RE: your router, spoofed IPs, and strong authentication...
Hi,
Now you say that your office has been assigned its own router. You do not specify which privileges are being stolen. Are these privileges ones that reside behind your router for use by your office, such as a RAID disk or something? Or are these stolen "privileges" accessible outside of your office's network on your company's general networks?
First of all, assuming that the "privileges" are on your office's network. Your office's router should be able to distinguish between the WAN (external side) and LAN (internal side), with all of your office computers (the official ones) and only those computers should be on the LAN while all of the "stealers" should be on the WAN. Your router should then be able to reject any spoofed IP address for a packet originating on the WAN side while allowing packets from your office computers to pass through to the WAN side. (Note that if there are other computers that are unprivileged but still officially on the LAN side of your router, then you need to setup a VLAN (Virtual LAN) containing only the privileged and official computers.) If your router does not have these particular filtering capabilities (and some don't), then I would setup a server computer and route all traffic through this server from your router. This server then becomes the gateway and it then distinguishes between external spoofed IPs and official internal real IPs, and its firewall rejects the spoofed IP packets while accepting the real ones. This server also does DHCP assignments to your official computers on its LAN side (internal), based upon MAC addresses. It does not do DHCP assignments for machines on its WAN side. You server could also do DNS for your LAN (official) computers and OD/AD (Open Directory/Active Directory authentication) for users on the official computers. You might even consider doing RADIUS for your LAN computers so that all users for your LAN must authenticate as a known official user. Your logs will then contain records of all users of your LAN. Your server can then require that all official accounts have a strong password policy, thus requiring all official users to have strong passwords.
Secondly, if the "privileges" being stolen exist outside of your LAN, then the best solution, in my mind, is to require OD/AD and RADIUS authentication for all users of your company's networks, both the privileged users and the less-privileged users. RADIUS is then able to restrict access on a person-by-person (authenticated accounts) basis to certain specified network resources. Not only that, but RADIUS is also able to provide some rudimentary logging and statistics for users of those restricted resources, so at the end of the day you will be able to see just which authenticated users were using which resources (e.g., user so-and-so printed out 10,000 pages on our color laser printer today, so that's why our magenta toner is empty). The OD/AD also establishes a password policy for all accounts requiring strong passwords, thus no user will be able to claim that his/her password was stolen. [RADIUS provides AAA (Authentication, Authorization, and Accouting) for your office's LAN as well as for your company's networks.]
Lastly, use wireshark (if on Mac OS X, then you can obtain wireshark from either MacPorts or fink) to sniff and then filter for all packets that are spoofing either their IP addresses or even their MAC addresses. Because it is possible to also spoof MAC addresses, the solutions not requiring a stronger form of authentication, such as DHCP assignment of IPs based upon MAC addresses, will not solve your IP thief problem. In other words, simply using DHCP with reservations for specific MAC addresses is not a solution to your problem since MAC addresses can also be spoofed. Wireshark can be used to find these spoofed IP addresses and spoofed MAC addresses.
...just my two cents worth of free advice, and you get what you pay for...
Good luck,
Switon
P.S. This is a serious issue, and, in my opinion, your company has to decide what to do when you find the "spoofers". A policy needs to be in place and then publicly broadcast to all employees. If the consequences are strict enough, and in my opinion they need to be draconian, and your company publicly explains just what is going to be done to enforce said policy (such as strong authentication with OD, RADIUS, and packet sniffing via wireshark to find all spoofed IPs and MACs), I suspect that this alone will severely limit if not completely eliminate your spoofing problems.