[45102] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Growing DoS attacks

daemon@ATHENA.MIT.EDU (Jared Mauch)
Wed Jan 16 18:56:03 2002

Date: Wed, 16 Jan 2002 18:53:44 -0500
From: Jared Mauch <jared@puck.Nether.net>
To: Paul Timmins <paul@timmins.net>
Cc: Pascal Gloor <pascal.gloor@spale.com>, nanog@nanog.org
Message-ID: <20020116235344.GB30436@puck.nether.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <5.1.0.14.2.20020116184833.0344b630@new.workbench.net>
Errors-To: owner-nanog-outgoing@merit.edu


	I think the point is that (despite everyones thoughts
that use it) IRC is not considered a super-important network service
these days.  If the irc server is dampened or the attack can't reach it
it just penalizes the compromised host(s) network(s) more than the
person who hosts the irc server.

	- jared

On Wed, Jan 16, 2002 at 06:49:48PM -0500, Paul Timmins wrote:
> 
> What about BGP route flap dampening, people use that, don't they?
> -Paul
> 
> At 06:12 PM 1/16/2002, you wrote:
> >Get a box, and run Zebra BGPD, which will announce that /24 to your 
> >network.
> >Then do a script which monitors the traffic to the irc server, and on a
> >certain threshold, kill BGPD. wait a certain time, like 15minutes or so, 
> >and
> >restart BGPD. It would be nice to check the traffic every minute and if 2
> >consecutive checks are positive kill bgpd. That mean that you  may be able
> >to STOP dDoS to irc servers within 2-3 minutes...

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.

home help back first fref pref prev next nref lref last post