[56972] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Using Policy Routing to stop DoS attacks

daemon@ATHENA.MIT.EDU (fingers)
Tue Mar 25 10:20:06 2003

Date: Tue, 25 Mar 2003 17:19:29 +0200 (SAST)
From: fingers <fingers@fingers.co.za>
To: nanog@merit.edu
In-Reply-To: <Pine.LNX.4.33.0303251009310.28569-100000@bkr.towardex.com>
Errors-To: owner-nanog-outgoing@merit.edu


> uRPF will certainly save a bit of CPU cycles than access-lists or policy
> routing.. it would be intertesting to know any kind of 'common practice'
> ways people use to fool the router so that it will think such offensive
> source IP's are hitting uRPF.

null route? even with a loose check, if you implement some kind of
blackhole system, send the miscreant source adress to say, 172.1.1.1 and
have 172.1.1 routed to null 0, uRPF should kill any src/dst packets for
the host/block if i'm not mistaken.

home help back first fref pref prev next nref lref last post