Re: [j-nsp] SRTBH

2022-07-13 Thread harbor235 via juniper-nsp
thanks for the input Mike On Thu, Jul 7, 2022 at 10:20 AM Jeff Haas wrote: > In circumstances where the routing table can help you mitigate an attack, > including things that use uRPF, it'll usually scale significantly better > that flowspec. This is primarily because flowspec is just a

Re: [j-nsp] SRTBH

2022-07-07 Thread Jeff Haas via juniper-nsp
In circumstances where the routing table can help you mitigate an attack, including things that use uRPF, it'll usually scale significantly better that flowspec. This is primarily because flowspec is just a distributed way of programming the firewall, and firewalls on transit routers have many

Re: [j-nsp] SRTBH

2022-07-07 Thread Gert Doering via juniper-nsp
Hi, On Thu, Jul 07, 2022 at 08:41:56AM -0400, harbor235 via juniper-nsp wrote: > Since Flowspec arrived, are there any uses for SRTBH? Scaling? My understanding of flowspec is that it is typically implemented by programming ACL TCAM, while SRTBH is routing table lookup, so "some 10.000 lines"

[j-nsp] SRTBH

2022-07-07 Thread harbor235 via juniper-nsp
Since Flowspec arrived, are there any uses for SRTBH? Anyone using TrinityCyber, them use a different approach to IDS and is not strictly signature based but more TTPs? Write up appear to be good, curious if anyone is using their products? Mike ___