[80631] in North American Network Operators' Group
anycast and ddos
daemon@ATHENA.MIT.EDU (Randy Bush)
Fri May 6 12:41:16 2005
From: Randy Bush <randy@psg.com>
Date: Fri, 6 May 2005 06:40:34 -1000
To: nanog@nanog.org
Errors-To: owner-nanog@merit.edu
it seems that anycasting was quite insufficient to protect
netsol's service from being severely damaged (udp dead, tcp
worked) for a considerable length of time by a ddos [0] last
week [1]. it would be very helpful to other folk concerned
with service deployment to understand how the service in
question was/is anycast, and what might be done differently
to mitigate exposure of similar services.
anyone have clues or is this ostrich city? maybe a preso at
nanog would be educational.
randy
---
[0] - as it seems that the ddos sources were ip address
spoofed (which is why the service still worked for
tcp), i owe paul an apology for downplaying the
immediacy of the need for source address filtering.
[1] - netsol is not admitting anything happened, of course
<sigh>. but we all saw the big splash as it hit the
water, the bubbles as it sank, and the symptoms made
the cause pretty clear.