[27272] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco says attacks are due to operational practices

daemon@ATHENA.MIT.EDU (Tom Beeson)
Thu Feb 10 20:55:57 2000

Message-Id: <4.2.2.20000210175901.00a4a6d0@mail.nm.net>
Date: Thu, 10 Feb 2000 18:48:06 -0700
To: Sean Donelan <sean@donelan.com>
From: Tom Beeson <beeson@nm.net>
Cc: nanog@merit.edu
In-Reply-To: <20000210222955.19534.cpmta@c004.sfo.cp.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


At 02:29 PM 2/10/00 -0800, Sean Donelan wrote:

>In an InteractiveWeek article the head of Cisco's security products group
>says the attacks are an operational problem not a technical problem.
>
> >Routers from Cisco and other vendors have the ability to detect the 
> signature
> >patterns of a denial-of-service attack, and the routers can filter out that
> >traffic, Farnsworth said.
> >
> >"The router knows which sources are legitimate or not and drops on the floor
> >anything suspicious," Farnsworth said. "Generally speaking, ingress 
> filtering
> >and committed rates are effective in terms of preventing [malicious] traffic
> >from ever showing up, or filtering it to a reasonable rate."

I would agree with Farnsworth.  Cisco routers do have some of the richest 
filtering mechanisms available.  Though the configuration is best done at 
the edge routers (not on any core backbone).  Considering the huge number 
of end sites out there, this is labor intensive.  If you were a medium or 
large ISP that had 250+ end sites behind you, then you would have to go out 
and reprogram over 250+ routers.  Placing the same changes on the core 
routers is impractical since it would be very CPU and Memory intensive and 
just as big a pain to administer.  We made a decision over a year ago to 
start making changes on as many of our customer end sites as possible.

We wrote an in-house perl script to take a Cisco router configuration and 
build inbound and outbound filters.  These filters are then applied to the 
serial interface that connects to our network and toward the Internet.  The 
inbound filter prevents outsiders from spoofing a LAN IP address aimed at 
that specific site.  The outbound filter prevents someone on the LAN from 
sending spoofed packets (bogus source IP addresses) from getting to the 
Internet.  Our script also adds the "no IP directed-broadcast", "no service 
udp-small-servers", and "no service tcp-small-servers" commands.  We also 
add restricted telnet access and other security related commands.  The 
suggested modifications are written to a text file and can be further 
edited and TFTP'd to the router at the discretion of the engineer.

We routinely manage a large majority our customer's routers.  For our 
customers who manage their own routers, we urge them to add these filets 
and work to make them aware of any security changes they should 
make.  Education of the customer becomes key to stopping spoofed packets 
from leaving your network.  :-)

We turned on logging on a few sites where we suspected some suspicious 
activity and actually logged a number of spoofed packets that were caught 
in the anti-spoofing filters.  The bad news is that we have not caught the 
actual persons sending out the spoofed packets.  We suspect that these guys 
may have moved on somewhere else.  If you are willing to commit the 
resources and time setting anti-spoofing filters on all your end site 
routers, it is a very worthwhile thing.


-- Tom Beeson

My 2 cents worth. Views are my own and not necessarily that of the company 
for which I work.

--**--**--**--**--**--**--**--**--**--**--**--
Tom Beeson		Oso Grande Technologies
Network Engineer 	A New Mexico Technet Co.
(505) 345-1748
noc@nm.net
--**--**--**--**--**--**--**--**--**--**--**--



home help back first fref pref prev next nref lref last post