[47274] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Effective ways to deal with DDoS attacks?

daemon@ATHENA.MIT.EDU (Richard A Steenbergen)
Wed May 1 22:23:23 2002

Date: Wed, 1 May 2002 22:22:42 -0400
From: Richard A Steenbergen <ras@e-gerbil.net>
To: nanog@merit.edu
Message-ID: <20020502022242.GD523@overlord.e-gerbil.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20020502021544.GA31943@ussenterprise.ufp.org>
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, May 01, 2002 at 10:15:44PM -0400, Leo Bicknell wrote:
> 
> In a message written on Wed, May 01, 2002 at 08:17:04PM -0500, dies wrote:
> > Then you are pushing out /32's and peers would need to accept them.  Then
> > someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!
> 
> I'm not sure what form this would take, but I have long wished
> route processing could be sent into a "programming language".  For
> this specific example it would be nice to set a maximum number of
> route limit for the total number of routes on the session, as well
> as /per community/.

Agreed wholeheartedly. But then you'd have to have network engineers who 
could program (and no perl doesn't count). :)

> That is, community xxxx:666 == blackhole me, and I could limit each
> peer to say, 6 of these at a time.  More would not take down the
> session, but simply be ignored.
> 
> I can carry 6 /32's for every peer I have, and if they only have
> 6, they will probably use them for the most abusive target.

I give it 2 months, then they'll start hitting random dst IPs in a target
prefix (say a common /24 going through the same path).

-- 
Richard A Steenbergen <ras@e-gerbil.net>       http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)

home help back first fref pref prev next nref lref last post