
58 Chapter 3: MPLS Security Analysis
Protection Against Spoofing
When the Internet was in its early stages, the source address of a packet itself was
considered sufficient to prove that the packet was really sent by this IP address. In early
versions of UNIX, there is a whole command suite, the so-called “r-commands,” such as
rlogin, rcp, rsh, and so on, which rely on the IP address for authentication.
Today, IP address spoofing is an everyday occurrence in various types of attacks, and
engineers have learned not to rely on the IP source address.
Since MPLS is a Layer 3 technology, users are concerned about spoofing on the MPLS
network, both on the ...