[4532] in North American Network Operators' Group
Re: New Denial of Service Attack on Panix
daemon@ATHENA.MIT.EDU (Dick St.Peters)
Tue Sep 17 21:44:02 1996
Date: Tue, 17 Sep 1996 21:38:32 -0400
From: "Dick St.Peters" <stpeters@NetHeaven.com>
To: "Justin W. Newton" <justin@erols.com>
Cc: nanog@merit.edu, iepg@iepg.org
In-Reply-To: <3.0b15.32.19960917162512.00fdde1c@justin.erols.com>
> >Logging denies will fill up your log anyway.
>
> That depends how your network is setup. Ours would have the route going to
> Null0, so it wouldn't be shot back out via the default route. This hides
> any internal instability from being announced to the outside world except
> in /extreme/ cases. (Like we fall completely off the net). Why would you
> want the packet transiting back and forth across your T-1 until the TTL
> expires anyway? Much better to black hole the sucker.
The context was the Livingston boxes. To the best of my knowledge
they don't have any analog of Null0 routing, although I've never
actually used an IRX, just Livingston's Portmaster CS's.
That said, I don't see a lot of difference between using a Null0 route
and filtering against outbound destinations in your own address space
as ways to black hole the suckers. At least I _know_ filtering can't
be propagated to other routers.
--
Dick St.Peters, Gatekeeper, Pearly Gateway, Ballston Spa, NY
stpeters@NetHeaven.com Owner, NetHeaven 518-885-1295/800-910-6671
Albany/Saratoga/Glens Falls/North Creek/Lake Placid/Blue Mountain Lake
First Internet service based in the 518 area code