Nuno et all,
Count me in for this..
Cheers,

--Ricardo
http://www.cs.ucla.edu/~rveloso

On Feb 13, 2009, at 8:41 AM, Nuno Vieira - nfsi telecom wrote:

Ok, however, what i am talking about is a competelly diferent thing, and i think that my thoughts are alligned with Jens.

We want to have a Sink-BGP-BL, based on Destination.

Imagine, i as an ISP, host a particular server that is getting nn Gbps of DDoS attack. I null route it, and start advertising a /32 to my upstream providers with a community attached, for them to null route it at their network. However, the attacks continue going, on and on, often flooding internet exchange connections and so.

A solution like this, widelly used, would prevent packets to leave their home network, mitigating with effective any kind of DDoS (or packet flooding).

Obviously, we need a few people to build this (A Website, an organization), where when a new ISP connects is added to the system, a prefix list should be implemented, preventing that ISP to announce IP addresses that DON'T belong to him.

The Sink-BGP-BL sends a full feed of what it gots to Member ISP's, and those member ISP's, should apply route-maps or whatever they want, but, in the end they want to discard the traffic to those prefixes (ex: Null0 or /dev/null).

This is a matter or getting enough people to kick this off, to build a website, to establish one or two route-servers and to give use to.

Once again, i am interested on this, if others are aswell, let know. This should be a community-driven project.

regards,
---
Nuno Vieira
nfsi telecom, lda.

nuno.vie...@nfsi.pt
Tel. (+351) 21 949 2300 - Fax (+351) 21 949 2301
http://www.nfsi.pt/



----- "Valdis Kletnieks" <valdis.kletni...@vt.edu> wrote:

How do you vet proposed new entries to make sure that some miscreant
doesn't
DoS a legitimate site by claiming it is in need of black-holing? Note
that
it's a different problem space than a bogon BGP feed or a spam-source
BGP
feed - if the Cymru guys take another 6 hours to do a proper paperwork
and
background check to verify a bogon, or if Paul and company take
another day
to verify something really *is* a cesspit of spam sources, it doesn't
break the
basic concept or usability of the feed.

You usually don't *have* a similar luxury if you're trying to deal
with a
DDoS, because those are essentially a real-time issue.

Oh, and cleaning up an entry in a timely fashion is also important,
otherwise
an attacker can launch a DDoS, get the target into the feed, and walk
away...


Reply via email to