[4335] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SYN floods (was: does history repeat itself?)

daemon@ATHENA.MIT.EDU (Alex.Bligh)
Thu Sep 12 16:18:18 1996

To: "Justin W. Newton" <justin@erols.com>
cc: Avi Freedman <freedman@netaxs.com>,
        stpeters@netheaven.com (Dick St.Peters), nanog@merit.edu
In-reply-to: Your message of "Thu, 12 Sep 1996 15:24:33 EDT."
             <3.0b15.32.19960912152433.01056bf8@pop.erols.com> 
Date: Thu, 12 Sep 1996 21:13:55 +0100
From: "Alex.Bligh" <amb@xara.net>

"Justin W. Newton" <justin@erols.com> wrote:
> At 09:08 PM 9/9/96 -0400, Avi Freedman wrote:
> >This is *exactly* the right thing to do; every provider which does
> >not provide complicated transit (which excludes even certain regionals,
> >alas) should do this at their borders if they don't do it at each customer
> >connect.
> >
> >And everyone should at least filter on each customer 56k/t1/etc...
> >I know router cycles are tight but it might *really* become
> >imperative...
> 
> Am I missing something....
> 
> If I am announcing a network via BGP I am more or less agreeing to carry
> traffic for it.  If I am not I am not.  Therefore, if I filter based on my
> outbound BGP announcements and do not allow any packets which have a source
> address not originating from a network in my BGP announcements then I
> should not be causing any harm to the networks which I am providing
> connectivity to.  This has the added benefit of stopping people from
> defaulting into me at exchange points as I will not carry that traffic
> across my backbone.  I'd love to hear the holes in this theory.
> 
I think you are talking about filtering inbound packets to your
router and restricting them to BGP announcements (I don't
think Avi was - see below). This would be done on the destination
address (checking it was within your announced route set) and
thus doesn't help protect against spoofed source addresses. I
*think* what Avi was talking about was filtering outbound packets
by source address and checking these are within announced routes.
This has additional problems to those listed below where, for
instance, there are deliberately asymmetrical announcements.

Here's some complications with both schemes. Suppose you
have an exhange point where providers peer, but A and B exchange
full routing for backup transit purposes (we do this with another
provider over LINX for example). The if A wants to filter (say)
inbound packets based on whether or not they are for networks
A announces, I have to find out who they are coming from as
A announces full routing to some people (B) and not normal
peers such as C. Incoming packets don't have the IP address
of the last hop router, though I suppose this could be obtained
through ARP, then matched against the IP addresses of BGP neighbours.
But suppose B is giving transit to some networks not within B's
normal announcement to D, without setting next-hop-self. Then
in a backup transit situation I will blackhole packets from D,
as I will be announcing the nets to B who will in turn announce
them to D, who's arp address I don't correlate to an IP address
of a BGP neighbour which I announce those routes to. Route
servers make the entire process even more complex as here you
are getting incoming packets from (or sending outgoing packets
to) IP addresses with whom you have no BGP session.

May be I'm missing something, but I think any non-trivial
transit arrangements make this difficult to say the least.

Alex Bligh
Xara Networks



home help back first fref pref prev next nref lref last post