BGP route explosion

2002-05-01 Thread Andrew Herdman


I had a network outage this morning brought about by a BGP route explosion at around 
6:30 EST(-4) this morning.  Anyone else notice it, and who the culprit whats?  I got 
the exact same hit from both my providers, ATT Can, and Telus.

Thanks
  Andrew




Re: BGP route explosion

2002-05-01 Thread Neil J. McRae


 
 I had a network outage this morning brought about by a BGP route explosion at around 
6:30 EST(-4) this morning.  Anyone else notice it, and who the culprit whats?  I got 
the exact same hit from both my providers, ATT Can, and Telus.

Yeah its been reported a few places - we saw about 130K routes.

--
Neil J. McRae - Alive and Kicking
[EMAIL PROTECTED]



Re: BGP route explosion

2002-05-01 Thread Marshall Eubanks


On Wed, 1 May 2002 08:42:02 -0400
 [EMAIL PROTECTED] (Andrew Herdman) wrote:
 
 I had a network outage this morning brought about by a
 BGP route explosion at around 6:30 EST(-4) this morning.
 Anyone else notice it, and who the culprit whats?  I got
 the exact same hit from both my providers, ATT Can, and
 Telus.
 
 Thanks
   Andrew
 

I did not see this on Sprint, UUNet or vBNS.

Regards
Marshall Eubanks



Re: BGP route explosion

2002-05-01 Thread matthew zeier



 AS818 saw the spike, courtesy Geoff Houston's Table Data Program:

 http://ryouko.dgim.crc.ca/bgp/bgp-all.html

Neat tool - I tried to grab the src but the first 1000 or so lines are blank
and uncompilable.  Anyone have a good version of the src?




Verizon fiber cut in Midtown Manhattan

2002-05-01 Thread Rishi Singh


http://1010wins.com/topstories/StoryFolder/story_1199630592_html

WINS) May 1, 2002 6:49 am US/Eastern 
(New York-AP) -- Telephone service in a section of midtown Manhattan has
been disrupted by a construction accident. 

Verizon spokesman Cliff Lee says a construction crew working on 58th Street
between Lexington and Third avenues yesterday cut into a cable underground,
causing the disruption.

It's unclear how many customers have experienced problems. Police say
thousands of people have been affected. Lee says Verizon has received about
400 calls from customers having difficulty. Repair crews are working at the
scene.

The affected area is between Third and Fifth avenues from 57th to 65th
streets.

(Copyright 2002 by The Associated Press. All Rights Reserved.) 



Re: news-peering

2002-05-01 Thread Lyndon Nerenberg


 } I'm trolling for newspeers, if there is anyone out there still using
 } NNTP..
 
 http://www.usenet-se.net/peering/

A useless list based on my experience (zero responses to requests
to twelve different sites).

--lyndon




Re: news-peering

2002-05-01 Thread todd glassey


supernews.com is my news provider and they are pretty good.

Todd

- Original Message - 
From: Lyndon Nerenberg [EMAIL PROTECTED]
To: Katsuhiro Kondou [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, May 01, 2002 9:53 AM
Subject: Re: news-peering 


 
  } I'm trolling for newspeers, if there is anyone out there still using
  } NNTP..
  
  http://www.usenet-se.net/peering/
 
 A useless list based on my experience (zero responses to requests
 to twelve different sites).
 
 --lyndon
 




Re: news-peering

2002-05-01 Thread Streiner, Justin


On Wed, 1 May 2002, Lyndon Nerenberg wrote:


  } I'm trolling for newspeers, if there is anyone out there still using
  } NNTP..
 
  http://www.usenet-se.net/peering/

 A useless list based on my experience (zero responses to requests
 to twelve different sites).

Some of the information on there is most likely stale.  Several sites we
used to peer with when we ran a news server have been borged into other
companies or are no longer serving news, but are still on the list.

jms




Re: Large ISPs doing NAT?

2002-05-01 Thread Eliot Lear


I don't know if this is an annual argument yet, but the frog is in the 
pot, and the flame is on.  Guess who's playing the part of the frog? 
Answer: ISPs who do this sort of thing.  Value added security is a nice 
thing.  Crippling Internet connections will turn the Internet into the 
phone company, where only the ISP gets to say what services are good and 
which ones are bad.  While an ISP might view it appealing to be a baby 
bell, remember from whence we all come: the notion that the middle should 
not inhibit the endpoints from doing what they want.  You find this to be 
a support headache?  Offer a deal on Norton Internet Security or some 
such.  Offer to do rules merges.  Even offer a provisioning interface to 
some access-lists.  Just make sure that when that next really fun game is 
delivered on a play station that speaka de IP your customers can play it, 
and that you haven't built a business model around them not being able to 
play it.

Eliot



mike harrison wrote:
On Monday, 2002-04-29 at 08:43 MST, Beckmeyer [EMAIL PROTECTED] wrote:

Is anybody here doing NAT for their customers?

 
 Tony Rall: 
 
If you're NATing your customers you're no longer an ISP.  You're a
sort-of-tcp-service-provider (maybe a little udp too).  NAT (PAT even more
 
 
 Depends on scale and application. We have lots of customers
 that we NAT, one way or another. And a lot more that we don't. 
 Some customers WANT to 'just see out' and they like all the 'weird stuff
 turned off'. Sometimes it's a box at the customers end, sometimes
 it's nat'd IP's on the dial-up/ISDN/FracT1/T1/Wireless connection itself. 
 
 Saying we are not an ISP because we do some NAT is a little harsh. 
 Giving the customer options and making things work (when done right, 
 and explained properly we have no sales droids) is good business
 and I think good for the 'net. It gives the clueless (and sometimes
 cluefull) just a little more isolation. 
 
 What is wrong is NAT'ing when you should not. 
 
 
 
 






Re: Large ISPs doing NAT?

2002-05-01 Thread Valdis . Kletnieks

On Wed, 01 May 2002 14:55:02 PDT, Eliot Lear said:
 some access-lists.  Just make sure that when that next really fun game is 
 delivered on a play station that speaka de IP your customers can play it, 
 and that you haven't built a business model around them not being able to 
 play it.

There was a reason I said *ALMOST*. ;)  Thanks, Eliot. 



msg01308/pgp0.pgp
Description: PGP signature


Re: Large ISPs doing NAT?

2002-05-01 Thread Peter Bierman


At 3:03 PM -0700 5/1/02, Scott Francis wrote:
On Wed, May 01, 2002 at 02:55:02PM -0700, [EMAIL PROTECTED] said:

 I don't know if this is an annual argument yet, but the frog is in the
 pot, and the flame is on.  Guess who's playing the part of the frog?
 Answer: ISPs who do this sort of thing.  Value added security is a nice
 thing.  Crippling Internet connections will turn the Internet into the
 phone company, where only the ISP gets to say what services are good and
 which ones are bad.  While an ISP might view it appealing to be a baby
 bell, remember from whence we all come: the notion that the middle should
 not inhibit the endpoints from doing what they want.  You find this to be
 a support headache?  Offer a deal on Norton Internet Security or some
 such.  Offer to do rules merges.  Even offer a provisioning interface to
 some access-lists.  Just make sure that when that next really fun game is
 delivered on a play station that speaka de IP your customers can play it,
 and that you haven't built a business model around them not being able to
 play it.

As long as it is _clear_ from the get-go that customers behind NAT are
getting that service, and not publicly-routable IP space, I don't see the
problem. If they don't like it, they don't have to sign up to begin with - as
long as there is no doubt as to what kind of service they're getting, there
shouldn't be a problem (legally, at any rate).


You've got to be kidding. Do you think it's clear to the average consumer
buying a GPRS phone what NAT is, and why they might or might not want it?
Do you think the use of NAT will be explained to these customers? Or
clearly stated in 5pt text on page 17 of the service agreement?

IMHO, as one of the people who will likely be using Cingular's GPRS network
with a Danger HipTop, I _strongly_ hope they choose to use routable address
space instead of NAT. I would hate for NAT to be an impediment to some cool
new app no one has thought of yet because these gizmos aren't in widespread
use yet.

This is not to say that if, as Eliot posits, the next Big Thing on the market
requires public IPs that your customer base won't all jump ship. That's a
risk that providers will have to weigh against the benefits of NAT.

I'm more concerned that if the major metropolitan markets deploying GPRS
all use NAT, then the Next Big Thing won't ever happen on GPRS devices.
Customers won't jump ship if they have no where to jump to. That might
sound attractive to the bean counters, but think of the customers you might
never get in the first place. Also, I don't see how deploying NAT could be
a cost savings over requesting real IP space.

-pmb

--
Ring around the Internet, | Peter Bierman [EMAIL PROTECTED]
Packet with a bit not set | http://www.sfgoth.com/pmb/
SYN ACK SYN ACK,  |Nobody realizes that some people expend
We all go down. -A. Stern | tremendous energy merely to be normal.-Al Camus





Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


There's been plenty of discussion about DDoS attacks, and my
IDS system is darn good at identifying them. But what are
effective methods for large service-provider networks (ie
ones where a firewall at the front would not be possible) to
deal with DDoS attacks?

Current method of updating ACLs with the source and/or
destination are slow and error-prone and hard to maintain
(especially when the target of the attack is a site that
users would like to access).

A rather extensive survey of DDoS papers has not resulted in
much on this topic.

What processes and/or tools are large networks using to
identify and limit the impact of DDoS attacks?

Thanks.
Pete.





Re: Large ISPs doing NAT?

2002-05-01 Thread Roland Dobbins


I think a lot of the GRPS stuff is heading towards IPv6 w/IPv4
gatewaying.

The NAT issue has certainly resulted in a quite a few disgruntled
satellite customers (I'm thinking here primarily of direcpc.com) who're
willing to put up with the large latencies, but get really irate when
their apps won't work via NAT, or who want to run RFC1918 space for a
LAN at home, then find out that lots of stuff can't stand being NATted
twice.

-- 

Roland Dobbins [EMAIL PROTECTED] // 650.776.1024 voice

Central databases already exist. Privacy is already gone. 

 -- Larry Ellison, CEO of Oracle Corporation

On Wed, 2002-05-01 at 16:07, Peter Bierman wrote:
 
 At 3:03 PM -0700 5/1/02, Scott Francis wrote:
 On Wed, May 01, 2002 at 02:55:02PM -0700, [EMAIL PROTECTED] said:
 
  I don't know if this is an annual argument yet, but the frog is in the
  pot, and the flame is on.  Guess who's playing the part of the frog?
  Answer: ISPs who do this sort of thing.  Value added security is a nice
  thing.  Crippling Internet connections will turn the Internet into the
  phone company, where only the ISP gets to say what services are good and
  which ones are bad.  While an ISP might view it appealing to be a baby
  bell, remember from whence we all come: the notion that the middle should
  not inhibit the endpoints from doing what they want.  You find this to be
  a support headache?  Offer a deal on Norton Internet Security or some
  such.  Offer to do rules merges.  Even offer a provisioning interface to
  some access-lists.  Just make sure that when that next really fun game is
  delivered on a play station that speaka de IP your customers can play it,
  and that you haven't built a business model around them not being able to
  play it.
 
 As long as it is _clear_ from the get-go that customers behind NAT are
 getting that service, and not publicly-routable IP space, I don't see the
 problem. If they don't like it, they don't have to sign up to begin with - as
 long as there is no doubt as to what kind of service they're getting, there
 shouldn't be a problem (legally, at any rate).
 
 
 You've got to be kidding. Do you think it's clear to the average consumer
 buying a GPRS phone what NAT is, and why they might or might not want it?
 Do you think the use of NAT will be explained to these customers? Or
 clearly stated in 5pt text on page 17 of the service agreement?
 
 IMHO, as one of the people who will likely be using Cingular's GPRS network
 with a Danger HipTop, I _strongly_ hope they choose to use routable address
 space instead of NAT. I would hate for NAT to be an impediment to some cool
 new app no one has thought of yet because these gizmos aren't in widespread
 use yet.
 
 This is not to say that if, as Eliot posits, the next Big Thing on the market
 requires public IPs that your customer base won't all jump ship. That's a
 risk that providers will have to weigh against the benefits of NAT.
 
 I'm more concerned that if the major metropolitan markets deploying GPRS
 all use NAT, then the Next Big Thing won't ever happen on GPRS devices.
 Customers won't jump ship if they have no where to jump to. That might
 sound attractive to the bean counters, but think of the customers you might
 never get in the first place. Also, I don't see how deploying NAT could be
 a cost savings over requesting real IP space.
 
 -pmb
 
 --
 Ring around the Internet, | Peter Bierman [EMAIL PROTECTED]
 Packet with a bit not set | http://www.sfgoth.com/pmb/
 SYN ACK SYN ACK,  |Nobody realizes that some people expend
 We all go down. -A. Stern | tremendous energy merely to be normal.-Al Camus
 





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread dies



http://www.secsup.org/Tracking/

UUNet uses that...others might as well, Shrug.

Quick, simple, effective tracking of DDoS attacks.

As for identifying attacks, quite honestly large ISP's are typically still
relying on customer notification.  I know that's how we do it.

On Wed, 1 May 2002, Pete Kruckenberg wrote:


 There's been plenty of discussion about DDoS attacks, and my
 IDS system is darn good at identifying them. But what are
 effective methods for large service-provider networks (ie
 ones where a firewall at the front would not be possible) to
 deal with DDoS attacks?

 Current method of updating ACLs with the source and/or
 destination are slow and error-prone and hard to maintain
 (especially when the target of the attack is a site that
 users would like to access).

 A rather extensive survey of DDoS papers has not resulted in
 much on this topic.

 What processes and/or tools are large networks using to
 identify and limit the impact of DDoS attacks?

 Thanks.
 Pete.







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread dies



Then you are pushing out /32's and peers would need to accept them.  Then
someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

Additionally you are creating a way to basically destroy the Internet as a
whole.  One kiddie gets ahold of a router, say of a large backbone
provider, takes one of their aggregate blocks (/16? /10? /8?) and splits
it into /32 announcements.

Anyways, some providers already allow you to set a community on a route,
and they will inturn blackhole it for you.  I believe Teleglobe does
this for some customers and I know UUNet does this for all customers.

On Wed, 1 May 2002, Wojtek Zlobicki wrote:


   What processes and/or tools are large networks using to
   identify and limit the impact of DDoS attacks?
 
  A great deal of thought is being expended on this question, I am certain,
  however, how many of these thought campaings have born significant fruit
 yet,
  I do not know.

 How about the following :

 We develop a new community , being fully transitive (666 would be
 appropriate ) and either build into router code or create a route map to
 null route anything that contains this community.  The effect of this being
 the distribution of the force of the attack.

 This aside, how effective would be using a no export community with ones
 peers (being non transitive, it would still distribute the force of the
 attack).







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Wojtek Zlobicki


 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

I am in no way proposing discounting current filtering rules.  There are
alway two
different intersts one must consider, one that of the customer and two that
of the service provider.  If a large block must be filtered so be it.

Where are providers drawing the line ?  Anyone have somewhat detailed
published policies as to what a provider can do in order to protect their
nework as a whole.
At what point (strength of the attack) does a customers netblock (assuming a
/24 for
example) get null routed by whichever party.

 Anyways, some providers already allow you to set a community on a route,
 and they will inturn blackhole it for you.  I believe Teleglobe does
 this for some customers and I know UUNet does this for all customers.

When the attack is distributed, having one or two providers (even if they
are UUNET
or Teleglobe) is just not enough.  Must private routing policy be developed
in order to make my suggestion work.  The reason that so many methods likely
fail are the difficulty of implementation and low implementation.







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Leo Bicknell


In a message written on Wed, May 01, 2002 at 08:17:04PM -0500, dies wrote:
 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

I'm not sure what form this would take, but I have long wished
route processing could be sent into a programming language.  For
this specific example it would be nice to set a maximum number of
route limit for the total number of routes on the session, as well
as /per community/.

That is, community :666 == blackhole me, and I could limit each
peer to say, 6 of these at a time.  More would not take down the
session, but simply be ignored.

I can carry 6 /32's for every peer I have, and if they only have
6, they will probably use them for the most abusive target.

There are, of course, approximately an infinitate number more
applications for a more flexible mechanism.  Of course, it would
require more human smarts, which might be why vendors don't do it.

-- 
   Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Richard A Steenbergen


On Wed, May 01, 2002 at 09:38:52PM -0400, Wojtek Zlobicki wrote:
 
 How about the following :
 
 We develop a new community , being fully transitive (666 would be
 appropriate ) and either build into router code or create a route map to
 null route anything that contains this community.  The effect of this being
 the distribution of the force of the attack.

This has been proposed a dozen times over, and I agree that there should
be a well known community for discarding packets. Go try and get the IETF
to add it, let me know how it goes. :)

 This aside, how effective would be using a no export community with ones
 peers (being non transitive, it would still distribute the force of the
 attack).

Many people do this already. If you're looking to purchase transit and you
think this is something you'll care about, ask for it or vote with your
wallet.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Large ISPs doing NAT?

2002-05-01 Thread Steven J. Sobol


On Wed, 1 May 2002, Deepak Jain wrote:

 I'm more concerned that if the major metropolitan markets deploying GPRS
 all use NAT, then the Next Big Thing won't ever happen on GPRS devices.
 Customers won't jump ship if they have no where to jump to.

The only people who'd be deploying GPRS are GSM cellular providers, no?

Verizon and Sprint PCS, in particular, are not using GPRS, but migrating
to CDMA-based 3G cellular technologies. I don't know that those 
technologies use CDMA.

And of course, there are still markets like my very own hometown (2nd
largest city in Ohio) that don't have GSM yet (even though #1 and #3 do).
VoiceStream is supposedly launching their GSM network in Cleveland 
(*snort* I've heard that before). But they're not here yet, ATT is 
nowhere near doing GSM here as far as I know, and Cingular's network here 
(former AmeriBlech Cellular) is TDMA. 

I could be completely off base, of course. Being a customer of Sprint PCS
and Verizon, and a former customer of Alltel and Northcoast PCS, I've not
had much reason to follow GSM developments; every one of the companies 
I've used runs CDMA. Feel free to correct me if I am wrong.

-- 
Steve Sobol, CTO (Server Guru, Network Janitor and Head Geek)
JustThe.net LLC, Mentor On The Lake, OH  888.480.4NET   http://JustThe.net
The Indians are unfolding into the 2002 season like a lethal lawn chair.
  (_News-Herald_ Indians Columnist Jim Ingraham, April 11, 2002)




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Sean Donelan




On Wed, 1 May 2002, Pete Kruckenberg wrote:
 We experience a lot of types of attacks (education/research
 network  = easy hacker target). With DDoS incidents, it
 seems we are more often an unknowing/unwilling participant
 than the target, partly due to owning big chunks of IP
 address space.

Universities are hacker training grounds, but also have much
better network security response than most corporate networks.
Whatever problems you have, the rest of us will have soon enough
it may just take us longer to notice it.

 Has anyone tried this kind of an approach or any other type
 of automated/efficient approach to dampen the zombie side
 of the DDoS attack?

Has anyone implemented Bellovin's Pushback in a production
network yet?






Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:

 and then again, there has been much discussion on simple
 DoS attacks, where the term DDoS is erroneously used...  
 I am very much not trying to imply that this is the case
 here, but it's important that the two be thoroughly
 distinguished from each other - they are totally
 different things to deal with.

Sorry, I should have been more clear. 

My issue (currently)  is not being the target of the DDoS
attack, but being a (unwilling) participant. People outside
our network are launching DDoS attacks (distributed SYN
floods) against destinations outside our network, using
about 8,000 Web server hosts on our network as reflectors.

These are not zombies. They are secured, uncompromised Web
servers. The attack spoofs the target address as the source,
and one of our machines as a destination, port 80. Getting
everyone to implement defenses (SYN cookies) on their Web
servers is nearly impossible (most don't even have a
defense--printers and routers with Web interfaces).

SYN packet comes in, one of these machines responses with a
RST to the source, which is actually the target of the
attack. Unfortunately, the target is often a site that
people would like to get to, as is the reflector, so
permanent filters on the target or reflector create lots of
complaints.

 We captured several seconds of the last DDoS and came up
 with over 700 participating hosts...

Some of them probably appear to be from our network...

Pete.





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow


What we use and we're a 'largeish' network:

http://www.secsup.org/Tracking/
(shameless plug #1)

Among other things this is a tool we use... there was a great set of
slides and presentation given at NANOG23:

http://www.nanog.org/mtg-0110/greene.html
(shameless plug #2)

There is also a set of papers Barry Greene from Cisco has available on the
Cisco website... I'm positive he'll respond to this with the link, if he
doesn't search the NANOG mailing list archive for the link it should be
obvious in posts from Barry.

If you want more pointers I'd be glad to chat on the phone with you,
numbers included below.


--Chris
([EMAIL PROTECTED])
###
## UUNET Technologies, Inc.  ##
## Manager   ##
## Customer Router Security Engineering Team ##
## (W)703-886-3823 (C)703-338-7319   ##
###

On Wed, 1 May 2002, Pete Kruckenberg wrote:


 There's been plenty of discussion about DDoS attacks, and my
 IDS system is darn good at identifying them. But what are
 effective methods for large service-provider networks (ie
 ones where a firewall at the front would not be possible) to
 deal with DDoS attacks?

 Current method of updating ACLs with the source and/or
 destination are slow and error-prone and hard to maintain
 (especially when the target of the attack is a site that
 users would like to access).

 A rather extensive survey of DDoS papers has not resulted in
 much on this topic.

 What processes and/or tools are large networks using to
 identify and limit the impact of DDoS attacks?

 Thanks.
 Pete.






Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow




On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:


 True DDoS attacks, fortunately, are rarer than most people believe.  If they
 were not, the Internet as we know it would look a lot more like a telephone
 system in USSR-at-it's-worst-days.  For example, of the two recent DDoS's I
 have been on the receiving end of, the first was generating a little over
 300mbit/sec (steady for a prolonged time), and the second went over that by a
 fair bit.  In both cases, we had core equipment (M20's and BSN5000's) fall
 over and die trying to work the events.  Additionally, our upstream peers

Your M20 tipped over?? What were you doing? We regularly stop large
(+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
cisco is even capable of filtering (done right) at +200kpps...

 also had core equipment fall over, and we all came the [now obvious]
 conclusion that the only way to stop these attacks was to completely null
 route ourselves at our upstreams (they tried filter-fishing for specific data
 which may have helped our investigation, but when their routers started
 wheezing, we gave them the OK to just send us straight into the bit bucket
 till it was over...


Hmm, this highlights the need to learn how to use the equipment, learn its
boundaries and learn defenses inside these boundaries...

-Chris




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, dies wrote:



 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!


Yes.

 Additionally you are creating a way to basically destroy the Internet as a
 whole.  One kiddie gets ahold of a router, say of a large backbone
 provider, takes one of their aggregate blocks (/16? /10? /8?) and splits
 it into /32 announcements.


Or, blackhole the /16 :) more fun! (assuming no other smaller
announcements inside that /16 of course)

 Anyways, some providers already allow you to set a community on a route,
 and they will inturn blackhole it for you.  I believe Teleglobe does
 this for some customers and I know UUNet does this for all customers.

Hmm, Mr. 'dies' is almost correct... if you are a UUNET customer and you
would like to do this please call the customer service center and they
will help you to configure this 'service'.

Thanks though Mr. 'dies' :)


 On Wed, 1 May 2002, Wojtek Zlobicki wrote:

 
What processes and/or tools are large networks using to
identify and limit the impact of DDoS attacks?
  
   A great deal of thought is being expended on this question, I am certain,
   however, how many of these thought campaings have born significant fruit
  yet,
   I do not know.
 
  How about the following :
 
  We develop a new community , being fully transitive (666 would be
  appropriate ) and either build into router code or create a route map to
  null route anything that contains this community.  The effect of this being
  the distribution of the force of the attack.
 
  This aside, how effective would be using a no export community with ones
  peers (being non transitive, it would still distribute the force of the
  attack).
 
 
 





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Wojtek Zlobicki wrote:

 Where are providers drawing the line ?  Anyone have somewhat detailed
 published policies as to what a provider can do in order to protect their
 nework as a whole.
 At what point (strength of the attack) does a customers netblock (assuming a
 /24 for
 example) get null routed by whichever party.

Most providers likely have a policy similar to: I can't sacrafice 1
my network for 1 customer. So, if the attack is sufficient to degrade
service on the ISP network most likely the customer under attack will get
null routed.


  Anyways, some providers already allow you to set a community on a route,
  and they will inturn blackhole it for you.  I believe Teleglobe does
  this for some customers and I know UUNet does this for all customers.

 When the attack is distributed, having one or two providers (even if they
 are UUNET
 or Teleglobe) is just not enough.  Must private routing policy be developed
 in order to make my suggestion work.  The reason that so many methods likely
 fail are the difficulty of implementation and low implementation.

Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
security contact that can actually help in the case of an attack. Today
there are very few that have this capability. I'd say from personal
experience that the number is way too small, even in the 'large' ISP arena
:(

More pressure from customers for real security would be a good start.




Re: Large ISPs doing NAT?

2002-05-01 Thread Joe Abley



On Wednesday, May 1, 2002, at 10:33 , Steven J. Sobol wrote:


 On Wed, 1 May 2002, Deepak Jain wrote:

 I'm more concerned that if the major metropolitan markets deploying 
 GPRS
 all use NAT, then the Next Big Thing won't ever happen on GPRS devices.
 Customers won't jump ship if they have no where to jump to.

 The only people who'd be deploying GPRS are GSM cellular providers, no?

The concern exists regardless of the specifics of the always-on, 
cellular packet radio protocols being used, surely?

 [GSM coverage is patchy in the US]

It's prevalent elsewhere. I'd be surprised if there aren't more GSM 
subscribers in the world than non-GSM subscribers.


Joe




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Richard A Steenbergen


On Thu, May 02, 2002 at 04:28:44AM +, Christopher L. Morrow wrote:
 
 Let me say this one more time... RATE LIMITS DON'T DO SHIT TO STOP
 ATTACKS for the victim atleast, all they do is make the job of the
 attacker that much easier.  For instance:
 
 1) I synflood www.avleen.org
 2) you rate-limit syns to 1MB
 3) I now only flood 1MB and I still win
 
 So, don't rely on a rate-limit as its not going to help.

Thank you, I can't make this point enough and people still say we'll just
rate limit!. Filtering is only as good as your ability to DETERMINE WHAT
TO FILTER.

The only time you can get anything from this is when you admit defeat on 
keeping your services responding to new connection but want to keep 
existing connections and/or the end servers from failing completely. 
Depending on the service in question this may or may not be a good goal.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Richard A Steenbergen wrote:

 I give it 2 months, then they'll start hitting random dst IPs in a target
 prefix (say a common /24 going through the same path).


Damn you, don't give them any ideas :)




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Basil Kruglov


On Thu, May 02, 2002 at 04:45:43AM +, Christopher L. Morrow wrote:
 On Wed, 1 May 2002, Wojtek Zlobicki wrote:
 
  Where are providers drawing the line ?  Anyone have somewhat detailed
  published policies as to what a provider can do in order to protect their
  nework as a whole.
  At what point (strength of the attack) does a customers netblock (assuming a
  /24 for
  example) get null routed by whichever party.
 
 Most providers likely have a policy similar to: I can't sacrafice 1
 my network for 1 customer. So, if the attack is sufficient to degrade
 service on the ISP network most likely the customer under attack will get
 null routed.

Are you saying UUnet, assuming for a sec that I am a customer of UUnet (just
for the sake of the argument), UU will not null route my ircd if it
it gets attacked on regular basis, say *daily* ?

Furthermore you are going to consistently place filters on your routers,
take them out within the 24h (or whatever then-current policy of UUnet is)
and track attacks back to their sources within the boundaries of your 
backbone on a daily basis? ;)

Will you do that for say a regular T1 customer or do I need more commitment 
as sales droids like to put it, to even consider such a service ? ;)

 Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
 security contact that can actually help in the case of an attack. Today
 there are very few that have this capability. I'd say from personal
 experience that the number is way too small, even in the 'large' ISP arena
 :(
 
 More pressure from customers for real security would be a good start.

sigh, tried and failed, miserably I might add.

-Basil



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Wed, 1 May 2002, Richard A Steenbergen wrote:

  DDoS attacks is such a generic term. There are a wide
  variety of attacks which each need to be handled in
  their own way, the extra D is just one possible twist.
  Can you explain what kind of attack you're interested
  in?

 We experience a lot of types of attacks (education/research
 network  = easy hacker target). With DDoS incidents, it
 seems we are more often an unknowing/unwilling participant
 than the target, partly due to owning big chunks of IP
 address space.

 We most frequently are the zombie/reflector participants in
 an attack that originates outside our network, to a target
 outside our network. As many as 8,000 hosts on our network
 are reflecting SYN floods in the current attacks.

Sounds like its time for a firewall on your network :)


 Identification doesn't seem to be a problem. Snort is doing
 far too well notifying us. Responding and managing all of
 the defenses is becoming a lot of pain-staking work, and
 error-prone (why can't Cisco make ACLs easier to manage).


they aren't tough to 'manage' they are sometimes tough to live with though
:(

 Our approach so far has been temporary blocks (via ACL) of
 the target address. Blocking 8,000 internal addresses, many
 legitimate (secured) Web servers, generates more complaints.

 I'm thinking about a scripted Zebra feed where route
 injections are triggered by Snort. Routes for the target
 and/or SYN flood reflector hosts could be injected
 temporarily during the attack to border routers, which would
 route-map those routes to Null0. Script periodically
 withdraws routes to see if the attack is over (some of these
 last weeks, some only last a few seconds), to minimize the
 impact on those otherwise legitimate hosts.


This is a nice idea, anything 'scripted' is prone to abuse though ;( all
of a sudden www.your.edu is dead.. on class registration day no less.

 Has anyone tried this kind of an approach or any other type
 of automated/efficient approach to dampen the zombie side
 of the DDoS attack?







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:

  and then again, there has been much discussion on simple
  DoS attacks, where the term DDoS is erroneously used...
  I am very much not trying to imply that this is the case
  here, but it's important that the two be thoroughly
  distinguished from each other - they are totally
  different things to deal with.

 Sorry, I should have been more clear.

 My issue (currently)  is not being the target of the DDoS
 attack, but being a (unwilling) participant. People outside
 our network are launching DDoS attacks (distributed SYN
 floods) against destinations outside our network, using
 about 8,000 Web server hosts on our network as reflectors.

Funny, you say 'secured' here...


 These are not zombies. They are secured, uncompromised Web
 servers. The attack spoofs the target address as the source,
 and one of our machines as a destination, port 80. Getting
 everyone to implement defenses (SYN cookies) on their Web
 servers is nearly impossible (most don't even have a
 defense--printers and routers with Web interfaces).


and here you say: printers and routers Since when did they need to be
accessible off campus? Additionally, why does a router need a web
interface?? Printers are on the cusp, but they certainly don't need to be
accesible from out of your LAN.




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Basil Kruglov wrote:


 On Thu, May 02, 2002 at 04:45:43AM +, Christopher L. Morrow wrote:
  On Wed, 1 May 2002, Wojtek Zlobicki wrote:
  
   Where are providers drawing the line ?  Anyone have somewhat detailed
   published policies as to what a provider can do in order to protect their
   nework as a whole.
   At what point (strength of the attack) does a customers netblock (assuming a
   /24 for
   example) get null routed by whichever party.
 
  Most providers likely have a policy similar to: I can't sacrafice 1
  my network for 1 customer. So, if the attack is sufficient to degrade
  service on the ISP network most likely the customer under attack will get
  null routed.

 Are you saying UUnet, assuming for a sec that I am a customer of UUnet (just
 for the sake of the argument), UU will not null route my ircd if it
 it gets attacked on regular basis, say *daily* ?

I did not say that.


 Furthermore you are going to consistently place filters on your routers,
 take them out within the 24h (or whatever then-current policy of UUnet is)
 and track attacks back to their sources within the boundaries of your
 backbone on a daily basis? ;)


uhm... sure, we do this now... or have you not been paying attention?

 Will you do that for say a regular T1 customer or do I need more commitment
 as sales droids like to put it, to even consider such a service ? ;)


read above.

  Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
  security contact that can actually help in the case of an attack. Today
  there are very few that have this capability. I'd say from personal
  experience that the number is way too small, even in the 'large' ISP arena
  :(
 
  More pressure from customers for real security would be a good start.

 sigh, tried and failed, miserably I might add.


Then become a UUNET customer cause we already do this... Perhaps other
providers with 24/7 security teams will pipe up to give potential
customers a heads-up on options other than UUNET? If you go with UUNET
please tell the sales driod I sent you cause then I get 50 bucks :) (my
only raise thanks to bernie)




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


On Thu, 2 May 2002, Richard A Steenbergen wrote:

 SYN packet comes in, one of these machines responses with a
 RST to the source, which is actually the target of the
 
 You have an interesting situation. I think rate limiting
 outbound RSTs would be the least offensive thing you
 could do, off the top of my head.

What about just blocking out-going RSTs altogether from our
borders? While this interferes with proper TCP
functionality, would it actually interfere enough to cause
noticeable problems? Would certainly be less of a burden on
routers than rate-limiting.

Pete.




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Thu, 2 May 2002, Richard A Steenbergen wrote:

  SYN packet comes in, one of these machines responses with a
  RST to the source, which is actually the target of the
 
  You have an interesting situation. I think rate limiting
  outbound RSTs would be the least offensive thing you
  could do, off the top of my head.

 What about just blocking out-going RSTs altogether from our
 borders? While this interferes with proper TCP
 functionality, would it actually interfere enough to cause
 noticeable problems? Would certainly be less of a burden on
 routers than rate-limiting.

Aren't the initial packets in the 'gibson syn amp attack' syn-ack's?