Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Ralph Doncaster


 What's NANOG's opinion: assuming that uRPF is implemented on all
 customer interfaces, are there any legitimate purposes for a customer to
 forward packets with source IP addresses not currently routed by the
 transit provider towards the customer (either static or BGP)?

IP Tunneling - it often makes more sense to send packets out that have a
source address reachable only through the tunnel.




Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Ralph Doncaster


 On Wed, 1 May 2002, Pete Kruckenberg wrote:
 
 I finally found a paper on this type of attack.  
 http://grc.com/files/drdos.pdf and
 http://grc.com/dos/grcdos.htm describe the attack and a few
 possible defenses, though they are about as ineffective as
 most other DDoS defenses.

Has NANOG stooped to quoting Steve Gibson as an expert on DDoS attacks?

-Ralph





Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Ralph Doncaster


On Mon, 6 May 2002, [EMAIL PROTECTED] wrote:

 On Mon, 06 May 2002 19:04:11 EDT, Ralph Doncaster said:
 
  IP Tunneling - it often makes more sense to send packets out that have a
  source address reachable only through the tunnel.
 
 But aren't those source addresses hidden *inside* the encapsulation, and
 what's visible to routers are the source/dest IPs of the tunnel itself?

What I'm saying is that if something comes in through the tunnel, the
shortest route to the destination is often not to go back out through the
tunnel.




Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Stephen Griffin


In the referenced message, Steven W. Raymond said:
 
 Stephen Griffin wrote:
Tell them they will need to register their routes in the IRR, even if they
don't necessarily advertise all or any of them. Build your exceptions
based upon the irr, as for all bgp-speaking customers.
  
  
  not route-filtering. You use the irr-data to populate the exceptions
  to strict-mode rpf. The irr is more of a flight-plan of possibility.
  If the customer registers both sets of routes, and you use that
  data to build the acl, then it doesn't matter what the customer announces
  to you. Anything which fails the actual rpf check, will then be
  passed through the acl to selectively override the rpf check.
 
 What about existing customers that don't yet use the IRR?  Say you
 filter some BGP customers' route announcements using manually-built
 prefix-lists.  Have found that by using distribute-list in (instead of
 prefix-list), one can simply refer the distribute-list # in the strict
 uRPF configuration and accomplish both functions (route filtering +
 uRPF) easily with one ACL.

the IRR is merely an input vector. an alternate input vector is manual
entry. the output would be an acl or prefix-list. I don't believe the
format of a routing-use acl and an RPF-use acl is the same.

My recollection is that when used for route filtering you have:
access-list foo {permit|deny} ip network wildbits netmask wildbits

where for RPF, or traditional traffic filter is
access-list foo {permit|deny} ip source wildbits dest wildbits

I guess you could use a standard acl however I wouldn't recommend
it for filtering routes. Even if you could use prefix-lists for
uRPF, you would want to match more-specifics, whereas generally you
don't want to match (unbounded) more-specifics on route filters.

RtConfig can generate either style from IRR data. It isn't too hard
to generate either style from a manual list either.

 e.g.:
  ip verify unicast source reachable-via rx 49
  access-list 49 permit x.x.x.x 0.0.0.255
  access-list 49 permit y.y.y.y 0.0.0.252
  access-list 49 deny   any log
 
 Prefix-lists are preferable over ACL-based distribute-lists.  Hey Cisco,
 please make uRPF configuration accept either distribute-lists or
 prefix-lists for the exception branching.  I realize that to IOS ACLs
 and prefix-lists are not the same, but the benefits of prefix-lists vs.
 distribute-lists are many.

How would uRPF respond to the following prefix-list?
ip prefix-list foo deny 0.0.0.0/0 ge 25
ip prefix-list foo permit 1.2.3.0/24
ip prefix-list foo permit 0.0.0.0/0 le 16

Would it accept all sources within 1.2.3.0/24? What about 10.0.0.0/8?
I guess it could ignore ge and le. Although how it would resolve
conflicts is an unknown. It might try to correspond to actual prefixes, but
that seems unlikely.

 It sounds that a lot of networks rely on IRRs for building BGP customer
 route filters.  What method then is used for the cases where a customer
 is not already using the IRR?  Forced IRR registration before BGP
 turnup?  Or do you fallback on filtering by using prefix- or
 distribute-lists?

In my experience, providers that require IRR registration often allow
the customer to register their own objects, or offer to proxy-register
their customers objects. The preference generally being on the customer
registering their own objects, since it gives the customer the greatest
degree of control (especially should they change providers.)

 What's NANOG's opinion: assuming that uRPF is implemented on all
 customer interfaces, are there any legitimate purposes for a customer to
 forward packets with source IP addresses not currently routed by the
 transit provider towards the customer (either static or BGP)?

Yes, I think there are definitely legitimate reasons why a customer
would source traffic from prefixes where the actively selected route
does not point back at the interface. This is why acl exceptions and
the loose match came to be. With customers, the acl exception is
probably appropriate. If the customer exhibits sufficient clue, and
demonstrates that they are doing RPF checks, I could definitely see
relaxing restrictions against them. If they are providing transit to
other BGP-speakers, this is probably the case. As in all things, you
know your customer best, so you know how loose you are willing to
make things, with the potential that it may make you look bad.




Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Richard A Steenbergen


On Mon, May 06, 2002 at 05:15:25PM -0600, Pete Kruckenberg wrote:
 
 I finally found a paper on this type of attack.  
 http://grc.com/files/drdos.pdf and
 http://grc.com/dos/grcdos.htm describe the attack and a few
 possible defenses, though they are about as ineffective as
 most other DDoS defenses.

Don't confuse the rantings of a nutcase and his T1 with useful information 
about DoS. I have to admit I like the direction the made up acronyms are 
going though, can we have MS-DOS next? :)

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Steven W. Raymond


Stephen Griffin wrote:
 where for RPF, or traditional traffic filter is
 access-list foo {permit|deny} ip source wildbits dest wildbits

Hrrmm, since uRPF checks only the source address, the standard ACL
seems most appropriate to me.

 I guess you could use a standard acl however I wouldn't recommend
 it for filtering routes. Even if you could use prefix-lists for
 uRPF, you would want to match more-specifics, whereas generally you
 don't want to match (unbounded) more-specifics on route filters.
 
 RtConfig can generate either style from IRR data. It isn't too hard
 to generate either style from a manual list either.

It certainly wouldn't hurt to have both a prefix-list for route
filtering and ACL for the uRPF exceptions.  It's just that I am lazy and
thought it would be neat for one list to fulfill both requirements,
since it is essentially the same input data in two different formats.

 How would uRPF respond to the following prefix-list?
 ip prefix-list foo deny 0.0.0.0/0 ge 25

The implicit deny  the end of the prefix-list seems a better way to
accomplish the same result as above (deny anything longer than /24).  In
other words, instead use a prefix-list containing an explicit list of
the permitted networks, rather than pattern matching to deny what bad
stuff might be announced.

 ip prefix-list foo permit 1.2.3.0/24
 ip prefix-list foo permit 0.0.0.0/0 le 16
 
 Would it accept all sources within 1.2.3.0/24? What about 10.0.0.0/8?
 I guess it could ignore ge and le. Although how it would resolve
 conflicts is an unknown. It might try to correspond to actual prefixes, but
 that seems unlikely.

To restate above, just permit explicit networks customer plans to
announce  source traffic from.  Don't wildcard in customer prefix-lists
inbound.  Every source packet address received should be covered by
his prefix-list (even if not the FIB entry best path choice).  Every
other source IP address packet is dropped.  In fantasy land, uRPF
could confirm that each packet source address matches at least one of
the networks in the prefix-list.

 Yes, I think there are definitely legitimate reasons why a customer
 would source traffic from prefixes where the actively selected route
 does not point back at the interface. This is why acl exceptions and
 the loose match came to be. With customers, the acl exception is
 probably appropriate. 

Would you agree it is indeed necessary for every BGP customer-facing
interface to implement exception checking with strict uRPF? 
Customer-set communities can change local pref easily enough to break
strict uRPF lacking exception checking.  But with the ACL permitting
exceptions based upon every possible network customer may be sourcing
from, the entry doesn't even have to be best path in the FIB to permit
the packet.  Customer needed only to have gotten the ISP to include it
in his prefix-list at some point.



Re: Effective ways to deal with DDoS attacks?

2002-05-06 Thread Chris Adams


Once upon a time, Richard A Steenbergen [EMAIL PROTECTED] said:
 Don't confuse the rantings of a nutcase and his T1 with useful information 
 about DoS. I have to admit I like the direction the made up acronyms are 
 going though, can we have MS-DOS next? :)

You mean MicroSoft Denial Of Service?  I think it is more commonly
spelled O-U-T-L-O-O-K.
-- 
Chris Adams [EMAIL PROTECTED]
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.



Re: Effective ways to deal with DDoS attacks?

2002-05-05 Thread Iljitsch van Beijnum


On Sun, 5 May 2002, Christopher L. Morrow wrote:

   like with single homed customers. The only time when those sets of
   prefixes is NOT the same is for a backup connection. But if a connection

  Not always the case, customer behaviour can not be accurately modeled.

 I was hoping someone else might mention this, BUT what about the case of
 customers providing transit for outbound but not inbound traffic for their
 customers? We have many, many cases of customers that are 'default
 routing' for their customers that get inbound traffic down alternate
 customers or peers or wherever...

Is there a compelling reason you should allow this? If yes, you can't use
uRPF and you have to install an acl to do sanity checking on the
customer's source addresses. If no, they'll have to announce those routes
to you. If they set the no export community they still won't get any
inbound traffic to speak of.

 uRPF seems like a not so good solution
 for these instances :( especially since some of these are our worst
 abusers :(

Well if these are your worst abusers, it seems to me uRPF is exactly what
those customers need.  ;-)




Re: Effective ways to deal with DDoS attacks?

2002-05-05 Thread Lincoln Dale


At 03:34 AM 5/05/2002 +, Christopher L. Morrow wrote:
I was hoping someone else might mention this, BUT what about the case of
customers providing transit for outbound but not inbound traffic for their
customers?

two methods:
  [1] if your customer has their own AS, have them route the (valid) networks
  to you with the no-export bgp attribute set.

  [2] if they're not BGP connected, then surely you have some idea of what 
subnet(s)
  they're sending traffic out from? (i hope so).
  if so, then you'd have static-routes for those subnets pointing at 
their interface.
  you don't necessarily have to include those static-routes in 
announcements to
 your peers.

both of [1]  [2] may mean that more traffic may 'prefer' the link from you 
to the customer.  (probably doubly so given you're uunet and the amount of 
transit that goes thru you).  in that case, perhaps using the no-advertise 
community so that the route stays 'local' to a router (or local to a city) 
will prove sufficient.


cheers,

lincoln.




RE: Effective ways to deal with DDoS attacks?

2002-05-05 Thread Barry Raveendran Greene



Be mindful that uRPF Strict Mode was created to help scale BCP 38 filtering.
If you have 1000 lease line customers and can use uRFP Strict Mode on 80% of
those customers, that is 80% fewer BCP38 ACLs that you need to manage.

For the other 20% you have uRFP + BGP tweaks or plain old ACLs. But as Chris
inferred, that 20% where you cannot use simple uRPF is also the 20% most
difficult customers.

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
 Iljitsch van Beijnum
 Sent: Sunday, May 05, 2002 12:44 AM
 To: Christopher L. Morrow
 Cc: [EMAIL PROTECTED]
 Subject: Re: Effective ways to deal with DDoS attacks?



 On Sun, 5 May 2002, Christopher L. Morrow wrote:

like with single homed customers. The only time when those sets of
prefixes is NOT the same is for a backup connection. But if
 a connection

   Not always the case, customer behaviour can not be accurately modeled.

  I was hoping someone else might mention this, BUT what about the case of
  customers providing transit for outbound but not inbound
 traffic for their
  customers? We have many, many cases of customers that are 'default
  routing' for their customers that get inbound traffic down alternate
  customers or peers or wherever...

 Is there a compelling reason you should allow this? If yes, you can't use
 uRPF and you have to install an acl to do sanity checking on the
 customer's source addresses. If no, they'll have to announce those routes
 to you. If they set the no export community they still won't get any
 inbound traffic to speak of.

  uRPF seems like a not so good solution
  for these instances :( especially since some of these are our worst
  abusers :(

 Well if these are your worst abusers, it seems to me uRPF is exactly what
 those customers need.  ;-)






Re: Effective ways to deal with DDoS attacks?

2002-05-04 Thread Richard A Steenbergen


On the subject of uRPF, I thought I should point out that Juniper just
added support for it in JunOS 5.3. The news seems to have been obscured
by the T640, but I think its a pretty big deal.

One less excuse for the people who still aren't RPF filtering their
customers (you know who you are). Go forth and be filterful. :)

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-04 Thread Stephen Griffin


In the referenced message, Iljitsch van Beijnum said:
 On Fri, 3 May 2002, Stephen Griffin wrote:
 
  for single-homed customers, simple uRPF
  for multihomed customers, acl exceptions based upon their registered
  IRR-policy, since the customer should already be registering in the IRR
  you have a list of all networks reachable via the customer, regardless of
  the actual real-time announcements or policy applications (prepending,
  localpref tweaks, etc)
 
 This doesn't make any sense. If you use uRPF on a customer interface, it
 will check the packets coming in from the customer to see if they match
 the prefixes you route to that customer. So as long as what you route to
 them and what they use as source addresses are identical, you don't have a
 problem.

think MEDs and localpref twiddles., identical prefixes do not necessarily
relate to best paths.

 For multihomed customers, these sets of prefixes should be identical, just
 like with single homed customers. The only time when those sets of
 prefixes is NOT the same is for a backup connection. But if a connection
 is a pure backup for incoming traffic, it's reasonable to assume it's a
 pure backup for outgoing traffic as well, so as long as the backup is
 dormant, you don't see any traffic so no uRPF problems.

Not always the case, customer behaviour can not be accurately modeled.

 Using an exception access list is pretty silly: if you're going through
 the trouble of listing all a cutomer's prefixes in a list, you might as
 well just apply this acl to the interface rather than uRPF with the acl as
 exceptions.

the acl will only be used on packets failing the rpf check. interface acls
get applied to all traffic.

 There is another way to handle backups: you can also set the weight to a
 higher value for customer routes. This way, the router connecting to the
 customer will always use the routes announced by the customer, even if the
 rest of the network deems them inferior to another route to this customer
 because of a lower local pref, a higher MED or a longer AS path.
 
 This mechanism is also useful for peering: because of the higher weight,
 the border router will always prefer the exchange (or private peering
 link) for all traffic to the customer, so uRPF works. The rest of the
 network can still decide to send the traffic to another exchange point.

I'm quite leery of having islands of widely divergent policy, and I wouldn't
think it would help if you have multiple non-equal-cost-paths on the
same router with which to accept traffic on.

  for non-clued peers, accept based upon any available forwarding path
  [hopefully, by the 100th time you beat on the peer about spoofed crud
  coming from them, they'll get religion and register, since you'll have
  less overall spoofing to track down, you can devote it to slapping
  them around more]
 
 If people stop peering with those network polluters they'll clean up their
 act soon enough.

This is unlikely to occur, unfortunately, so merely making it as annoying
as possible for polluters and less annoying as possible for non-polluters,
is probably the way to go.

  you should also in/egress filter known bogons at all borders, like
  src/dst in rfc1918
  src/dst in class e
 
 Why? That doesn't buy you much except job security because someone
 spending so much time on those impressive filters can't be missed of
 course.

Because it is polite to not send crap to your neighbors, and advantageous
to not have crap coming into your network.

  src in class d (not dest, however)
 
 Some multicast apps set the source to the group address as well.

How... odd...

 Iljitsch van Beijnum




Re: Effective ways to deal with DDoS attacks?

2002-05-04 Thread Christopher L. Morrow


On Sat, 4 May 2002, Stephen Griffin wrote:
 In the referenced message, Iljitsch van Beijnum said:
  On Fri, 3 May 2002, Stephen Griffin wrote:
  For multihomed customers, these sets of prefixes should be identical, just
  like with single homed customers. The only time when those sets of
  prefixes is NOT the same is for a backup connection. But if a connection
  is a pure backup for incoming traffic, it's reasonable to assume it's a
  pure backup for outgoing traffic as well, so as long as the backup is
  dormant, you don't see any traffic so no uRPF problems.

 Not always the case, customer behaviour can not be accurately modeled.


I was hoping someone else might mention this, BUT what about the case of
customers providing transit for outbound but not inbound traffic for their
customers? We have many, many cases of customers that are 'default
routing' for their customers that get inbound traffic down alternate
customers or peers or wherever... uRPF seems like a not so good solution
for these instances :( especially since some of these are our worst
abusers :(

-Chris




Re: Effective ways to deal with DDoS attacks?

2002-05-03 Thread Stephen Griffin


In the referenced message, Eric Gauthier said:
snip
 Another limitation that we've found with uRPF is that it doesn't 
 live well with multihomed systems (i.e. a host with two NIC's - each on 
 a different subnet) because of the way most OS'es handle their
 default gateways.  For anyone who is interested in our experience, drop me 
 a note off list.  If you have a solution for this multihoming problem, PLEASE 
 email me off-list.
 
 Eric :)
 

Most Cisco boxes have 3 related modes of uRPF:
1) pure RPF, if forwarding path back to source doesn't go via interface
packet received from, then dump. I believe, but am not positive, that
it will handle equal-cost-multipath ok in situations where that exists.
2) acl exceptions, if source matches the acl, allow the packet
3) not-so-pure RPF, if there is _any_ forwarding path back to the source
via _any_ interface, then accept.

for single-homed customers, simple uRPF
for multihomed customers, acl exceptions based upon their registered
IRR-policy, since the customer should already be registering in the IRR
you have a list of all networks reachable via the customer, regardless of
the actual real-time announcements or policy applications (prepending,
localpref tweaks, etc)
for peers that are clued-in, again acl exceptions based upon the peers
registered policy
for non-clued peers, accept based upon any available forwarding path
[hopefully, by the 100th time you beat on the peer about spoofed crud
coming from them, they'll get religion and register, since you'll have
less overall spoofing to track down, you can devote it to slapping
them around more]

you should also in/egress filter known bogons at all borders, like
src/dst in rfc1918
src/dst in class e
src in class d (not dest, however)
etc




Re: Effective ways to deal with DDoS attacks?

2002-05-03 Thread Iljitsch van Beijnum


On Fri, 3 May 2002, Stephen Griffin wrote:

 for single-homed customers, simple uRPF
 for multihomed customers, acl exceptions based upon their registered
 IRR-policy, since the customer should already be registering in the IRR
 you have a list of all networks reachable via the customer, regardless of
 the actual real-time announcements or policy applications (prepending,
 localpref tweaks, etc)

This doesn't make any sense. If you use uRPF on a customer interface, it
will check the packets coming in from the customer to see if they match
the prefixes you route to that customer. So as long as what you route to
them and what they use as source addresses are identical, you don't have a
problem.

For multihomed customers, these sets of prefixes should be identical, just
like with single homed customers. The only time when those sets of
prefixes is NOT the same is for a backup connection. But if a connection
is a pure backup for incoming traffic, it's reasonable to assume it's a
pure backup for outgoing traffic as well, so as long as the backup is
dormant, you don't see any traffic so no uRPF problems.

Using an exception access list is pretty silly: if you're going through
the trouble of listing all a cutomer's prefixes in a list, you might as
well just apply this acl to the interface rather than uRPF with the acl as
exceptions.

There is another way to handle backups: you can also set the weight to a
higher value for customer routes. This way, the router connecting to the
customer will always use the routes announced by the customer, even if the
rest of the network deems them inferior to another route to this customer
because of a lower local pref, a higher MED or a longer AS path.

This mechanism is also useful for peering: because of the higher weight,
the border router will always prefer the exchange (or private peering
link) for all traffic to the customer, so uRPF works. The rest of the
network can still decide to send the traffic to another exchange point.

 for non-clued peers, accept based upon any available forwarding path
 [hopefully, by the 100th time you beat on the peer about spoofed crud
 coming from them, they'll get religion and register, since you'll have
 less overall spoofing to track down, you can devote it to slapping
 them around more]

If people stop peering with those network polluters they'll clean up their
act soon enough.

 you should also in/egress filter known bogons at all borders, like
 src/dst in rfc1918
 src/dst in class e

Why? That doesn't buy you much except job security because someone
spending so much time on those impressive filters can't be missed of
course.

 src in class d (not dest, however)

Some multicast apps set the source to the group address as well.

Iljitsch van Beijnum




Re: Effective ways to deal with DDoS attacks?

2002-05-03 Thread Rubens Kuhl Jr.



Do you mind sharing with us the 4 things that exists only in DoS packets ?


Rubens Kuhl Jr.


- Original Message -
 They CAN filter on anything in the headers, it's just a matter of
 convincing them that the specific filter you want is something they should
 add to their software language and microcode. I'm sure as a core router
 vendor they must hear every feature request imaginable and not know which
 ones to follow up on. If anyone from Juniper is listening, I can tell you
 4 things to add which will stop all existing packet kiddie tools in their
 tracks. But then again, I'd rather just have a language for bitmatching at
 any offset. :)





RE: Effective ways to deal with DDoS attacks?

2002-05-03 Thread Barry Raveendran Greene



Jason described uRPF in Loose Check mode. This check to see if the source
exist in the FIB. It cuts out some of the garbage while providing you a tool
to do a remote-triggered (via BGP ) drop tool. Think of uRPF as a tool to do
source based black hole filtering.

uRPF Strict Mode is the original tool to help scale BCP38 filtering. This
checks the FIB and the adjacency - insuring the source address of the packet
coming into the interface has a patch to get back (hence checking the
validity of the packet). This is a ISP-Customer edge tool. It _does_ work
with multihomed customers for the most common multihoming configs. Just set
that BGP weight on the customer's peering session.

It is getting a little old, but check out the following:

http://www.cisco.com/public/cons/isp/documents/uRPF_Enhancement.pdf

http://www.cisco.com/public/cons/isp/security/



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
 Mark Turpin
 Sent: Thursday, May 02, 2002 10:05 AM
 To: LeBlanc, Jason
 Cc: [EMAIL PROTECTED]
 Subject: Re: Effective ways to deal with DDoS attacks?



 On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote
 something like this:
 snip
 
  There are some limitations as to where uRPF works, SONET only
 on GSRs for
  example (thanks Cisco).  I believe it will work on 65xx (SUP1A
 and SUP2 I
  think) regardless of interface type.  Impact should be minimal,
 as it simply
  does a lookup in the CEF table, if the route isn't there it
 discards.  Keep
  in mind this is NOT a filter, so the impact is much less, it is
 simply a CEF
  lookup, much more efficient than a filter.  This will get rid of a HUGE
  percentage of spoofed packets that hit your network, and would also work
  pretty well if you are the source of an attack.  There is some
 debate as to
  whether you must not have ANY RFC1918 space for this to work.
 We're trying
  to find this out (not a priority), if I get info I'll post.
 

 hmm... either you're being extremely vague, or you misunderstand
 how RPF works.
 http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/12
1cgcr/secur_c/scprt5/scdrpf.htm

Its not checking cef to see if a route is there its making sure that a
packet
received on an interface came in on an interface that is the best return
path
to reach that packet.

thereby explaining why multihomed customers will get borked in the event of
using rpf.

enjoy,
-mark
--
 Support your local medical examiner--die strangely.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Avleen Vig


On Thu, 2 May 2002, Christopher L. Morrow wrote:

 On Thu, 2 May 2002, Avleen Vig wrote:
  If you're being attacked by a SYN flood, you can ask try to rate-limit the
  flood at your border (possible on Cisco IOS 12.0 and higher, and probably
  other routers too?)
 Let me say this one more time... RATE LIMITS DON'T DO SHIT TO STOP
 ATTACKS for the victim atleast, all they do is make the job of the
 attacker that much easier.  For instance:
 1) I synflood www.avleen.org
 2) you rate-limit syns to 1MB
 3) I now only flood 1MB and I still win
 So, don't rely on a rate-limit as its not going to help.

Actually it's avleen.com :)
But joking aside you make a valid point. I should have clarified my
statement by saying that I was thinking of the whole network getting
attacked rather than the single host.
Yes, one host may be the target, but when your bandwidth is saturates,
your entire network is effectively offline.
I have seen some 'clever' handling of DoS / DDoS from the attackers front
where they don't often like to waste bandwidth during an attack. If a 1Mb
flood will take you offline, they won't bother using 100Mb. Maybe 2Mb but
not 100Mb :)
This can be a Good Thing(tm) if you're willing to temporarily let one host
suffer so that the rest of your network can stay alive.

  The only thing you can try and do is work with your upstream provider and
  try to trace the source of the attacks back, but that's incredibly
  difficult.
 This depends :) Call us, if you are our customer, and I guarantee that
 someone will be there to resolve your issue, most times in 5 minutes or
 less. Perhaps other ISP's should start having some folks on staff and
 available for these tasks? (hint, Hint, HINT!!!)

I wish other ISPs would start doing this.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Hank Nussbacher


At 01:49 AM 02-05-02 +0100, Avleen Vig wrote:

As time goes by, tools are being developed (in fact they're used now) that
completely randomize the TCP or UDP ports attacked, or use a variety of
icmp types in the attack.
So cuurrently the only way you can 'block' such attacks is to block all
packets for the offending protocol as far upstream as you possibly can,
but this is not ideal.

If you're being attacked by a SYN flood, you can ask try to rate-limit the
flood at your border (possible on Cisco IOS 12.0 and higher, and probably
other routers too?)

ACLs have been a good tool for the past number of years to stop DOS attacks 
but they suffer one very bad feature - they throw away the good packets 
along with the bad packets.  The same goes for CAR.  The same goes for 
taking a /32 and null routing it.  Consider Amazon being hit with a DDOS 
attack from random spoofed IPs to their web site.  You can't block on 
source IP since it is random.  If you block on destination IP - you end up 
taking Amazon off the network (the ultimate aim of the attacker) at a daily 
revenue loss of over $1M.

Therefore, the solutions in the future will be mechanisms that can filter 
and sieve the bad packets out and let the good packets thru.

Disclosure: I consult to an anti-DDOS company with this philosophy.

Hank
Consultant
Riverhead Networks (formerly Wanwall Networks)
www.riverhead.com


If you're being smurfed, you can block ICMP Echo Reply's inbound to the
target IP.

It all depends on the TYPE of attack.

Having said that, it's only a matter of time before somebody releases a
tool that saturates a line by spooofing the source, randomizing the
protocol, and ports, and maybe even atacking other hosts on the same
subnet, etc etc.

The only thing you can try and do is work with your upstream provider and
try to trace the source of the attacks back, but that's incredibly
difficult.

As a side note, does anyone know the status of the ICMP Traceback
proposal? The ieft draft expired yesterday:
http://www.ietf.org/internet-drafts/draft-ietf-itrace-01.txt




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Hank Nussbacher


At 04:16 AM 02-05-02 +, Christopher L. Morrow wrote:

What we use and we're a 'largeish' network:

http://www.secsup.org/Tracking/
(shameless plug #1)

Among other things this is a tool we use... there was a great set of
slides and presentation given at NANOG23:

http://www.nanog.org/mtg-0110/greene.html
(shameless plug #2)

Shameless plug #3 from RIPE41:
http://www.ripe.net/ripe/meetings/archive/ripe-41/tutorials/eof-ddos.pdf
155 slides - 2.3M

-Hank
Consultant
Riverhead Networks (formerly Wanwall Networks)
www.riverhead.com



There is also a set of papers Barry Greene from Cisco has available on the
Cisco website... I'm positive he'll respond to this with the link, if he
doesn't search the NANOG mailing list archive for the link it should be
obvious in posts from Barry.

If you want more pointers I'd be glad to chat on the phone with you,
numbers included below.


--Chris
([EMAIL PROTECTED])
###
## UUNET Technologies, Inc.  ##
## Manager   ##
## Customer Router Security Engineering Team ##
## (W)703-886-3823 (C)703-338-7319   ##
###

On Wed, 1 May 2002, Pete Kruckenberg wrote:

 
  There's been plenty of discussion about DDoS attacks, and my
  IDS system is darn good at identifying them. But what are
  effective methods for large service-provider networks (ie
  ones where a firewall at the front would not be possible) to
  deal with DDoS attacks?
 
  Current method of updating ACLs with the source and/or
  destination are slow and error-prone and hard to maintain
  (especially when the target of the attack is a site that
  users would like to access).
 
  A rather extensive survey of DDoS papers has not resulted in
  much on this topic.
 
  What processes and/or tools are large networks using to
  identify and limit the impact of DDoS attacks?
 
  Thanks.
  Pete.
 
 




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Scott Francis

On Wed, May 01, 2002 at 05:18:24PM -0600, [EMAIL PROTECTED] said:
[snip]
 A rather extensive survey of DDoS papers has not resulted in
 much on this topic.
 
 What processes and/or tools are large networks using to
 identify and limit the impact of DDoS attacks?

It seems to me that the real issue in defending against an attack of this
type of differentiating between legitimate traffic and zombie traffic. This
seems to be self-evident, but on a distributed scale, how _would_ one tell
the difference between a host/netblock that's making a lot of requests to a
busy site (amazon.com, say) and a host/netblock that's sending a lot of
zombie requests, especially when both sets of requests are bound for the same
ports (80/443 in this case) on the same IP/set of IPs? The more D the DoS,
the more difficult it becomes to tell what's legit and what's not.

(Stating the obvious again, I know, but it helps me think. :) )

-- 
Scott Francis   darkuncle@ [home:] d a r k u n c l e . n e t
Systems/Network Manager  sfrancis@ [work:] t o n o s . c o m
GPG public key 0xCB33CCA7  illum oportet crescere me autem minui



msg01355/pgp0.pgp
Description: PGP signature


Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Alexei Roudnev


There is one more usefull policy to decrease effectiveness of attacks such as
DDOS.

This is _refusal_ policy. In case of SYN attack, if system ALWAYS accept SYN
packets, dropping old waiting half-open connections if there is not enougph room,
SYN attack became much less dangerous - if 90% traffic is DDOS and 10% traffic is
usefull, most _right_ connections will compleet succesfully (because if room for
the half-open connections is big enougph, DDOS packets will drop mainly other DDOS
related connections).

It's a common approach - NEVER refuse new requests for the resource, if there is
not enougph resource, drop some of the old users of the resource... In a lot of
cases, it will derevent deadlock because you will be dropping the users who
exhausted resource more than _correct_ users. It relay to the half connections,
memory, etc etc...

If case of _random_ IP addresses - ok, what's happen if you'll drop (always) FIRST
packet from any new IP address? For the good SYN packet, you will receive a second
request in a second; for a false one, you just filter out DDOS itself. This is not
universal, but for the simple DDOS it will work.

It's not too bad to slow down all connections (by requesting _repeated request_,
for example) instead of blocking them.

So, I think things are not so bad.

- Original Message -
From: Hank Nussbacher [EMAIL PROTECTED]
To: Avleen Vig [EMAIL PROTECTED]; Pete Kruckenberg
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, May 02, 2002 1:51 AM
Subject: Re: Effective ways to deal with DDoS attacks?



 At 01:49 AM 02-05-02 +0100, Avleen Vig wrote:

 As time goes by, tools are being developed (in fact they're used now) that
 completely randomize the TCP or UDP ports attacked, or use a variety of
 icmp types in the attack.
 So cuurrently the only way you can 'block' such attacks is to block all
 packets for the offending protocol as far upstream as you possibly can,
 but this is not ideal.
 
 If you're being attacked by a SYN flood, you can ask try to rate-limit the
 flood at your border (possible on Cisco IOS 12.0 and higher, and probably
 other routers too?)

 ACLs have been a good tool for the past number of years to stop DOS attacks
 but they suffer one very bad feature - they throw away the good packets
 along with the bad packets.  The same goes for CAR.  The same goes for
 taking a /32 and null routing it.  Consider Amazon being hit with a DDOS
 attack from random spoofed IPs to their web site.  You can't block on
 source IP since it is random.  If you block on destination IP - you end up
 taking Amazon off the network (the ultimate aim of the attacker) at a daily
 revenue loss of over $1M.

 Therefore, the solutions in the future will be mechanisms that can filter
 and sieve the bad packets out and let the good packets thru.

 Disclosure: I consult to an anti-DDOS company with this philosophy.

 Hank
 Consultant
 Riverhead Networks (formerly Wanwall Networks)
 www.riverhead.com


 If you're being smurfed, you can block ICMP Echo Reply's inbound to the
 target IP.
 
 It all depends on the TYPE of attack.
 
 Having said that, it's only a matter of time before somebody releases a
 tool that saturates a line by spooofing the source, randomizing the
 protocol, and ports, and maybe even atacking other hosts on the same
 subnet, etc etc.
 
 The only thing you can try and do is work with your upstream provider and
 try to trace the source of the attacks back, but that's incredibly
 difficult.
 
 As a side note, does anyone know the status of the ICMP Traceback
 proposal? The ieft draft expired yesterday:
 http://www.ietf.org/internet-drafts/draft-ietf-itrace-01.txt






Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Vadim Antonov



On Thu, 2 May 2002, Christopher L. Morrow wrote:

 1) I hack connected ISP X
 2) I inject www.ebay.com /32 blackhole route
 3) no more ebay
 
 I use ebay as an example of course, I wouldn't want them harmed cause how
 would I be able to buy all that nice routing gear at bargain basement
 prices without them? :)

Replace steps 2 and 3 with:

2) I route all packets going to Ebay to my box
3) I have my box to connect to real Ebay using passwords folks connecting 
   to my man-in-the-middle box (how many of them have a clue to carefully 
   look to the SSL in use icon anyway?)
4) I have the mershandise they bought shipped to me; and steal their CC 
   numbers in the process.

There are endless variations on the theme.  Access to the routing 
infrastructure _MUST_ be tightly controlled.

Intercepting traffic to root NSes is even more fun :)  And, Satan bless
the folks who want to let Unicode into DNS names, having many visually
indistinguishable ebay.coms is a breeze, so one can get valid X.509
certificates for those undistinguishable ebays, too.

--vadim




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Vincent Gillet


[EMAIL PROTECTED] disait :

  have been on the receiving end of, the first was generating a little over
  300mbit/sec (steady for a prolonged time), and the second went over that by a
  fair bit.  In both cases, we had core equipment (M20's and BSN5000's) fall
  over and die trying to work the events.  Additionally, our upstream peers
 
 Your M20 tipped over?? What were you doing? We regularly stop large
 (+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
 cisco is even capable of filtering (done right) at +200kpps...

On Cisco boxes, it depends too much on Interface type, LC Engine, IOS, ...
etc ...

Beside, some features cannot run concurently (i remumber an ACL on GSR
that make my netflow export stop  it tooks days to figure this out !!!)

ACL Implement on GSR is too a nightmare.
We are operating more than 70 GSRs with very different interface, LC engine and IOS ...

_some_ IOS with _some_ LC might truthfully filter (turbo, extended, vanilla,
in, out ACLs ?!)  but there is too many variable in the equation
to get ops people use it for massive anti-DOS purpose !

Vincent.



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Iljitsch van Beijnum


On Wed, 1 May 2002, Pete Kruckenberg wrote:

 There's been plenty of discussion about DDoS attacks, and my
 IDS system is darn good at identifying them. But what are
 effective methods for large service-provider networks (ie
 ones where a firewall at the front would not be possible) to
 deal with DDoS attacks?

I'm working on something that should provide a solution to this for at
least some subset of all attacks.

Basically, it works like this: when you identify the target of the attack,
you have traffic for those target addresses rerouted to a filter box.
This filter box then contains source address based filters to get rid of
the attacking traffic.

The idea is that a service provider could install one or more of those
filter boxes (standard routers or multilayer switches) and have customers
use standard BGP mechanisms to get the filter boxes to clean up the
traffic. This should work as long as the number of source addresses is
relatively limited, say below 20,000.

If anyone is interested in testing such a setup in a real network, contact
me off-list. My goal is to evaluate how well this works and then write up
an article for the benefit of the networking community.

Iljitsch van Beijnum




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Iljitsch van Beijnum


On Thu, 2 May 2002, Avleen Vig wrote:

  Basically, it works like this: when you identify the target of the attack,
  you have traffic for those target addresses rerouted to a filter box.
  This filter box then contains source address based filters to get rid of
  the attacking traffic.

 Two questions:
   1) How do you plan on determining what an allowed src address and what
  isn't?

allowed?

   2) Secondly, how would you deal with spoofed src addresses where the src
  address is rarely repeated in the attack?

If that is the case, this solution won't help. Unfortunately, it is
impossilbe to prevent traffic with spoofed source addresses to come in
over transit connections. However, it is doable to make sure traffic
coming in from peers uses source addresses that belong to peers. So for
networks large enough to have a major part of their traffic coming in over
peering rather than transit, there are possibilities.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Jeff Workman




Stoned koalas drooled eucalyptus spit in awe as Christopher L. Morrow 
exclaimed:


 I use ebay as an example of course, I wouldn't want them harmed cause how
 would I be able to buy all that nice routing gear at bargain basement
 ^^^
Shouldn't this be s/I/WCOM/? :)

 prices without them? :)

I suspect that they'll be buying all the Cicso memory they can find on 
there now, to support the route boat they've introduced over the past two 
days.

WCOM 9:55am 2.425 +0.215 +9.73% 20,522,300

/me scrounges around in the couch cushions, looking for change to buy some 
WCOM.

-J

--
Jeff Workman | [EMAIL PROTECTED] | http://www.pimpworks.org



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Richard A Steenbergen


On Wed, May 01, 2002 at 11:56:07PM -0600, Pete Kruckenberg wrote:
 
 On Thu, 2 May 2002, Richard A Steenbergen wrote:
 
  You have an interesting situation. I think rate limiting
  outbound RSTs would be the least offensive thing you
  could do, off the top of my head.
 
 What about just blocking out-going RSTs altogether from our borders?
 While this interferes with proper TCP functionality, would it actually
 interfere enough to cause noticeable problems? Would certainly be less
 of a burden on routers than rate-limiting.

If you really wanted to try you could probably get away with it, but 
you'll probably get complaints about broken behavior during peacetime.

I'd still advise a rate limit, say something on the order of 512Kbps or
less depending on your pipe, and outbound TCP RST. If this makes your
routers fall over, you need new routers.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread LeBlanc, Jason


uRPF and Radware DoShield, one DoShield per link btw edge router and core
router.  Use IDS (yes there is a way to capture all your traffic and
anaylyze it, regardless of bandwidth, no it isn't one box) to identify a
signature, build a filter, config filter on DoShield, up to ~200Mb/s per
DoShield of filtering with zero impact to legit traffic.  Scale horizontally
(add more links each with a DoShield on it) based on your ingress traffic.

I've seen many suggestions on this list, this is the only thing that works
for huge (100Mb/s+) attacks.  eBay is likely the biggest target on the net,
this works for us 90% of the time.  Is the HW expensive?  Yes. (~$35k per
DoShield I think)  It works, it scales.  

There is no way a Cisco router can handle filtering attacks past a certain
point, nor is it capable of even filtering on some patterns in attack
packets.  Juniper is better, but still lacks some filtering capabilities.
Your router is a router, not a packet filter, give up trying to make it do
this until someone builds this into an ASIC on the router.

Email me off list for more info.

-Original Message-
From: Pete Kruckenberg [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 01, 2002 4:18 PM
To: [EMAIL PROTECTED]
Subject: Effective ways to deal with DDoS attacks?



There's been plenty of discussion about DDoS attacks, and my
IDS system is darn good at identifying them. But what are
effective methods for large service-provider networks (ie
ones where a firewall at the front would not be possible) to
deal with DDoS attacks?

Current method of updating ACLs with the source and/or
destination are slow and error-prone and hard to maintain
(especially when the target of the attack is a site that
users would like to access).

A rather extensive survey of DDoS papers has not resulted in
much on this topic.

What processes and/or tools are large networks using to
identify and limit the impact of DDoS attacks?

Thanks.
Pete.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread measl



On Thu, 2 May 2002, Christopher L. Morrow wrote:
 On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:
 
 
  True DDoS attacks, fortunately, are rarer than most people believe.  If they
  were not, the Internet as we know it would look a lot more like a telephone
  system in USSR-at-it's-worst-days.  For example, of the two recent DDoS's I
  have been on the receiving end of, the first was generating a little over
  300mbit/sec (steady for a prolonged time), and the second went over that by a
  fair bit.  In both cases, we had core equipment (M20's and BSN5000's) fall
  over and die trying to work the events.  Additionally, our upstream peers
 
 Your M20 tipped over?? What were you doing? We regularly stop large
 (+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
 cisco is even capable of filtering (done right) at +200kpps...

I'm sorry, I was not clear here...  The M20 does great at simply pushing this
load to discard, but the overhead of what we were trying to do (extensive
filter lists to try and begin backtracing the actual skr1pt k1dd13
origin) was too much.  There is simply no good way to get back to the
ultimate source of truly distributed DoS attacks, which is, IMHO, the reason
these attacks are so prevalent - no fear of prosecution, no matter how much
collateral damage is inflicted.

  also had core equipment fall over, and we all came the [now obvious]
  conclusion that the only way to stop these attacks was to completely null
  route ourselves at our upstreams (they tried filter-fishing for specific data
  which may have helped our investigation, but when their routers started
  wheezing, we gave them the OK to just send us straight into the bit bucket
  till it was over...
 
 
 Hmm, this highlights the need to learn how to use the equipment, learn its
 boundaries and learn defenses inside these boundaries...

In the larger picture, my concern is with finding the source, so I can
prevent recurrence - a paradoxical problem considering that the short term
goal is to just stop the attack...

 
 -Chris
 
 

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Richard A Steenbergen


On Wed, May 01, 2002 at 11:29:46PM -0600, Pete Kruckenberg wrote:
 
 We do have a fairly aggressive security group that
 identifies compromised machines and assists customers in
 properly securing them. We can be fairly certain that the
 way these hosts are responding to this DoS attack is not as
 a result of being compromised, but a normal IP stack
 implementation.

Please please please please please tell me you are doing ingress filtering 
so the compromised boxes you host aren't spewing totally random source 
addresses on the internet.

Not that it matters though, it's still pretty difficult to find the box in 
question. DDoS programs have been auto-probing for the best src address 
method to use for some time now (almost since their birth). For example, 
say a box is compromised on a network which does ingress filtering. The 
packet program detects this, and instead of randomizing the IP with every 
packet, it picks a single random IP by spoofing the last octet. In the 
interesting environments (like a college dorm network) this gets past most 
peoples ingress filters, since they're usually not exactly providing layer 
3 all the way to the student. So when you send in a DoS complaint about 
1.2.3.182, the campus computer nerd looks it up, and goes to knock on that 
persons door. Little do they know that the actual compromised machine is 
1.2.3.97 spoofing it. You ever tried explaining this to the campus nerd? 
Not pretty!

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Christopher L. Morrow




On Thu, 2 May 2002, Hank Nussbacher wrote:


 At 01:49 AM 02-05-02 +0100, Avleen Vig wrote:

 As time goes by, tools are being developed (in fact they're used now) that
 completely randomize the TCP or UDP ports attacked, or use a variety of
 icmp types in the attack.
 So cuurrently the only way you can 'block' such attacks is to block all
 packets for the offending protocol as far upstream as you possibly can,
 but this is not ideal.
 
 If you're being attacked by a SYN flood, you can ask try to rate-limit the
 flood at your border (possible on Cisco IOS 12.0 and higher, and probably
 other routers too?)

 ACLs have been a good tool for the past number of years to stop DOS attacks
 but they suffer one very bad feature - they throw away the good packets
 along with the bad packets.  The same goes for CAR.  The same goes for
 taking a /32 and null routing it.  Consider Amazon being hit with a DDOS
 attack from random spoofed IPs to their web site.  You can't block on
 source IP since it is random.  If you block on destination IP - you end up
 taking Amazon off the network (the ultimate aim of the attacker) at a daily
 revenue loss of over $1M.

So, just filter and track quickly... move the block as far back as you
can. Have the customer remain agile also. :)




RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread LeBlanc, Jason


I guess the 'filter box' can be a number of different things, based on your
needs and preferences.  At first glance CloudShield seems pretty beefy, am
reading more as we speak.

Yes, Juniper can be convinced to add things, we've asked for a few.  ;)
Part of the problem with asking for new things on an ASIC, takes time.
Anything they add in their code to help filter will likely not be done in
hardware, meaning potential impact.  I know some people need to filter on
their routers for various reasons, but my thoughts are to minimize this.  A
router that is working hard at just forwarding packets doesn't need to extra
overhead of looking deep into packet headers to figure out what to do with
packets.  Juniper is better at this, as are some Cisco products, but the GSR
is a crappy packet filter if you put enough traffic through it.  Yes certain
linecards are better than others, but the newer they are the more buggy they
are, and we're talking HW here, so bug fixes will be awhile.

The caveat to all this is obvious, these are big links and big routers, only
applies to high traffic networks..as that is the only place the expense is
justified.  uRPF, however, works on (almost) any CEF capable Cisco router.

Some may have already seen this, worth a look if not.  

http://www.cisco.com/warp/public/707/newsflash.html

There are some limitations as to where uRPF works, SONET only on GSRs for
example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
think) regardless of interface type.  Impact should be minimal, as it simply
does a lookup in the CEF table, if the route isn't there it discards.  Keep
in mind this is NOT a filter, so the impact is much less, it is simply a CEF
lookup, much more efficient than a filter.  This will get rid of a HUGE
percentage of spoofed packets that hit your network, and would also work
pretty well if you are the source of an attack.  There is some debate as to
whether you must not have ANY RFC1918 space for this to work.  We're trying
to find this out (not a priority), if I get info I'll post.



-Original Message-
From: Richard A Steenbergen [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 02, 2002 9:23 AM
To: LeBlanc, Jason
Cc: 'Pete Kruckenberg'; [EMAIL PROTECTED]
Subject: Re: Effective ways to deal with DDoS attacks?


On Thu, May 02, 2002 at 08:54:05AM -0700, LeBlanc, Jason wrote:
 
 uRPF and Radware DoShield, one DoShield per link btw edge router and core
 router.  Use IDS (yes there is a way to capture all your traffic and
 anaylyze it, regardless of bandwidth, no it isn't one box) to identify a
 signature, build a filter, config filter on DoShield, up to ~200Mb/s per
 DoShield of filtering with zero impact to legit traffic.  Scale
horizontally
 (add more links each with a DoShield on it) based on your ingress traffic.
 
 I've seen many suggestions on this list, this is the only thing that works
 for huge (100Mb/s+) attacks.  eBay is likely the biggest target on the
net,
 this works for us 90% of the time.  Is the HW expensive?  Yes. (~$35k per
 DoShield I think)  It works, it scales.  

You might want to take a look at CloudShield (www.cloudshield.com), they 
have what can only be described as a pretty impressive looking box for 
this kind of stuff.

 There is no way a Cisco router can handle filtering attacks past a
 certain point, nor is it capable of even filtering on some patterns in
 attack packets.  Juniper is better, but still lacks some filtering
 capabilities. Your router is a router, not a packet filter, give up
 trying to make it do this until someone builds this into an ASIC on the
 router.

Thats what the IP2 does, match bytes in the headers and come back with a 
thumbs down or a thumbs up and a destination interface. It's really not 
that much harder to match the bytes for a dest port against a compiled 
ruleset and decide yes or no then it is to match the dest address against 
a forwarding table and decide which nexthop.

They CAN filter on anything in the headers, it's just a matter of
convincing them that the specific filter you want is something they should
add to their software language and microcode. I'm sure as a core router
vendor they must hear every feature request imaginable and not know which
ones to follow up on. If anyone from Juniper is listening, I can tell you
4 things to add which will stop all existing packet kiddie tools in their
tracks. But then again, I'd rather just have a language for bitmatching at
any offset. :)

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Christopher L. Morrow



On Thu, 2 May 2002, Vincent Gillet wrote:

 [EMAIL PROTECTED] disait :

   have been on the receiving end of, the first was generating a little over
   300mbit/sec (steady for a prolonged time), and the second went over that by a
   fair bit.  In both cases, we had core equipment (M20's and BSN5000's) fall
   over and die trying to work the events.  Additionally, our upstream peers
 
  Your M20 tipped over?? What were you doing? We regularly stop large
  (+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
  cisco is even capable of filtering (done right) at +200kpps...

 On Cisco boxes, it depends too much on Interface type, LC Engine, IOS, ...
 etc ...

In this you have my whole-hearted agreement :( But, this goes back to
'know you systems, know their boundaries'. All of the people that work
here (on our team) know what you can and can't do, we are effective in our
jobs because of this. Sure your random NOC worker or even level3/4 NOC
worker isn't going to know all the ins and outs of security thingy's on
your backbone equipemt, that's why you pay 5-7 people to learn it :)


 Beside, some features cannot run concurently (i remumber an ACL on GSR
 that make my netflow export stop  it tooks days to figure this out !!!)


Ha! :) try acl's on engine-2 cards with sub-interfaces! (like the triton
gig card... cause no one would ever sub-interface a gig interface, right?)

 ACL Implement on GSR is too a nightmare.
 We are operating more than 70 GSRs with very different interface, LC engine and IOS 
...


Just 70? your live is easy then :) Really though, this is, in my opinion,
the larges problem Cisco has to over come. They need to have the 'luxury'
that Juniper has: One IOS, One implementation of commands, same commands
everywhere... consistency I believe its called.

Its not, obviously, going to happen overnight, but to their credit folks
at cisco ARE working to make the security problem less of a problem. If
you are having trouble getting your sales folk from cisco to
listen/understand/pass-along-input you can look for their 'ISP Group'
which I'm sure Barry Greene will be happy to properly name and provide
contacts for, or perhaps they are in the sites he posted here before?




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Christopher L. Morrow



On Thu, 2 May 2002, Iljitsch van Beijnum wrote:


 On Wed, 1 May 2002, Pete Kruckenberg wrote:

  There's been plenty of discussion about DDoS attacks, and my
  IDS system is darn good at identifying them. But what are
  effective methods for large service-provider networks (ie
  ones where a firewall at the front would not be possible) to
  deal with DDoS attacks?

 I'm working on something that should provide a solution to this for at
 least some subset of all attacks.

 Basically, it works like this: when you identify the target of the attack,
 you have traffic for those target addresses rerouted to a filter box.
 This filter box then contains source address based filters to get rid of
 the attacking traffic.

 The idea is that a service provider could install one or more of those
 filter boxes (standard routers or multilayer switches) and have customers
 use standard BGP mechanisms to get the filter boxes to clean up the
 traffic. This should work as long as the number of source addresses is
 relatively limited, say below 20,000.


Congrats on re-inventing the wheel :( This is what
mazuu/arbor/wanwall(riverhead now?) all do... this is also the way
CenterTrack(tm robert stone) was kind of supposed to work.

As near as I can tell this doesn't scale too well in a large network. This
is a shame, but its a reality. Additionally 20k sources max? that's not
nearly enough, how many addresses are in 0/0 ? you should atleast plan for
this contingency...




RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread LeBlanc, Jason


Try a compiled ACL on a 3 port gigE for some fun.

-Original Message-
From: Christopher L. Morrow [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 02, 2002 9:48 AM
To: Vincent Gillet
Cc: Christopher L. Morrow; [EMAIL PROTECTED]; Pete Kruckenberg;
[EMAIL PROTECTED]
Subject: Re: Effective ways to deal with DDoS attacks?




On Thu, 2 May 2002, Vincent Gillet wrote:

 [EMAIL PROTECTED] disait :

   have been on the receiving end of, the first was generating a little
over
   300mbit/sec (steady for a prolonged time), and the second went over
that by a
   fair bit.  In both cases, we had core equipment (M20's and BSN5000's)
fall
   over and die trying to work the events.  Additionally, our upstream
peers
 
  Your M20 tipped over?? What were you doing? We regularly stop large
  (+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
  cisco is even capable of filtering (done right) at +200kpps...

 On Cisco boxes, it depends too much on Interface type, LC Engine, IOS, ...
 etc ...

In this you have my whole-hearted agreement :( But, this goes back to
'know you systems, know their boundaries'. All of the people that work
here (on our team) know what you can and can't do, we are effective in our
jobs because of this. Sure your random NOC worker or even level3/4 NOC
worker isn't going to know all the ins and outs of security thingy's on
your backbone equipemt, that's why you pay 5-7 people to learn it :)


 Beside, some features cannot run concurently (i remumber an ACL on GSR
 that make my netflow export stop  it tooks days to figure this out
!!!)


Ha! :) try acl's on engine-2 cards with sub-interfaces! (like the triton
gig card... cause no one would ever sub-interface a gig interface, right?)

 ACL Implement on GSR is too a nightmare.
 We are operating more than 70 GSRs with very different interface, LC
engine and IOS ...


Just 70? your live is easy then :) Really though, this is, in my opinion,
the larges problem Cisco has to over come. They need to have the 'luxury'
that Juniper has: One IOS, One implementation of commands, same commands
everywhere... consistency I believe its called.

Its not, obviously, going to happen overnight, but to their credit folks
at cisco ARE working to make the security problem less of a problem. If
you are having trouble getting your sales folk from cisco to
listen/understand/pass-along-input you can look for their 'ISP Group'
which I'm sure Barry Greene will be happy to properly name and provide
contacts for, or perhaps they are in the sites he posted here before?



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Richard A Steenbergen


On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote:
 
 Yes, Juniper can be convinced to add things, we've asked for a few.  ;)
 Part of the problem with asking for new things on an ASIC, takes time.
 Anything they add in their code to help filter will likely not be done
 in hardware, meaning potential impact.  I know some people need to
 filter on their routers for various reasons, but my thoughts are to
 minimize this.  A router that is working hard at just forwarding packets
 doesn't need to extra overhead of looking deep into packet headers to
 figure out what to do with packets.  Juniper is better at this, as are
 some Cisco products, but the GSR is a crappy packet filter if you put
 enough traffic through it.  Yes certain linecards are better than
 others, but the newer they are the more buggy they are, and we're
 talking HW here, so bug fixes will be awhile.

I think you're misunderstanding how this works.

http://www.juniper.net/news/features/ipii/faq_ip2.html
http://www.juniper.net/techcenter/techpapers/200015-03.html

3. How does the Internet Processor II ASIC enable service providers to
upgrade functionality without upgrading hardware? Essentially, the
Internet Processor II ASIC contains logic that implements a number of
lookup algorithms, including trees, tables, firewall programs, and a way
to chain those individual lookups together in an arbitrary sequence. The
final answer to an entire lookup, then, is the result of all the matches
that were run. By implementing complex lookups as a series of fundamental
primitives, the ASIC can support almost anything for which an application
can be described. Since the ASIC implementation is so general, new
functionality can be enabled in JUNOS software upgrades without having to
swap hardware.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Iljitsch van Beijnum


On Thu, 2 May 2002, LeBlanc, Jason wrote:

 There are some limitations as to where uRPF works, SONET only on GSRs for
 example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
 think) regardless of interface type.  Impact should be minimal, as it simply
 does a lookup in the CEF table, if the route isn't there it discards.

It can do much more. You can use it to get rid spoofed source addresses
from customers and peers without the need to maintain large access lists.

 lookup, much more efficient than a filter.  This will get rid of a HUGE
 percentage of spoofed packets that hit your network,

If you just filter out anything that's not in the routing table, that's
about half the address space and it only works if the spoofers are stupid.
When you're looking at pure bandwidth that's still helpful, but it doesn't
really solve anything.

However, You can use unicast RPF as a very efficient source address
filter, by routing addresses to the null interface. This way you can get
rid of huge amounts of unwanted sources in a very clean way.

As long as we're asking for features: what I would like is a unicast RPF
check that allows everything that isn't routed to the null interface. And
of course unicast RPF period for all vendors who aren't Cisco.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Mark Turpin


On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote something like this:
snip
 
 There are some limitations as to where uRPF works, SONET only on GSRs for
 example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
 think) regardless of interface type.  Impact should be minimal, as it simply
 does a lookup in the CEF table, if the route isn't there it discards.  Keep
 in mind this is NOT a filter, so the impact is much less, it is simply a CEF
 lookup, much more efficient than a filter.  This will get rid of a HUGE
 percentage of spoofed packets that hit your network, and would also work
 pretty well if you are the source of an attack.  There is some debate as to
 whether you must not have ANY RFC1918 space for this to work.  We're trying
 to find this out (not a priority), if I get info I'll post.
 

hmm... either you're being extremely vague, or you misunderstand how RPF works.
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secur_c/scprt5/scdrpf.htm

Its not checking cef to see if a route is there its making sure that a packet
received on an interface came in on an interface that is the best return path
to reach that packet.

thereby explaining why multihomed customers will get borked in the event of using rpf.

enjoy,
-mark
-- 
 Support your local medical examiner--die strangely.



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Iljitsch van Beijnum


On Thu, 2 May 2002, Christopher L. Morrow wrote:

 Congrats on re-inventing the wheel :( This is what
 mazuu/arbor/wanwall(riverhead now?) all do... this is also the way
 CenterTrack(tm robert stone) was kind of supposed to work.

Thanks for the kind works.

Just to be clear: I'm not working on a _product_, just on a paper
explaining how to do this using standard components and protocols.

 As near as I can tell this doesn't scale too well in a large network.

If you have a router that can forward 10 Gbps into the right direction,
you can also have a router forward 10 Gbps in the wrong direction. That's
pretty much all it takes.

 This is a shame, but its a reality. Additionally 20k sources max? that's not
 nearly enough, how many addresses are in 0/0 ? you should atleast plan for
 this contingency...

The idea is to use unicast RPF. So you're only limited by the number of
routes a Cisco can hold. 20k per customer under attack should be doable
without too much effort, more should be possible, but filtering 0/0
defeats the purpose. Also, it can be done using a single line, so no
problem there.




RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread LeBlanc, Jason


Thats how it we understood it to work (CEF lookup).  It checks for a route
in the table, obviously any real route would be in the CEF table.  I may be
wrong, but it doesn't actually send a packet to verify, the logical way to
check would be by checking CEF, as anything the router knows about that is
valid would be in CEF.  If I'm misunderstanding, please do send more info.

-Original Message-
From: Mark Turpin [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 02, 2002 10:05 AM
To: LeBlanc, Jason
Cc: [EMAIL PROTECTED]
Subject: Re: Effective ways to deal with DDoS attacks?


On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote something
like this:
snip
 
 There are some limitations as to where uRPF works, SONET only on GSRs for
 example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
 think) regardless of interface type.  Impact should be minimal, as it
simply
 does a lookup in the CEF table, if the route isn't there it discards.
Keep
 in mind this is NOT a filter, so the impact is much less, it is simply a
CEF
 lookup, much more efficient than a filter.  This will get rid of a HUGE
 percentage of spoofed packets that hit your network, and would also work
 pretty well if you are the source of an attack.  There is some debate as
to
 whether you must not have ANY RFC1918 space for this to work.  We're
trying
 to find this out (not a priority), if I get info I'll post.
 

hmm... either you're being extremely vague, or you misunderstand how RPF
works.
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secu
r_c/scprt5/scdrpf.htm

Its not checking cef to see if a route is there its making sure that a
packet
received on an interface came in on an interface that is the best return
path
to reach that packet.

thereby explaining why multihomed customers will get borked in the event of
using rpf.

enjoy,
-mark
-- 
 Support your local medical examiner--die strangely.



RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread LeBlanc, Jason


It (rpf) can't stop a DoS, but it does cut down on some of the spoofed
packets, any reduction in the number of packets hitting whatever has to
filter or deal with the attack packets helps.  I don't have the stats in
front of me, but our findings were than urpf would cut enough out to be
worthwhile.

-Original Message-
From: Iljitsch van Beijnum [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 02, 2002 9:58 AM
To: LeBlanc, Jason
Cc: [EMAIL PROTECTED]
Subject: RE: Effective ways to deal with DDoS attacks?



If you just filter out anything that's not in the routing table, that's
about half the address space and it only works if the spoofers are stupid.
When you're looking at pure bandwidth that's still helpful, but it doesn't
really solve anything.

However, You can use unicast RPF as a very efficient source address
filter, by routing addresses to the null interface. This way you can get
rid of huge amounts of unwanted sources in a very clean way.

As long as we're asking for features: what I would like is a unicast RPF
check that allows everything that isn't routed to the null interface. And
of course unicast RPF period for all vendors who aren't Cisco.



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Richard A Steenbergen


On Thu, May 02, 2002 at 12:04:35PM -0500, Mark Turpin wrote:
 
 On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote something like this:
 snip
  
  There are some limitations as to where uRPF works, SONET only on GSRs for
  example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
  think) regardless of interface type.  Impact should be minimal, as it simply
  does a lookup in the CEF table, if the route isn't there it discards.  Keep
  in mind this is NOT a filter, so the impact is much less, it is simply a CEF
  lookup, much more efficient than a filter.  This will get rid of a HUGE
  percentage of spoofed packets that hit your network, and would also work
  pretty well if you are the source of an attack.  There is some debate as to
  whether you must not have ANY RFC1918 space for this to work.  We're trying
  to find this out (not a priority), if I get info I'll post.

 hmm... either you're being extremely vague, or you misunderstand how RPF
 works. 
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secur_c/scprt5/scdrpf.htm

 Its not checking cef to see if a route is there its making sure that
 a packet received on an interface came in on an interface that is the
 best return path to reach that packet.

 thereby explaining why multihomed customers will get borked in the event
 of using rpf.

RPF works by matching the source address of the packet against the CEF 
table, in addition to the normal match against the destination address. 
There are multiple modes of operation, ranging from is there a route 
for the source address to the specific interface it come in on to is 
there a route to the source address for ANY interface on the box The 
former is used to stop your single homed customers from spoofing wildly 
into the internet. The latter is usually used as a stopgap measure to 
limit the number of spoofed packets coming into your network via transits. 
The number you'd expect to filter is 50%, assuming the attacker in 
question is using an evenly distributing random() function.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Eric Gauthier


 http://www.cisco.com/warp/public/707/newsflash.html
 There are some limitations as to where uRPF works, SONET only on GSRs for
 example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
 think) regardless of interface type.  Impact should be minimal, as it simply
 does a lookup in the CEF table, if the route isn't there it discards.

We're running 6509's - both Sup1a and Sup2 - with 10, 100, and GigE links
in a large campus environment.  We did have some problems with the Sup2's 
running hybrid code, but the Sup1a's were fine.  When we switched over to 
native IOS about six months ago, both the Sup1a's and Sup2's handled it 
without a problem or performance hit, even on some of our campus Gigabit links.  
Its a nice feature but, as someone already pointed out, its based on routing 
table entries so there is NO PROTECTION if someone on a subnet is spoofing the 
IP of another system on the same subnet.  Having said that, we use it more so
that we can quickly track the source of an attack if its originating on our
network rather than as a means to protect ourselves from the big, bad
Internet.  Once we know the source, we know for sure what router interface
its originating from, so we just start snooping traffic from that interface to
find the offending MAC and go from there...

Another limitation that we've found with uRPF is that it doesn't 
live well with multihomed systems (i.e. a host with two NIC's - each on 
a different subnet) because of the way most OS'es handle their
default gateways.  For anyone who is interested in our experience, drop me 
a note off list.  If you have a solution for this multihoming problem, PLEASE 
email me off-list.

Eric :)



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Aditya


In case no one has already posted it, you might check out the following
document:

  http://www.cisco.com/public/cons/isp/documents/uRPF_Enhancement.pdf

which talks about knobs for Cisco's RPF that will allow it to work with
multihomed situations. There is also stuff in there about how to propogate a
null route quickly for any _source_ prefix using IBGP (and no, an IGP like
ISIS or OSPF won't work) and RPF.

To back Jason up, Cisco's unicast RPF decides whether an interface is the
best by doing a CEF lookup.

Adi

On Thu, May 02, 2002 at 10:16:55AM -0700, LeBlanc, Jason wrote:
 
 Thats how it we understood it to work (CEF lookup).  It checks for a route
 in the table, obviously any real route would be in the CEF table.  I may be
 wrong, but it doesn't actually send a packet to verify, the logical way to
 check would be by checking CEF, as anything the router knows about that is
 valid would be in CEF.  If I'm misunderstanding, please do send more info.
 
 -Original Message-
 From: Mark Turpin [mailto:[EMAIL PROTECTED]]
 Sent: Thursday, May 02, 2002 10:05 AM
 To: LeBlanc, Jason
 Cc: [EMAIL PROTECTED]
 Subject: Re: Effective ways to deal with DDoS attacks?
 
 
 On Thu, May 02, 2002 at 09:41:33AM -0700, LeBlanc, Jason wrote something
 like this:
 snip
  
  There are some limitations as to where uRPF works, SONET only on GSRs for
  example (thanks Cisco).  I believe it will work on 65xx (SUP1A and SUP2 I
  think) regardless of interface type.  Impact should be minimal, as it
 simply
  does a lookup in the CEF table, if the route isn't there it discards.
 Keep
  in mind this is NOT a filter, so the impact is much less, it is simply a
 CEF
  lookup, much more efficient than a filter.  This will get rid of a HUGE
  percentage of spoofed packets that hit your network, and would also work
  pretty well if you are the source of an attack.  There is some debate as
 to
  whether you must not have ANY RFC1918 space for this to work.  We're
 trying
  to find this out (not a priority), if I get info I'll post.
  
 
 hmm... either you're being extremely vague, or you misunderstand how RPF
 works.
 http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secu
 r_c/scprt5/scdrpf.htm
 
 Its not checking cef to see if a route is there its making sure that a
 packet
 received on an interface came in on an interface that is the best return
 path
 to reach that packet.
 
 thereby explaining why multihomed customers will get borked in the event of
 using rpf.
 
 enjoy,
 -mark
 -- 
  Support your local medical examiner--die strangely.



Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Iljitsch van Beijnum


On Thu, 2 May 2002, Richard A Steenbergen wrote:

 RPF works by matching the source address of the packet against the CEF
 table, in addition to the normal match against the destination address.
 There are multiple modes of operation, ranging from is there a route
 for the source address to the specific interface it come in on to is
 there a route to the source address for ANY interface on the box The
 former is used to stop your single homed customers from spoofing wildly
 into the internet.

You can do this for multihomed customers to: it's just that multihomed
customers can't use it for traffic coming from their transits (= you),
because uRPF breaks asymmetric routing.




RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Christopher L. Morrow




On Thu, 2 May 2002, LeBlanc, Jason wrote:


 Try a compiled ACL on a 3 port gigE for some fun.


Last I recall the IOS didn't even have 'ip access-group' in the config of
interfaces :( It took me like three hits of the 'tab' key at 'ip access-g'
before I realized it just wasn't there ;(




RE: Effective ways to deal with DDoS attacks?

2002-05-02 Thread Livio Ricciulli


We have been working on this problem for the last two years and
have productized a practical way to deal with DDoS. Given what I have
read today, I think most people on this list would
like it. If you send me email, I will send you a white paper that is much
more
detailed than what you can find on http://www.reactivenetwork.com.

Livio.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread E.B. Dreger


RAS Date: Thu, 2 May 2002 12:23:01 -0400
RAS From: Richard A Steenbergen


RAS They CAN filter on anything in the headers, it's just a matter of
RAS convincing them that the specific filter you want is something they should
RAS add to their software language and microcode. I'm sure as a core router
RAS vendor they must hear every feature request imaginable and not know which
RAS ones to follow up on. If anyone from Juniper is listening, I can tell you
RAS 4 things to add which will stop all existing packet kiddie tools in their
RAS tracks. But then again, I'd rather just have a language for bitmatching at
RAS any offset. :)

And it wouldn't be that hard to have something to compile
rulesets into simply assembly, either:

movb 0x12(1,%ecx),%al
andb $0x34,%al
xorb $0x14,%al
jz some_destination

Oversimplified, yes.  But mask-then-test is one of the simpler
apps to write.  s/x86/chipofchoice/ and have fun.

Juniper being based on FreeBSD/x86, perhaps some kernel hooks
might be in order for those who wish to write their own code.


--
Eddy

Brotsman  Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence

~
Date: Mon, 21 May 2001 11:23:58 + (GMT)
From: A Trap [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to [EMAIL PROTECTED], or you are likely to
be blocked.




Re: Effective ways to deal with DDoS attacks?

2002-05-02 Thread E.B. Dreger


ED Date: Fri, 3 May 2002 02:35:53 + (GMT)
ED From: E.B. Dreger


ED Juniper being based on FreeBSD/x86, perhaps some kernel hooks
ED might be in order for those who wish to write their own code.

And, were my head on straight, I'd have been thinking about the
ASIC in the line card, _not_ the central CPU...

/me needs sleep.


--
Eddy

Brotsman  Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence

~
Date: Mon, 21 May 2001 11:23:58 + (GMT)
From: A Trap [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to [EMAIL PROTECTED], or you are likely to
be blocked.




Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


There's been plenty of discussion about DDoS attacks, and my
IDS system is darn good at identifying them. But what are
effective methods for large service-provider networks (ie
ones where a firewall at the front would not be possible) to
deal with DDoS attacks?

Current method of updating ACLs with the source and/or
destination are slow and error-prone and hard to maintain
(especially when the target of the attack is a site that
users would like to access).

A rather extensive survey of DDoS papers has not resulted in
much on this topic.

What processes and/or tools are large networks using to
identify and limit the impact of DDoS attacks?

Thanks.
Pete.





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread dies



http://www.secsup.org/Tracking/

UUNet uses that...others might as well, Shrug.

Quick, simple, effective tracking of DDoS attacks.

As for identifying attacks, quite honestly large ISP's are typically still
relying on customer notification.  I know that's how we do it.

On Wed, 1 May 2002, Pete Kruckenberg wrote:


 There's been plenty of discussion about DDoS attacks, and my
 IDS system is darn good at identifying them. But what are
 effective methods for large service-provider networks (ie
 ones where a firewall at the front would not be possible) to
 deal with DDoS attacks?

 Current method of updating ACLs with the source and/or
 destination are slow and error-prone and hard to maintain
 (especially when the target of the attack is a site that
 users would like to access).

 A rather extensive survey of DDoS papers has not resulted in
 much on this topic.

 What processes and/or tools are large networks using to
 identify and limit the impact of DDoS attacks?

 Thanks.
 Pete.







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread dies



Then you are pushing out /32's and peers would need to accept them.  Then
someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

Additionally you are creating a way to basically destroy the Internet as a
whole.  One kiddie gets ahold of a router, say of a large backbone
provider, takes one of their aggregate blocks (/16? /10? /8?) and splits
it into /32 announcements.

Anyways, some providers already allow you to set a community on a route,
and they will inturn blackhole it for you.  I believe Teleglobe does
this for some customers and I know UUNet does this for all customers.

On Wed, 1 May 2002, Wojtek Zlobicki wrote:


   What processes and/or tools are large networks using to
   identify and limit the impact of DDoS attacks?
 
  A great deal of thought is being expended on this question, I am certain,
  however, how many of these thought campaings have born significant fruit
 yet,
  I do not know.

 How about the following :

 We develop a new community , being fully transitive (666 would be
 appropriate ) and either build into router code or create a route map to
 null route anything that contains this community.  The effect of this being
 the distribution of the force of the attack.

 This aside, how effective would be using a no export community with ones
 peers (being non transitive, it would still distribute the force of the
 attack).







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Wojtek Zlobicki


 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

I am in no way proposing discounting current filtering rules.  There are
alway two
different intersts one must consider, one that of the customer and two that
of the service provider.  If a large block must be filtered so be it.

Where are providers drawing the line ?  Anyone have somewhat detailed
published policies as to what a provider can do in order to protect their
nework as a whole.
At what point (strength of the attack) does a customers netblock (assuming a
/24 for
example) get null routed by whichever party.

 Anyways, some providers already allow you to set a community on a route,
 and they will inturn blackhole it for you.  I believe Teleglobe does
 this for some customers and I know UUNet does this for all customers.

When the attack is distributed, having one or two providers (even if they
are UUNET
or Teleglobe) is just not enough.  Must private routing policy be developed
in order to make my suggestion work.  The reason that so many methods likely
fail are the difficulty of implementation and low implementation.







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Leo Bicknell


In a message written on Wed, May 01, 2002 at 08:17:04PM -0500, dies wrote:
 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!

I'm not sure what form this would take, but I have long wished
route processing could be sent into a programming language.  For
this specific example it would be nice to set a maximum number of
route limit for the total number of routes on the session, as well
as /per community/.

That is, community :666 == blackhole me, and I could limit each
peer to say, 6 of these at a time.  More would not take down the
session, but simply be ignored.

I can carry 6 /32's for every peer I have, and if they only have
6, they will probably use them for the most abusive target.

There are, of course, approximately an infinitate number more
applications for a more flexible mechanism.  Of course, it would
require more human smarts, which might be why vendors don't do it.

-- 
   Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Richard A Steenbergen


On Wed, May 01, 2002 at 09:38:52PM -0400, Wojtek Zlobicki wrote:
 
 How about the following :
 
 We develop a new community , being fully transitive (666 would be
 appropriate ) and either build into router code or create a route map to
 null route anything that contains this community.  The effect of this being
 the distribution of the force of the attack.

This has been proposed a dozen times over, and I agree that there should
be a well known community for discarding packets. Go try and get the IETF
to add it, let me know how it goes. :)

 This aside, how effective would be using a no export community with ones
 peers (being non transitive, it would still distribute the force of the
 attack).

Many people do this already. If you're looking to purchase transit and you
think this is something you'll care about, ask for it or vote with your
wallet.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Sean Donelan




On Wed, 1 May 2002, Pete Kruckenberg wrote:
 We experience a lot of types of attacks (education/research
 network  = easy hacker target). With DDoS incidents, it
 seems we are more often an unknowing/unwilling participant
 than the target, partly due to owning big chunks of IP
 address space.

Universities are hacker training grounds, but also have much
better network security response than most corporate networks.
Whatever problems you have, the rest of us will have soon enough
it may just take us longer to notice it.

 Has anyone tried this kind of an approach or any other type
 of automated/efficient approach to dampen the zombie side
 of the DDoS attack?

Has anyone implemented Bellovin's Pushback in a production
network yet?






Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:

 and then again, there has been much discussion on simple
 DoS attacks, where the term DDoS is erroneously used...  
 I am very much not trying to imply that this is the case
 here, but it's important that the two be thoroughly
 distinguished from each other - they are totally
 different things to deal with.

Sorry, I should have been more clear. 

My issue (currently)  is not being the target of the DDoS
attack, but being a (unwilling) participant. People outside
our network are launching DDoS attacks (distributed SYN
floods) against destinations outside our network, using
about 8,000 Web server hosts on our network as reflectors.

These are not zombies. They are secured, uncompromised Web
servers. The attack spoofs the target address as the source,
and one of our machines as a destination, port 80. Getting
everyone to implement defenses (SYN cookies) on their Web
servers is nearly impossible (most don't even have a
defense--printers and routers with Web interfaces).

SYN packet comes in, one of these machines responses with a
RST to the source, which is actually the target of the
attack. Unfortunately, the target is often a site that
people would like to get to, as is the reflector, so
permanent filters on the target or reflector create lots of
complaints.

 We captured several seconds of the last DDoS and came up
 with over 700 participating hosts...

Some of them probably appear to be from our network...

Pete.





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow


What we use and we're a 'largeish' network:

http://www.secsup.org/Tracking/
(shameless plug #1)

Among other things this is a tool we use... there was a great set of
slides and presentation given at NANOG23:

http://www.nanog.org/mtg-0110/greene.html
(shameless plug #2)

There is also a set of papers Barry Greene from Cisco has available on the
Cisco website... I'm positive he'll respond to this with the link, if he
doesn't search the NANOG mailing list archive for the link it should be
obvious in posts from Barry.

If you want more pointers I'd be glad to chat on the phone with you,
numbers included below.


--Chris
([EMAIL PROTECTED])
###
## UUNET Technologies, Inc.  ##
## Manager   ##
## Customer Router Security Engineering Team ##
## (W)703-886-3823 (C)703-338-7319   ##
###

On Wed, 1 May 2002, Pete Kruckenberg wrote:


 There's been plenty of discussion about DDoS attacks, and my
 IDS system is darn good at identifying them. But what are
 effective methods for large service-provider networks (ie
 ones where a firewall at the front would not be possible) to
 deal with DDoS attacks?

 Current method of updating ACLs with the source and/or
 destination are slow and error-prone and hard to maintain
 (especially when the target of the attack is a site that
 users would like to access).

 A rather extensive survey of DDoS papers has not resulted in
 much on this topic.

 What processes and/or tools are large networks using to
 identify and limit the impact of DDoS attacks?

 Thanks.
 Pete.






Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow




On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:


 True DDoS attacks, fortunately, are rarer than most people believe.  If they
 were not, the Internet as we know it would look a lot more like a telephone
 system in USSR-at-it's-worst-days.  For example, of the two recent DDoS's I
 have been on the receiving end of, the first was generating a little over
 300mbit/sec (steady for a prolonged time), and the second went over that by a
 fair bit.  In both cases, we had core equipment (M20's and BSN5000's) fall
 over and die trying to work the events.  Additionally, our upstream peers

Your M20 tipped over?? What were you doing? We regularly stop large
(+100Mb-800Mb) attacks with less horsepower than this. Truthfully, a
cisco is even capable of filtering (done right) at +200kpps...

 also had core equipment fall over, and we all came the [now obvious]
 conclusion that the only way to stop these attacks was to completely null
 route ourselves at our upstreams (they tried filter-fishing for specific data
 which may have helped our investigation, but when their routers started
 wheezing, we gave them the OK to just send us straight into the bit bucket
 till it was over...


Hmm, this highlights the need to learn how to use the equipment, learn its
boundaries and learn defenses inside these boundaries...

-Chris




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, dies wrote:



 Then you are pushing out /32's and peers would need to accept them.  Then
 someone will want to blackhole /30's, /29's, etc.  Route bloat.  Yum!


Yes.

 Additionally you are creating a way to basically destroy the Internet as a
 whole.  One kiddie gets ahold of a router, say of a large backbone
 provider, takes one of their aggregate blocks (/16? /10? /8?) and splits
 it into /32 announcements.


Or, blackhole the /16 :) more fun! (assuming no other smaller
announcements inside that /16 of course)

 Anyways, some providers already allow you to set a community on a route,
 and they will inturn blackhole it for you.  I believe Teleglobe does
 this for some customers and I know UUNet does this for all customers.

Hmm, Mr. 'dies' is almost correct... if you are a UUNET customer and you
would like to do this please call the customer service center and they
will help you to configure this 'service'.

Thanks though Mr. 'dies' :)


 On Wed, 1 May 2002, Wojtek Zlobicki wrote:

 
What processes and/or tools are large networks using to
identify and limit the impact of DDoS attacks?
  
   A great deal of thought is being expended on this question, I am certain,
   however, how many of these thought campaings have born significant fruit
  yet,
   I do not know.
 
  How about the following :
 
  We develop a new community , being fully transitive (666 would be
  appropriate ) and either build into router code or create a route map to
  null route anything that contains this community.  The effect of this being
  the distribution of the force of the attack.
 
  This aside, how effective would be using a no export community with ones
  peers (being non transitive, it would still distribute the force of the
  attack).
 
 
 





Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Wojtek Zlobicki wrote:

 Where are providers drawing the line ?  Anyone have somewhat detailed
 published policies as to what a provider can do in order to protect their
 nework as a whole.
 At what point (strength of the attack) does a customers netblock (assuming a
 /24 for
 example) get null routed by whichever party.

Most providers likely have a policy similar to: I can't sacrafice 1
my network for 1 customer. So, if the attack is sufficient to degrade
service on the ISP network most likely the customer under attack will get
null routed.


  Anyways, some providers already allow you to set a community on a route,
  and they will inturn blackhole it for you.  I believe Teleglobe does
  this for some customers and I know UUNet does this for all customers.

 When the attack is distributed, having one or two providers (even if they
 are UUNET
 or Teleglobe) is just not enough.  Must private routing policy be developed
 in order to make my suggestion work.  The reason that so many methods likely
 fail are the difficulty of implementation and low implementation.

Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
security contact that can actually help in the case of an attack. Today
there are very few that have this capability. I'd say from personal
experience that the number is way too small, even in the 'large' ISP arena
:(

More pressure from customers for real security would be a good start.




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Richard A Steenbergen


On Thu, May 02, 2002 at 04:28:44AM +, Christopher L. Morrow wrote:
 
 Let me say this one more time... RATE LIMITS DON'T DO SHIT TO STOP
 ATTACKS for the victim atleast, all they do is make the job of the
 attacker that much easier.  For instance:
 
 1) I synflood www.avleen.org
 2) you rate-limit syns to 1MB
 3) I now only flood 1MB and I still win
 
 So, don't rely on a rate-limit as its not going to help.

Thank you, I can't make this point enough and people still say we'll just
rate limit!. Filtering is only as good as your ability to DETERMINE WHAT
TO FILTER.

The only time you can get anything from this is when you admit defeat on 
keeping your services responding to new connection but want to keep 
existing connections and/or the end servers from failing completely. 
Depending on the service in question this may or may not be a good goal.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Richard A Steenbergen wrote:

 I give it 2 months, then they'll start hitting random dst IPs in a target
 prefix (say a common /24 going through the same path).


Damn you, don't give them any ideas :)




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Basil Kruglov


On Thu, May 02, 2002 at 04:45:43AM +, Christopher L. Morrow wrote:
 On Wed, 1 May 2002, Wojtek Zlobicki wrote:
 
  Where are providers drawing the line ?  Anyone have somewhat detailed
  published policies as to what a provider can do in order to protect their
  nework as a whole.
  At what point (strength of the attack) does a customers netblock (assuming a
  /24 for
  example) get null routed by whichever party.
 
 Most providers likely have a policy similar to: I can't sacrafice 1
 my network for 1 customer. So, if the attack is sufficient to degrade
 service on the ISP network most likely the customer under attack will get
 null routed.

Are you saying UUnet, assuming for a sec that I am a customer of UUnet (just
for the sake of the argument), UU will not null route my ircd if it
it gets attacked on regular basis, say *daily* ?

Furthermore you are going to consistently place filters on your routers,
take them out within the 24h (or whatever then-current policy of UUnet is)
and track attacks back to their sources within the boundaries of your 
backbone on a daily basis? ;)

Will you do that for say a regular T1 customer or do I need more commitment 
as sales droids like to put it, to even consider such a service ? ;)

 Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
 security contact that can actually help in the case of an attack. Today
 there are very few that have this capability. I'd say from personal
 experience that the number is way too small, even in the 'large' ISP arena
 :(
 
 More pressure from customers for real security would be a good start.

sigh, tried and failed, miserably I might add.

-Basil



Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Wed, 1 May 2002, Richard A Steenbergen wrote:

  DDoS attacks is such a generic term. There are a wide
  variety of attacks which each need to be handled in
  their own way, the extra D is just one possible twist.
  Can you explain what kind of attack you're interested
  in?

 We experience a lot of types of attacks (education/research
 network  = easy hacker target). With DDoS incidents, it
 seems we are more often an unknowing/unwilling participant
 than the target, partly due to owning big chunks of IP
 address space.

 We most frequently are the zombie/reflector participants in
 an attack that originates outside our network, to a target
 outside our network. As many as 8,000 hosts on our network
 are reflecting SYN floods in the current attacks.

Sounds like its time for a firewall on your network :)


 Identification doesn't seem to be a problem. Snort is doing
 far too well notifying us. Responding and managing all of
 the defenses is becoming a lot of pain-staking work, and
 error-prone (why can't Cisco make ACLs easier to manage).


they aren't tough to 'manage' they are sometimes tough to live with though
:(

 Our approach so far has been temporary blocks (via ACL) of
 the target address. Blocking 8,000 internal addresses, many
 legitimate (secured) Web servers, generates more complaints.

 I'm thinking about a scripted Zebra feed where route
 injections are triggered by Snort. Routes for the target
 and/or SYN flood reflector hosts could be injected
 temporarily during the attack to border routers, which would
 route-map those routes to Null0. Script periodically
 withdraws routes to see if the attack is over (some of these
 last weeks, some only last a few seconds), to minimize the
 impact on those otherwise legitimate hosts.


This is a nice idea, anything 'scripted' is prone to abuse though ;( all
of a sudden www.your.edu is dead.. on class registration day no less.

 Has anyone tried this kind of an approach or any other type
 of automated/efficient approach to dampen the zombie side
 of the DDoS attack?







Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Wed, 1 May 2002 [EMAIL PROTECTED] wrote:

  and then again, there has been much discussion on simple
  DoS attacks, where the term DDoS is erroneously used...
  I am very much not trying to imply that this is the case
  here, but it's important that the two be thoroughly
  distinguished from each other - they are totally
  different things to deal with.

 Sorry, I should have been more clear.

 My issue (currently)  is not being the target of the DDoS
 attack, but being a (unwilling) participant. People outside
 our network are launching DDoS attacks (distributed SYN
 floods) against destinations outside our network, using
 about 8,000 Web server hosts on our network as reflectors.

Funny, you say 'secured' here...


 These are not zombies. They are secured, uncompromised Web
 servers. The attack spoofs the target address as the source,
 and one of our machines as a destination, port 80. Getting
 everyone to implement defenses (SYN cookies) on their Web
 servers is nearly impossible (most don't even have a
 defense--printers and routers with Web interfaces).


and here you say: printers and routers Since when did they need to be
accessible off campus? Additionally, why does a router need a web
interface?? Printers are on the cusp, but they certainly don't need to be
accesible from out of your LAN.




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Basil Kruglov wrote:


 On Thu, May 02, 2002 at 04:45:43AM +, Christopher L. Morrow wrote:
  On Wed, 1 May 2002, Wojtek Zlobicki wrote:
  
   Where are providers drawing the line ?  Anyone have somewhat detailed
   published policies as to what a provider can do in order to protect their
   nework as a whole.
   At what point (strength of the attack) does a customers netblock (assuming a
   /24 for
   example) get null routed by whichever party.
 
  Most providers likely have a policy similar to: I can't sacrafice 1
  my network for 1 customer. So, if the attack is sufficient to degrade
  service on the ISP network most likely the customer under attack will get
  null routed.

 Are you saying UUnet, assuming for a sec that I am a customer of UUnet (just
 for the sake of the argument), UU will not null route my ircd if it
 it gets attacked on regular basis, say *daily* ?

I did not say that.


 Furthermore you are going to consistently place filters on your routers,
 take them out within the 24h (or whatever then-current policy of UUnet is)
 and track attacks back to their sources within the boundaries of your
 backbone on a daily basis? ;)


uhm... sure, we do this now... or have you not been paying attention?

 Will you do that for say a regular T1 customer or do I need more commitment
 as sales droids like to put it, to even consider such a service ? ;)


read above.

  Hmm, perhaps FIRST customers should insist that their ISP have some 24/7
  security contact that can actually help in the case of an attack. Today
  there are very few that have this capability. I'd say from personal
  experience that the number is way too small, even in the 'large' ISP arena
  :(
 
  More pressure from customers for real security would be a good start.

 sigh, tried and failed, miserably I might add.


Then become a UUNET customer cause we already do this... Perhaps other
providers with 24/7 security teams will pipe up to give potential
customers a heads-up on options other than UUNET? If you go with UUNET
please tell the sales driod I sent you cause then I get 50 bucks :) (my
only raise thanks to bernie)




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Pete Kruckenberg


On Thu, 2 May 2002, Richard A Steenbergen wrote:

 SYN packet comes in, one of these machines responses with a
 RST to the source, which is actually the target of the
 
 You have an interesting situation. I think rate limiting
 outbound RSTs would be the least offensive thing you
 could do, off the top of my head.

What about just blocking out-going RSTs altogether from our
borders? While this interferes with proper TCP
functionality, would it actually interfere enough to cause
noticeable problems? Would certainly be less of a burden on
routers than rate-limiting.

Pete.




Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Christopher L. Morrow



On Wed, 1 May 2002, Pete Kruckenberg wrote:


 On Thu, 2 May 2002, Richard A Steenbergen wrote:

  SYN packet comes in, one of these machines responses with a
  RST to the source, which is actually the target of the
 
  You have an interesting situation. I think rate limiting
  outbound RSTs would be the least offensive thing you
  could do, off the top of my head.

 What about just blocking out-going RSTs altogether from our
 borders? While this interferes with proper TCP
 functionality, would it actually interfere enough to cause
 noticeable problems? Would certainly be less of a burden on
 routers than rate-limiting.

Aren't the initial packets in the 'gibson syn amp attack' syn-ack's?