[164801] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ddos attacks

daemon@ATHENA.MIT.EDU (Jared Mauch)
Fri Aug 2 10:57:58 2013

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <A33BEE74-E8B2-405B-B48C-18E6AF8479B5@ianai.net>
Date: Fri, 2 Aug 2013 10:55:17 -0400
To: "Patrick W. Gilmore" <patrick@ianai.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Aug 2, 2013, at 10:38 AM, "Patrick W. Gilmore" <patrick@ianai.net> =
wrote:

> On Aug 02, 2013, at 09:37 , sgraun@airstreamcomm.net wrote:
>=20
>> I=92m curious to know what other service providers are doing to =
alleviate/prevent ddos attacks from happening in your network.  Are you =
completely reactive and block as many addresses as possible or null0 =
traffic to the effected host until it stops or do you block certain =
ports to prevent them.  What=92s the best way people are dealing with =
them?
>=20
> #1: Ensure your network is BCP38 compliant.
>=20
> Hard to complain about others attacking you when you are not clear. =
And if you do not block source-address spoofing, you are not clean.
>=20
> As for the rest, I'll let others with more recent experience explain =
what they do.

We have had challenges with deploying BCP38, even on simple connections. =
 We have outstanding defects in IOS-XR that prevent us from deploying =
it.

Wherever possible we have enabled source address validation (bcp38).  I =
do have a map of some networks that don't do this as a result of the =
OpenResolverProject.org data.

Here's some top ASNs that can send spoofed packets:

  Count ASN
---------------
   1006 18747=20
   1004 262824=20
    877 196753=20
    522 29119=20
    516 5617=20
    514 34977=20
    513 47570=20
    513 12615=20
    512 262336=20
    512 12301=20
    372 6739=20


These ASNs spoof my machine I use to send queries out to 8.8.8.8 and =
goole responds back to me.

Likely some firewall/CPE/NAT that does this, but the provider lets those =
spoofed packets reach outside their network to google.

I have many more of these if folks want to see a broader list.

If you look at the ASN relationships involved here, it means either 3491 =
or 3257 allows these spoofed packets from 18747.

- Jared=


home help back first fref pref prev next nref lref last post