Some thoughts on BCOP TF objectives.

The current statements of BCOP TF Charter and activities do not make distinctions between Practices that are good for the Internet (mutually beneficial) and Practices that are good recommendations for the individual Operator (altruistic). MANRS clearly sits in the former, but does contain some altruistic recommendations also.

I suggest that the BCOP TF charter should be clarified to state clearly whether its scope is solely BCOPs that are mutually beneficial. There seem to me to be a lot of opportunities for more altruistic output, but these are not being discussed.

I happen to be employed by Arbor Networks so I hear a lot about bad things that happen across the Internet.

Considerations for BCOPs that could be worked on:

 * Amplification attacks.  Avoid being an Amplifier.  Do not respond to
   connectionless service requests from outside of your own address
   space.  DNS, NTP, Chargen...  Configure your servers and ingress
   filters accordingly. (mutually beneficial)
 * For Internet Access providers, consider offering, as the default
   entry level Internet Access Service, something which does not allow
   external DNS / NTP resolution, to limit some of the methods
   available to 'malware' that gets on to consumer systems. (mutually
   beneficial)
 * Implement a separate network for monitoring and managing your
   network.  Otherwise, a large traffic anomaly, like a DoS attack, may
   flood your internal links and make your network invisible and
   uncontrollable.  A physically separate network is best because
   virtual networks have to have classifiers that decide the
   priority/VLAN for arriving traffic and these can also be overwhelmed
   by large anomalies, with the same bad results. (altruistic)
 * When acquiring routers and networking equipment, pay attention to
   the need to monitor.  Can a new device generate flow reports and
   process SNMP requests at useful rates without impairing your
   forwarding performance below the level you need?  Be prepared for
   exceptional packet rates, not just bit rates. (altruistic)
 * Discuss Flowspec opportunities with your peers and transit providers
   to give yourself as many opportunities as possible for traffic
   engineering to achieve mitigation. (altruistic)
 * Customer contracts and DoS attacks.  Make it clear that the customer
   is contracting to receive a limited amount of bandwidth (and packet
   rate).  If they attract a higher rate of traffic, the ISP will HAVE
   to drop some traffic randomly, and may need to drop all traffic to
   protect its other customers.  Consider offering mitigation services
   to customers that wish to protect themselves against these
   incidents.  (altruistic)
 * Customers that have totally free access to the Internet represent
   additional risk to you, the ISP.  For customers that want the full
   experience, cover your additional risk mitigation costs. (altruistic)

Regards

Steve

Reply via email to