[177267] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDOS solution recommendation

daemon@ATHENA.MIT.EDU (Ca By)
Sun Jan 11 10:24:26 2015

X-Original-To: nanog@nanog.org
In-Reply-To: <5A6E09C5-ED1C-4DB5-9E48-74F54D5C5131@arbor.net>
Date: Sun, 11 Jan 2015 07:23:47 -0800
From: Ca By <cb.list6@gmail.com>
To: Roland Dobbins <rdobbins@arbor.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Sun, Jan 11, 2015 at 6:58 AM, Roland Dobbins <rdobbins@arbor.net> wrote:

>
> On 11 Jan 2015, at 20:52, Ca By wrote:
>
>  1. BCP38 protects your neighbor, do it.
>>
>
> It's to protect yourself, as well.  You should do it all the way down to
> the transit customer aggregation edge, all the way down to the IDC access
> layer, etc.
>
>  2.  Protect yourself by having your upstream police Police UDP to some
>> baseline you are comfortable with.
>>
>
> This will come back to haunt you, when the programmatically-generated
> attack traffic 'crowds out' the legitimate traffic and everything breaks.
>
> You can only really do this for ntp.


I do it for all UDP.  There are bw policers and pps policers.  As I said,
this is known to work for me.  YMMV.

It is a managed risk, like anything.  There are no silver bullets.

I feel bad for people developing things like QUIC and WebRTC on UDP.  But.
i have already informed them of this risk to using UDP instead of a new L4
protocol.

Protip: UDP is a cesspool.  Don't build things on a cesspool where the vast
majority of traffic is illegitimate.   Guilty by association is a real
thing.

 UDP will not have a renaissance

CB

>
>
>  3.  Have RTBH ready for some special case.
>>
>
> S/RTBH and/or flowspec are better (S/RTBH does D/RTBH, too).
>
> -----------------------------------
> Roland Dobbins <rdobbins@arbor.net>
>

home help back first fref pref prev next nref lref last post