[27169] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo! Lessons Learned

daemon@ATHENA.MIT.EDU (robert@UU.NET)
Wed Feb 9 20:31:18 2000

From: robert@UU.NET
Message-Id: <200002100127.UAA04880@beefcake2000.argfrp.us.uu.net>
To: Randy Bush <randy@psg.com>
Cc: nanog@nanog.org
In-Reply-To: Message from Randy Bush <randy@psg.com> 
   of "Wed, 09 Feb 2000 14:12:38 PST." <E12IfLi-000257-00@roam.psg.com> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Wed, 09 Feb 2000 20:27:27 -0500
Errors-To: owner-nanog-outgoing@merit.edu


> 
> i am rather amused at folk who fear dialup systems being used as ddos
> slaves.
> 

I'm more worried about a master being connected there.  Remember, with at 
least one of the tools you can trigger the "slaves" via forged ICMP reply 
messages.  It doesn't take a fat pipe to do that and it makes finding the perp 
that much harder, especially since dial connections are generally more 
anonymous.

Yes, we have tested "source validation" in our live dial network.  Yes, there 
is a performance impact.  "Can do" or "Can't do" depends on how many dial 
customers you are trying to pile into one box, and what equipment you are 
using.

Also, ingress filtering one-hop-up isn't necessarily so easy.  Some of us will 
dynamically route prefixes other than /32 to certain dial customers.  This 
complicates things.




home help back first fref pref prev next nref lref last post