[147611] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Is AS information useful for security?

daemon@ATHENA.MIT.EDU (Drew Weaver)
Thu Dec 15 11:29:45 2011

From: Drew Weaver <drew.weaver@thenap.com>
To: "'Justin M. Streiner'" <streiner@cluebyfour.org>, "nanog@nanog.org"
 <nanog@nanog.org>
Date: Thu, 15 Dec 2011 11:28:48 -0500
In-Reply-To: <Pine.LNX.4.64.1112150933310.1202@whammy.cluebyfour.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org



-----Original Message-----
From: Justin M. Streiner [mailto:streiner@cluebyfour.org]=20
Sent: Thursday, December 15, 2011 9:45 AM
To: nanog@nanog.org
Subject: Re: Is AS information useful for security?

>origin-AS could be another story.  If you know of an AS that is being used=
 by the bad guys for bad purposes, you can write a routing policy to dump a=
ll traffic to/from that AS into the bit bucket or take some other action th=
at could be dictated by your security policy.  In that case, a routing poli=
cy could be >considered an extension of a security policy.

I could be wrong here but I believe origin-AS uses a lookup from the routin=
g table to figure out what the originAS for the source IP should be (and no=
t what it explicitly IS) which means the information is unreliable.

For example if someone is sending spoofed packets towards you the origin AS=
 will always show up as the originator of the real route instead of the ori=
gin AS of the actual traffic.

This is why it would be useful to have the originAS (from the actual origin=
) in the packet header.

Thanks,
-Drew



home help back first fref pref prev next nref lref last post