt;br /&gt;
 192.168.0.26 00:18:15:3d:78:8c&lt;br /&gt;
&lt;br /&gt;
… etc and execute with command “arp -f“&lt;br /&gt;
&lt;br /&gt;
If your server has two network cards and one of them functioned as a DMZ connected to the internet, please add it manually like this.&lt;br /&gt;
&lt;br /&gt;
» assumed “eth1” as a DMZ interface.&lt;br /&gt;
&lt;br /&gt;
 arp -i eth1 -s 210.20.152.30 00:03:19:db:8a:58&lt;br /&gt;
&lt;br /&gt;
    ensure defined IP and MAC address each client network card is persistent every time the server reboot.&lt;br /&gt;
&lt;br /&gt;
5. Make sure the rules in your packet filtering using IPTables to block the following network address.&lt;br /&gt;
&lt;br /&gt;
 Private Networks (RFC 1918) --&lt;br /&gt;
 10.0.0.0/8&lt;br /&gt;
 172.16.0.0/12&lt;br /&gt;
 192.168.0.0/16&lt;br /&gt;
 &lt;br /&gt;
 IANA Reserved --&lt;br /&gt;
 0.0.0.0/8 - Historical Broadcast&lt;br /&gt;
 127.0.0.0/8 - Loopback&lt;br /&gt;
 169.254.0.0/16 - Link Local Networks&lt;br /&gt;
 192.0.2.0/24 - TEST-NET&lt;br /&gt;
 240.0.0.0/5 - Class E Reserved&lt;br /&gt;
 248.0.0.0/5 - Unallocated&lt;br /&gt;
 255.255.255.255/32 - Broadcast&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
 iptables -A INPUT -j DROP -s 0.0.0.0/8&lt;br /&gt;
 iptables -A INPUT -j DROP -d 0.0.0.0/8&lt;br /&gt;
 iptables -A FORWARD -j DROP -s 0.0.0.0/8&lt;br /&gt;
 iptables -A FORWARD -j DROP -d 0.0.0.0/8&lt;br /&gt;
 iptables -A OUTPUT -j DROP -d 0.0.0.0/8&lt;br /&gt;
&lt;br /&gt;
6. Done.&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* http://kokikode.wordpress.com/2009/12/01/defense-against-arp-spoofing-in-linux/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Anti NetCut]]&lt;br /&gt;
* [[Pertahanan Melawan ARP spoofing di Linux]]&lt;br /&gt;
* [[Mikrotik: Setup untuk Anti Netcut]]&lt;br /&gt;
* [[Keamanan Jaringan]]&lt;br /&gt;
* [[Linux Howto]]&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Security]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>