[74555] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FYI: RFC 3882 on Configuring BGP to Block Denial-of-Service Attacks

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Fri Oct 1 20:53:27 2004

Date: Sat, 02 Oct 2004 00:52:17 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <20041001.173431.3306.1110005@webmail11.lax.untd.com>
To: "Fergie (Paul Ferguson)" <fergdawg@netzero.net>
Cc: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu



On Sat, 2 Oct 2004, Fergie (Paul Ferguson) wrote:

> Given recent discussions on blackholing traffic, this may
> be of interest.
>
> - ferg
>
> [snip]
>
> A new Request for Comments is now available in online RFC libraries.
>
>
>         RFC 3882
>
>         Title:      Configuring BGP to Block Denial-of-Service Attacks
>         Author(s):  D. Turk
>         Status:     Informational
>         Date:       September 2004
>         Mailbox:    doughan.turk@bell.ca
>         Pages:      8
>         Characters: 19637
>         Updates/Obsoletes/SeeAlso:    None
>
>         I-D Tag:    draft-turk-bgp-dos-07.txt
>
>         URL:        ftp://ftp.rfc-editor.org/in-notes/rfc3882.txt
>
>
> This document describes an operational technique that uses BGP
> communities to remotely trigger black-holing of a particular
> destination network to block denial-of-service attacks.  Black-holing
> can be applied on a selection of routers rather than all BGP-speaking
> routers in the network.  The document also describes a sinkhole tunnel

This tunneling is 'centertrack' which is patented... Also, tunneling is a
dangerous prospect when you get very large amounts of attack traffic.

home help back first fref pref prev next nref lref last post