When I was looking at the website before I didn't really see any
mention of uRPF, just the use of ACLs, maybe I missed it, but it's not
encouraging if I can't spot it quickly.  I just tried a search and the
only thing that popped up was a how-to for a Cisco 7600 VXR.

http://www.bcp38.info/index.php/HOWTO:CISCO:7200VXR

On Fri, Feb 28, 2014 at 9:04 AM, Jay Ashworth <j...@baylink.com> wrote:
> You mean, like Bcp38(.info)?
>
>
> On February 28, 2014 9:02:03 AM EST, Ray Soucy <r...@maine.edu> wrote:
>>
>> I'm wondering how many operators don't have systems in place to
>> quickly and efficiently filter problem host systems.
>> I see a lot of talk of ACL usage, but not much about uRPF and black
>> hole filtering.
>>
>> There are a few white papers that are worth a read:
>>
>>
>> http://www.cisco.com/c/dam/en/us/products/collateral/security/ios-network-foundation-protection-nfp/prod_white_paper0900aecd80313fac.pdf
>>
>> http://www.cisco.com/web/about/security/intelligence/urpf.pdf
>>
>> If you have uRPF enabled on all your access routers then you can
>> configure routing policy such that advertising a route for a specific
>> host system will trigger uRPF to drop the traffic at the first hop, in
>> hardware.
>> This prevents you from having to maintain ACLs or even give out access
>> to routers.  Instead, you can use a small router or daemon that
>> disables hosts by advertising them as a route (for example, we just
>> use a pair of small ISR 1841 routers for this); this in turn can be
>> tied into IPS or a web UI allowing your NOC to disable a problem host
>> at the first hop and prevent its traffic from propagating throughout
>> the network without having to know the overall architecture of the
>> network or determine the best place to apply an ACL.
>>
>> I've seen a lot of talk on trying to filter specific protocols, or
>> rate-limit, etc. but I really feel that isn't the appropriate action
>> to take.  I think disabling a system that is a problem and notifying
>> its maintainer that they need to correct the issue is much more
>> sustainable.  There are also limitations on how much can be done
>> through the use of ACLs.  uRPF and black hole routing
>>   scale
>> much
>> better, especially in response to a denial of service attack.
>>
>> When the NTP problems first started popping up, we saw incoming NTP of
>> several Gb, without the ability to quickly identify and filter this
>> traffic a lot of our users would have been dead in the water because
>> the firewalls they use just can't handle that much traffic; our
>> routers, on the other hand, have no problem throwing those packets
>> out.
>>
>> I only comment on this because one of the comments made to me was
>> "Can't we just use a firewall to block it?".  It took me over an hour
>> to explain that the firewalls in use didn't have the capacity to
>> handle this level of traffic -- and when I tried to discuss hardware
>> vs. software filtering, I got a deer-in-the-headlights look. :-)
>>
>>
>> On Thu, Feb 27, 2014 at 8:57 PM, Keegan Holley <no.s...@comcast.net>
>> wrote:
>>>
>>>  It depends on how many customers you have and what sort of contract you
>>> have with them if any.  A significant amount of attack traffic comes from
>>> residential networks where a "one-size-fits-all" policy is definitely best.
>>>
>>>  On Feb 26, 2014, at 4:01 PM, Jay Ashworth <j...@baylink.com> wrote:
>>>
>>>>  ----- Original Message -----
>>>>>
>>>>>  From: "Brandon Galbraith" <brandon.galbra...@gmail.com>
>>>>
>>>>
>>>>>  On Wed, Feb 26, 2014 at 6:56 AM, Keegan Holley <no.s...@comcast.net>
>>>>>  wrote:
>>>>>>
>>>>>>  More politely stated, it's not the responsibility of the operator to
>>>>>>  decide what belongs on the network and what doesn't. Users can run
>>>>>> any
>>>>>>  services that's not illegal or even reuse ports for other
>>>>>>  applications.
>>>>
>>>>
>>>>>  Blocking chargen at the edge doesn't seem to be outside of the realm
>>>>>  of possibilities.
>>>>
>>>>
>>>>  All of these conversations are variants of "how easy is it to set up a
>>>>  default ACL for loops, and then manage exceptions to it?".
>>>>
>>>>  Assuming your gear permits it, I don't personally see all that much
>>>>  Bad Actorliness in setting a relatively tight bidirectional ACL for
>>>>  Random Edge Customers, and opening up -- either specific ports, or
>>>>  just "to a less-/un-filtered ACL" on specific request
>>>>  .
>>>>
>>>>  The question is -- as it is with BCP38 -- *can the edge gear handle
>>>> it*?
>>>>
>>>>  And if not: why not?  (Protip: because buyers of that gear aren't
>>>>  agitating for it)
>>>>
>>>>  Cheers,
>>>>  -- jra
>>>>  --
>>>>  Jay R. Ashworth                  Baylink
>>>> j...@baylink.com
>>>>  Designer                     The Things I Think
>>>> RFC 2100
>>>>  Ashworth & Associates       http://www.bcp38.info          2000 Land
>>>> Rover DII
>>>>  St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727
>>>> 647 1274
>>>
>>>
>>
>>
>>
>
> --
> Sent from my Android phone with K-9 Mail. Please excuse my brevity.



-- 
Ray Patrick Soucy
Network Engineer
University of Maine System

T: 207-561-3526
F: 207-561-3531

MaineREN, Maine's Research and Education Network
www.maineren.net

Reply via email to