[116582] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Botnet hunting resources (was: Re: DOS in progress ?)

daemon@ATHENA.MIT.EDU (Luke S Crawford)
Sat Aug 8 04:15:35 2009

To: Roland Dobbins <rdobbins@arbor.net>
From: Luke S Crawford <lsc@prgmr.com>
Date: 08 Aug 2009 04:15:04 -0400
In-Reply-To: <DC50687B-4C8F-4BD8-BEF0-F4D7B2D0916D@arbor.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Roland Dobbins <rdobbins@arbor.net> writes:

> On Aug 8, 2009, at 11:57 AM, Luke S Crawford wrote:
> 
> > 2. is there a standard way to push a null-route on the attackers
> > source IP upstream?
> 
> Sure - if you apply loose-check uRPF (and/or strict-check, when you
> can do so) on Cisco or Juniper routers, you can combine that with the
> blackhole to give you a source-based remotely-triggered blackhole, or
> S/RTBH.  You can do this at your edges, and you *may* be able to
> arrange it with other networks with whom you connect (i.e., scope
> limited to your link with them).

Ah, nice.  thank you, that is exactly what I was looking for.  
I'll read up on it this weekend and see if I can talk my provider into letting
me push that upstream.


-- 
Luke S. Crawford
http://prgmr.com/xen/         -   Hosting for the technically adept
http://nostarch.com/xen.htm   -   We don't assume you are stupid.  


home help back first fref pref prev next nref lref last post