[38242] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: engineering --> ddos and flooding

daemon@ATHENA.MIT.EDU (Mark Mentovai)
Fri Jun 1 14:42:48 2001

Date: Fri, 1 Jun 2001 14:36:49 -0400 (EDT)
From: Mark Mentovai <mark-list@mentovai.com>
To: Walter Prue <prue@ISI.EDU>
Cc: <nanog@merit.edu>
In-Reply-To: <200106011815.SAA29053@i-14.isi.edu>
Message-ID: <Pine.GSO.4.33.0106011432450.449-100000@oak.ggn.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


Walter Prue wrote:
>I came up with a solution for networks with ISP connections to deal
>quickly with DDOS attacks without having to be able to work with a
>network technician at the ISP for immediate relief.  If the ISP agrees,
>install a second low speed connection to the same router your primary
>router BGP peers with.  Through this low speed connection you run a
>second bgp session advertising the /32 that is being attacked by the
>DDOS.  You mark the /32 as NO-ADVERTISE so the route doesn't leave the
>border router.

Or, without adding an extra connection, negotiate a NULLROUTE community with
your upstream provider.  This would be a wonderful addition to the
well-known BGP communities.  I'll bring this up on IDR.

Mark


home help back first fref pref prev next nref lref last post