[52974] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS issues various

daemon@ATHENA.MIT.EDU (David G. Andersen)
Thu Oct 24 16:32:01 2002

Date: Thu, 24 Oct 2002 16:30:20 -0400
From: "David G. Andersen" <dga@lcs.mit.edu>
To: Richard A Steenbergen <ras@e-gerbil.net>
Cc: "Kelly J. Cooper" <kcooper@genuity.net>, nanog@merit.edu
Mail-Followup-To: "David G. Andersen" <dga@lcs.mit.edu>,
	Richard A Steenbergen <ras@e-gerbil.net>,
	"Kelly J. Cooper" <kcooper@genuity.net>, nanog@merit.edu
In-Reply-To: <20021024200718.GD587@overlord.e-gerbil.net>
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, Oct 24, 2002 at 04:07:18PM -0400, Richard A Steenbergen mooed:
> 
> We're still working on the distributed attacks, but eventually we'll come 
> up with something just as effective. If it was as easy to scan for 
> networks who don't spoof filter as it is to scan for networks with open 
> broadcasts, I think we'd have had that problem licked too.

  Are you sure? 

*  A smurf attack hurts the open broadcast network as much (or more) 
   than it does the victim.  A DDoS attack from a large number
   of sites need not be all that harmful to any one traffic source.

*  'no ip directed broadcast', which is becoming the default behavior
   for many routers and end-systems,
              vs.
   'access-list 150 deny  ip ... any'
   'access-list 150 deny  ip ... any'
   ...
   'access-list 150 permit ip any any'

   (ignoring rpf, which doesn't work for everyone).

Until the default behavior of most systems is to block spoofed packets,
it's going to remain a problem.

  -Dave, whose glass is half-empty this week. :)

-- 
work: dga@lcs.mit.edu                          me:  dga@pobox.com
      MIT Laboratory for Computer Science           http://www.angio.net/
      I do not accept unsolicited commercial email.  Do not spam me.

home help back first fref pref prev next nref lref last post