[175945] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDOS, IDS, RTBH, and Rate limiting

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Sat Nov 8 22:27:42 2014

X-Original-To: nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: "NANOG (nanog@nanog.org)" <nanog@nanog.org>
Date: Sun, 09 Nov 2014 10:27:27 +0700
In-Reply-To: <Pine.LNX.4.61.1411082159590.10544@soloth.lewis.org>
Errors-To: nanog-bounces@nanog.org


On 9 Nov 2014, at 10:12, Jon Lewis wrote:

> The tricky part is when to remove the route...since you can't tell if 
> the attack has ended while the target is black holed by your 
> upstreams.

You can with NetFlow, if you've D/RTBHed the IP in question on your own 
infrastructure.  NetFlow reports statistics on dropped traffic (except 
on a few platforms with implementation deficiencies).

But this kind of thing punishes the victim.  It's far better to do 
everything possible to *protect* the target(s) of an attack, and only 
use D/RTBH as a last resort.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post