[127788] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Vyatta as a BRAS

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Wed Jul 14 10:12:23 2010

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Wed, 14 Jul 2010 14:12:07 +0000
In-Reply-To: <82hbk2nphu.fsf@mid.bfk.de>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jul 14, 2010, at 8:48 PM, Florian Weimer wrote:

> From or to your customers?

Both.

> Stopping customer-sourced attacks is probably a good thing for the Intern=
et at learge.

Concur 100%.

>  And you can't combat attacks targeted at customers within your own netwo=
rk unless you've got very large WAN
> pipes, moving you into the realm of special-purpose hardware for other re=
asons.

Sure, you can, via S/RTBH, IDMS, et. al.  While DNS reflection/amplificatio=
n attacks are used to create crushing volumes of attack traffic, and even s=
mallish botnets can create high-volume attacks, most packet-flooding attack=
s are predicated on throughput - i.e., pps - rather than bandwidth, and ten=
d to use small packets.  Of course, they can use *lots and lots* of small p=
ackets, and often do, but one can drop these packets via the various mechan=
isms one has available, then reach out to the global opsec community for fi=
ltering closer to the sources.

The thing is, with many DDoS attacks, the pps/bps/cps/tps required to disru=
pt the targets can be quite small, due to the unpreparedness of the defende=
rs.  Many high-profile attacks discussed in the press such as the Mafiaboy =
attacks, the Estonian attacks, the Russian/Georgian/Azerbaijan attacks, the=
 China DNS meltdown, and the RoK/USA DDoS attacks were all a) low-volume, b=
) low-throughput, c) exceedingly unsophisticated, and d) eminently avoidabl=
e via sound architecture, deployment of BCPs, and sound operational practic=
es.

In fact, many DDoS attacks are quite simplistic in nature and many are low =
in bandwidth/throughput; the miscreants only use the resources necessary to=
 achieve their goals, and due to the unpreparedness of defenders, they don'=
t have a need to make use of overwhelming and/or complex attack methodologi=
es.

This doesn't mean that high-bandwidth, high-throughput, and/or complex DDoS=
 attacks don't occur, or that folks shouldn't be prepared to handle them; q=
uite the opposite, we see a steady increase in attack volume, thoughput and=
 sophistication at the high end.  But the fact of the matter is that many D=
DoS targets - and associated network infrastructure, and services such as D=
NS - are surprisingly fragile, and thus are vulnerable to surprisingly simp=
le/small attacks, or even inadvertent/accidental attacks.

> Previously, this was really a no-brainer because you couldn't get PCI
> cards with the required interfaces, but with Ethernet everywhere, the
> bandwidths you can handle on commodity hardware will keep increasing.

Concur 100%.

> Eventually, you'll need special-purpose hardware only for a smallish
> portion at the top of the router market, or if you can't get the
> software with the required protocol support on other devices.

I believe that the days of software-based routers are numbered, period, due=
 to the factors you describe.  Of course, the 'top of the router market' se=
ems to keep moving upwards, despite many predictions to the contrary.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

    Injustice is relatively easy to bear; what stings is justice.

                        -- H.L. Mencken





home help back first fref pref prev next nref lref last post