[181937] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NANOG Digest, Vol 90, Issue 1

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Thu Jul 9 03:54:01 2015

X-Original-To: nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: nanog@nanog.org
Date: Wed, 08 Jul 2015 22:26:22 +0700
In-Reply-To: <CAOLsBOvsd9vHeMvbPb=K_jAgPM1_VTYua8i1YxbQFB0T-q0SOg@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org


On 8 Jul 2015, at 21:26, Ramy Hashish wrote:

> I am very happy because somebody is on the same page.

This is not what you were asking about in your original post on this 
topic - you were talking about BGP sessions inside GRE tunnels, which is 
not how most (any?) DDoS mitigation services operate, to my knowledge.

GRE is used over the Internet for many different applications, including 
post-DDoS-mitigation re-injection of legitimate traffic onwards to the 
server/services under protection.  Hardware-based GRE processing is 
required on both ends for anything other than trivial speeds; in 
general, the day of software-based Internet routers is long gone, and 
any organization still running software-based routers on their 
transit/peering edge is at risk.

DDoS mitigation providers using GRE for re-injection should set the MTU 
on their mitigation center diversion interfaces to 1476, and 
MSS-clamping on those same interfaces to 1436, as a matter of course.

This is not a new model; it has been extant for many years.  There are a 
variety of overlay and transit-focused DDoS mitigation service providers 
who utilize this model.  In your original post on this topic, you also 
made the assertion that these issues had not been addressed by DDoS 
mitigation service operators; that assertion is incorrect.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post