[121081] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: D/DoS mitigation hardware/software needed.

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Sat Jan 9 22:29:30 2010

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Sun, 10 Jan 2010 03:21:18 +0000
In-Reply-To: <20100110030507.4CEFA2B2161@mx5.roble.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jan 10, 2010, at 10:05 AM, Roger Marquis wrote:

> Ok, I'll bite.  What firewalls are you referring to?

Hardware-based commercial firewalls from the major vendors, open-source/DIY=
, and anything in between.  All stateful firewalls ever made, period (as di=
scussed previously in the thread).

> So then you're talking about CPU-driven firewalls, without ASICs e.g., co=
nsumer-level gear?  Well, that would explain why you think they fail before=
 the servers behind them.

You obviously haven't read the thread.

No, I'm not talking about little firewalls, and no, I don't 'think' anythin=
g - I *know* it, because I've seen it over and over again, including during=
 my tenure at the largest commercial firewall vendor in the world.

See here for a high-profile example:

<http://files.me.com/roland.dobbins/k54qkv>

I've personally choked a hardware-based firewall rated at 2gb/sec with only=
 80kpps of traffic from an old, PowerPC-based PowerBook, for example.  And =
again, as noted repeatedly in the thread, all that's required to effectivel=
y DDoS servers behind firewalls is to programmatically generate well-formed=
, completely valid traffic which passes all the firewall rules/inspectors/w=
hat-have-you - enough to 'crowd out' legit traffic from legit users. =20

I strongly suggest reading the thread before commenting.

> Have you noticed how easily Drupal servers go down with corrupt MyISAM ta=
bles?  How would S/RTBH and/or flow-spec protect against that?

We're talking about DDoS mitigation in order to keep the servers up and run=
ning, so that they don't go down ungracefully and corrupt anything in the f=
irst place.

Placing a stateful inspection device in a topological position where no sta=
teful inspection is possible due to every incoming packet being unsolicited=
 makes zero sense whatsoever from an architectural standpoint, even without=
 going into implementation-specific details.

Once again - read the thread.=20

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

    Injustice is relatively easy to bear; what stings is justice.

                        -- H.L. Mencken





home help back first fref pref prev next nref lref last post