[74879] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 making it work, solving problems

daemon@ATHENA.MIT.EDU (Fred Baker)
Tue Oct 19 08:20:27 2004

Date: Tue, 19 Oct 2004 08:19:32 -0400
To: JP Velders <jpv@veldersjes.net>
From: Fred Baker <fred@cisco.com>
Cc: Paul Vixie <vixie@vix.com>, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.58.0410191309360.12384@jp-gp.vsi.nl>
Errors-To: owner-nanog-outgoing@merit.edu


At 01:11 PM 10/19/04 +0200, JP Velders wrote:
>As it was "in the old days": first clean up your own act and then start 
>pointing at others that they're doing "it" wrong.

hear hear... But Paul knows and in fact does that. He is pointing out the 
difficulty of getting people to do basic things that are for their own 
benefit.

For example, how many ISPs use TCP MD5 to limit the possibility of a 
BGP/TCP connection getting hijacked or disrupted by a ddos attack? But this 
has been in the code since ~1990, and was put there because of a fairly 
serious and specific attack that was made on Internet routing, and benefits 
primarily the ISP that enables the procedure in that it knows that its 
routes are coming to it from systems it has chosen to trust.

Ingress filters help the ISP that installs them, in that a certain class of 
attacks are prevented among customers of the ISP. Would it be better if all 
ISPs and all edge networks put appropriate filters in place? Absolutely. 
But even if they do not, the ISP saves itself that much trouble.

Where ingress filters don't help, of course, is when the attacks come from 
an apparently-legitimate address. Then we are off to other tools. 


home help back first fref pref prev next nref lref last post