[127839] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Vyatta as a BRAS

daemon@ATHENA.MIT.EDU (Lamar Owen)
Fri Jul 16 10:03:41 2010

Date: Fri, 16 Jul 2010 10:03:15 -0400
From: Lamar Owen <lowen@pari.edu>
To: nanog@nanog.org
In-Reply-To: <4C3F5246.8080606@bromirski.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thursday, July 15, 2010 02:24:06 pm =C5=81ukasz Bromirski wrote:
> (and I'm all for FreeBSD boxes, don't get me wrong, the whole point
>   of this discussion is that either you're doing hardware forwarding
>   and you're pretty safe [unfortunately often with a lot of caveats,
>   but still], or you're doing software forwarding and you have
>   a nice attack vector open for anyone willing)

This distills one of the points of view nicely.

An operationally useful question is to ask (yourself) at what point (band=
width- and type of traffic- speaking) does a particular box become vulner=
able? 10Mb/s?  100Mb/s?  1Gb/s? 100Gb/s? Traffic directed at the control p=
lane?  Small packet traffic?  Any traffic? =20

Any box; hardware-based or software-based is irrelevant, because at some d=
ata volume all boxes become vulnerable; the variance is only in what volu=
me the box can handle and how well the control plane is protected from th=
at volume.  Test with reasonable traffic loads (and drawing on the collec=
tive wisdom of this group as to what is 'reasonable' for a BRAS is good!)=
, and derive conclusions that fit your need. Knowing these things allows y=
ou to scale your solution to avoid the majority of the problems and buy w=
hat fits your projected scale over the design life of the solution.=20

Take a 2003-vintage OSR7609 (Sup2/MSFC2) still running 12.1E.  Definitely=
 a hardware-based router.  Does it have a nice attack vector?  Perhaps.  I=
s this combination still in use?  I'm not sure I want to know (Sup2/MSFC2=
 is, I know; the 12.1E part is the scary one).=20

Hardware-based is not a magic bullet that destroys attack vectors dead in=
 their tracks (as =C5=81ukasz hints at with the parenthetical caveats rem=
ark).  And software-based is not defenseless, either.


home help back first fref pref prev next nref lref last post