Re: UDP DoS mitigation?

2008-12-14 Thread Florian Weimer
* Rick Ernst:

 We've had an increasing rate of DoS attacks that spew tens-of-thousands of
 small UDP packets to a destination on our network.  We are getting roughly
 2x our entire normal pps across all providers through one interface, or
 about 4x normal through the individual interface.  The Cisco
 7206VXR/NPE-G1 CPU melts (95% load vs 15% average, 20% normal peak) when
 this hits.

 I'm using CEF and ip-route-cache flow on the outside interface.

Is the UDP stream a single flow, or does it consist of lots of
different flows?



RE: UDP DoS mitigation?

2008-12-13 Thread Ian Henderson
Rick Ernst wrote on 2008-12-13:

 - This instance was a DoS, not DDoS.  Single source and destination,
 but
   the source (assuming no spoofing) was in Italy.  Turning off netflow
   seemed to help, but the attack itself stopped at about the same time.

Before moving to hardware based platforms, we used a lot of G1s on sticks. One 
of the advantages of this is the ability to filter DOS traffic on the switch in 
front of the router - anything 2950 or higher (with L3 snooping capabilities) 
can do this with an access list.

Router1 Gi0/1 - Gi0/1 Switch1 Gi0/2 - Upstream

On Switch1 configure something like:

access-list 100 deny ip host x.x.x.x
access-list 100 permit ip any any

interface GigabitEthernet0/2
 ip access-group 100 in

So if your topology allows for it, this is a great short term fix. Note that 
this means you lose high speed convergence due to immediate link state 
notifications, and should use aggressive timers to compensate.


--
Ian Henderson, CCIE #14721
Senior Network Engineer, iiNet Limited




Re: UDP DoS mitigation?

2008-12-12 Thread Roland Dobbins


On Dec 13, 2008, at 2:15 AM, Rick Ernst wrote:

- Are there any platforms that deal with high PPS/small packet more  
gracefully?


S/RTBH can deal with any type of packet-flooding DDoS at layer-3, up  
to the capacity of the platform in question.  It sounds as if a) you  
should investigate getting DDoS mitigation assistance from your  
upstreams and/or b) moving from your currently software-based platform  
to a hardware-based platform at your edge to provide increased  
performance (this holds true irrespective of which vendor you select  
for your edge platform).


If you move to a hardware-based edge platform, be sure to first  
investigate all the particulars of its uRPF implementation so as to  
ensure that you can use it for S/RTBH, and if at all possible, test it  
before buying.


---
Roland Dobbins rdobb...@cisco.com // +852.9133.2844 mobile

 History is a great teacher, but it also lies with impunity.

   -- John Robb




RE: UDP DoS mitigation?

2008-12-12 Thread David Kotlerewsky
Couple of things come to mind:

1. Take a packet capture to see some UDP traffic characteristics, based
on which traffic rate-limiting may be configured by your upstream
providers, so that this traffic doesn't saturate your pipes, and maybe
the ISP can even drop it. That is if they're willing to help you.

2. As far as hardware is concerned, we're in the same boat as far as
various UDP/ICMP floods, and our Juniper M10i's handle it with no issues
(running multiple BGP sessions, OSPF, firewall sets/access lists).

Sincerely,
 
 
David Kotlerewsky,
Sr. Network Engineer
-
OVERSEE.NET
515 S. Flower Street, Suite 4400
Los Angeles, CA 90071
ph 213.408.0080 x1458
cell 310.350.0399
www.oversee.net
dkotlerew...@oversee.net
 
Confidentiality Warning: this email contains information intended for
the use of the individual or entity named above. If the reader of this
e-mail is not the intended recipient or the employee or agent
responsible for delivering it to the intended recipient, any
dissemination, publication or copying of this e-mail is prohibited. The
sender does not accept any responsibility for any loss, disruption or
damage to your data or computer system that may occur while using data
contained in it, or transmitted with this e-mail. If you have received
this e-mail in error, please immediately notify us by return e-mail.
Thank you.

-Original Message-
From: Rick Ernst [mailto:er...@easystreet.com] 
Sent: Friday, December 12, 2008 10:15 AM
To: nanog@nanog.org
Subject: UDP DoS mitigation?


We've had an increasing rate of DoS attacks that spew tens-of-thousands
of
small UDP packets to a destination on our network.  We are getting
roughly
2x our entire normal pps across all providers through one interface, or
about 4x normal through the individual interface.  The Cisco
7206VXR/NPE-G1 CPU melts (95% load vs 15% average, 20% normal peak)
when
this hits.

I'm using CEF and ip-route-cache flow on the outside interface.  Unicast
RPF is also enabled on the interface.  Unicast RPF in conjunction with a
BGP black-hole generator handles TCP attacks fairly well.

Two questions:
- Are there any knobs I should be turning in the Cisco config to help
with
mitigate this?
- Are there any platforms that deal with high PPS/small packet more
gracefully?

We are looking at a network refresh and aren't locked into Cisco as a
vendor (although our current IP network consists entirely of Cisco
gear). 
Our current aggregate (all providers, in- plus out-bound) bandwidth is
~500Mbs, but projected growth is 1Gbs within the year.

Thanks,
Rick





Re: UDP DoS mitigation?

2008-12-12 Thread Roland Dobbins


On Dec 13, 2008, at 2:27 AM, David Kotlerewsky wrote:


2. As far as hardware is concerned, we're in the same boat as far as
various UDP/ICMP floods, and our Juniper M10i's handle it with no  
issues

(running multiple BGP sessions, OSPF, firewall sets/access lists).


Right - a hardware-based platform is required to deal with high pps  
rates (the Cisco equivalent is the ASR1000; I'm not familiar with  
boxes from other vendors, but I'm pretty sure there are others in this  
same class).


---
Roland Dobbins rdobb...@cisco.com // +852.9133.2844 mobile

 History is a great teacher, but it also lies with impunity.

   -- John Robb




RE: UDP DoS mitigation?

2008-12-12 Thread Matthew Huff
Although the problem we had wasn't DoS, but rather high packet rates for market 
data, we saw a huge improvement by moving from a 7204VRX to a 7600 platform. 
Going from a software switched environment to a hardware one help deal with 
large number of packet drops during peaks of burst activity.

We looked at the ASR1000, but found the price too high. Although cisco doesn't 
promote it, the 7604 with the Sup32 engine (WS-SUP32-GE-3B) with 8 x GE 
interfaces is a very cost effective hardware router.

-Original Message-
From: Rick Ernst [mailto:er...@easystreet.com] 
Sent: Friday, December 12, 2008 1:15 PM
To: nanog@nanog.org
Subject: UDP DoS mitigation?


We've had an increasing rate of DoS attacks that spew tens-of-thousands of
small UDP packets to a destination on our network.  We are getting roughly
2x our entire normal pps across all providers through one interface, or
about 4x normal through the individual interface.  The Cisco
7206VXR/NPE-G1 CPU melts (95% load vs 15% average, 20% normal peak) when
this hits.

I'm using CEF and ip-route-cache flow on the outside interface.  Unicast
RPF is also enabled on the interface.  Unicast RPF in conjunction with a
BGP black-hole generator handles TCP attacks fairly well.

Two questions:
- Are there any knobs I should be turning in the Cisco config to help with
mitigate this?
- Are there any platforms that deal with high PPS/small packet more
gracefully?

We are looking at a network refresh and aren't locked into Cisco as a
vendor (although our current IP network consists entirely of Cisco gear). 
Our current aggregate (all providers, in- plus out-bound) bandwidth is
~500Mbs, but projected growth is 1Gbs within the year.

Thanks,
Rick





Re: UDP DoS mitigation?

2008-12-12 Thread Rick Ernst

Replying to my own since there are currently about a dozen responses.

- Hardware/ASIC routers are a consistent response.  We are currently
  evaluating Juniper for other reasons, but I'll add DoS mitigation to
  mix.
- Upstream involvement: We get transit from 701, 1239, etc.  I've had
  mixed results getting timely responses from our upstreams.  It's useful
  for long-term issues, but I need as much local and timely  control as I
  can get.
- I'm not having a problem with pipe bandwidth, but high pps.
- uRPF and RTBH helped internally, but anything passing through that
  upstream connection was impacted.
- This instance was a DoS, not DDoS.  Single source and destination, but
  the source (assuming no spoofing) was in Italy.  Turning off netflow
  seemed to help, but the attack itself stopped at about the same time.

Also, thanks for the offers of individual help in mitigation, although I'd
be concerned that Hey, can somebody block traffic {from} or {to}? would
be an interesting experiment in a socially-engineered DoS.

Finally, there were some suggestions S/RTBH.  RTBH I get, but my
Google-fu is weak on S/RTBH.  Details?


Thanks,
Rick

On Fri, December 12, 2008 10:15, Rick Ernst wrote:

 We've had an increasing rate of DoS attacks that spew tens-of-thousands of
 small UDP packets to a destination on our network.  We are getting roughly
 2x our entire normal pps across all providers through one interface, or
 about 4x normal through the individual interface.  The Cisco
 7206VXR/NPE-G1 CPU melts (95% load vs 15% average, 20% normal peak) when
 this hits.

 I'm using CEF and ip-route-cache flow on the outside interface.  Unicast
 RPF is also enabled on the interface.  Unicast RPF in conjunction with a
 BGP black-hole generator handles TCP attacks fairly well.

 Two questions:
 - Are there any knobs I should be turning in the Cisco config to help with
 mitigate this?
 - Are there any platforms that deal with high PPS/small packet more
 gracefully?

 We are looking at a network refresh and aren't locked into Cisco as a
 vendor (although our current IP network consists entirely of Cisco gear).
 Our current aggregate (all providers, in- plus out-bound) bandwidth is
 ~500Mbs, but projected growth is 1Gbs within the year.

 Thanks,
 Rick