[190930] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Host.us DDOS attack -and- related conversations

daemon@ATHENA.MIT.EDU (James Bensley)
Wed Aug 3 10:42:35 2016

X-Original-To: nanog@nanog.org
In-Reply-To: <056d8e33-e2f1-db9c-7148-095bd200f4e5@pubnix.net>
From: James Bensley <jwbensley@gmail.com>
Date: Wed, 3 Aug 2016 15:40:17 +0100
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On 3 August 2016 at 15:16, Alain Hebert <ahebert@pubnix.net> wrote:
>     PS:
>
>         I will like to take this time to underline the lack of
> participation from a vast majority of ISPs into BCP38 and the like.  We
> need to keep educating them at every occasion we have.
>
>         For those that actually implemented some sort of tech against
> it, you are a beacon of hope in what is a ridiculous situation that has
> been happening for more than 15 years.


At the risk of starting a "NANOG war" [1], BCP isn't a magic wand.

If I find a zero day in the nasty customised kernels that OVH run on
their clients boxes, I only need 300 compromised hosts to send 300Gbps
of traffic without spoofing the IP or using amplification attacks [2].

I can rent a server with a 10Gbps connection for 1 hour for a few
quid/dollars. I could generate hundreds of Gbps of traffic for about
=C2=A31000 from legitimate IPs, paid for with stolen card details. How will
BCP save you then? Can everyone stop praising it like it was a some
magic bullet?

James.


[1] A pathetic and futile one, so different from the rest.

[2] Subsitute OVH for any half decent provider that isn't really oversubscr=
ibed.

home help back first fref pref prev next nref lref last post