Re: Blackhole Routes

2004-09-30 Thread Suresh Ramasubramanian
Abhishek Verma wrote: There are ways to add static routes that can be blackholed. I can understand the utility of such routes if those are installed in my forwarding table. What bewilders me is why would anyone want to advertise "blackhole" routes using say, BGP? Is it only to prevent some sort of

Re: Blackhole Routes

2004-09-30 Thread Stephen J. Wilcox
There are several sources of eBGP feeds for blackholing, they can be very useful depending on what your requirements are. You can get feeds for spam, ddos bots, bogon routes etc For iBGP this can be useful too, if you are being DDoS'd you can inject an iBGP route and have all your routers inst

Re: Blackhole Routes

2004-09-30 Thread Michael . Dillon
> There are ways to add static routes that can be blackholed. I can > understand the utility of such routes if those are installed in my > forwarding table. What bewilders me is why would anyone want to > advertise "blackhole" routes using say, BGP? Have you read the presentation from the Feb. NA

Re: 10GE access switch router

2004-09-30 Thread Scott McGrath
Extreme makes such a device but it is not truly wirespeed i.e. it goes wirespeed on ports associated with a particular ASIC but the ASIC to ASIC links apparently cannot forward a full ASIC to another full ASIC without dropping frames. But that may be an academic concern and is unlikely to happen

Re: Blackhole Routes

2004-09-30 Thread Robert A. Hayden
We use Blackholing extensively to protect our campus network from "bad" machines. I did a writeup (replete my own personal brand of braindead typos) a while back that details out how we set it up using OSPF and uRPF. http://www.merit.edu/mail.archives/nanog/2003-11/msg00225.html There are mec

RE: Blackhole Routes

2004-09-30 Thread Barry Raveendran Greene
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 == NEW Materials = Powersession on Core Security (4-6 May 2004) http://www.ciscoeventreg.net/go/networkers/agenda9.lasso CPN Summit SP Security Materials (April 2004) ftp://ftp-eng.cisco

Re: Blackhole Routes

2004-09-30 Thread Erik Haagsman
On Thu, 2004-09-30 at 15:45, Robert A. Hayden wrote: > There are mechanisms to do it using eBGP and communities as well which I'm > sure most on this list are more familiar with. > > Think of blackholing as a way to surgically remove a specific IP from your > network, without having to deal wit

RE: Blackhole Routes

2004-09-30 Thread Eric Germann
We use a variation of this for several things. At the risk of getting in to political policy discussions ... We have a PERL script which looks for the wildcard .com record. If it finds it (the old Verisign SiteFinder), it injects a blackhole route to kill it. Also, we periodically pull in (ever

Re: Blackhole Routes

2004-09-30 Thread Deepak Jain
It sounds like you are confusing ideas here... If BGP is making a forwarding table entry, that's it. Ports are not really considered in forwarding decisions -- or if they are, the box is usually called a Firewall, not a router. It would be pretty trivial to take the information you are generati

Re: Blackhole Routes

2004-09-30 Thread Christopher L. Morrow
On Thu, 30 Sep 2004, Deepak Jain wrote: > > > It sounds like you are confusing ideas here... > > If BGP is making a forwarding table entry, that's it. Ports are not > really considered in forwarding decisions -- or if they are, the box is > usually called a Firewall, not a router. > Just thinki

Re: Blackhole Routes

2004-09-30 Thread Wayne E. Bouchard
On Thu, Sep 30, 2004 at 04:40:54PM +0200, Erik Haagsman wrote: > > On Thu, 2004-09-30 at 15:45, Robert A. Hayden wrote: > > There are mechanisms to do it using eBGP and communities as well which I'm > > sure most on this list are more familiar with. > > > > Think of blackholing as a way to surg

Re: Blackhole Routes

2004-09-30 Thread Deepak Jain
It goes a little further than that these days. Folks are openly allowing customers to advertize routes with something lika a 666 community which will then be blackholed within their network. So if you're a service provider with your own blackhole system, you can easily tie it into your upstream's

Re: Blackhole Routes

2004-09-30 Thread Wayne E. Bouchard
On Thu, Sep 30, 2004 at 02:15:49PM -0400, Deepak Jain wrote: > >It goes a little further than that these days. Folks are openly > >allowing customers to advertize routes with something lika a 666 > >community which will then be blackholed within their network. So if > >you're a service provider wi

Re: Blackhole Routes

2004-09-30 Thread Jeff Aitken
On Thu, Sep 30, 2004 at 02:15:49PM -0400, Deepak Jain wrote: > provider mistakenly advertises more routes than he should [lets say > specifics in case #1] you can flood your upstreams' routers with > specifics and potentially cause flapping or memory overflows... > > In case #2, presumably the

Re: Blackhole Routes

2004-09-30 Thread Will Yardley
On Thu, Sep 30, 2004 at 02:15:49PM -0400, Deepak Jain wrote: > > It goes a little further than that these days. Folks are openly > > allowing customers to advertize routes with something lika a 666 > > community which will then be blackholed within their network. So if > > you're a service provi

Re: Blackhole Routes

2004-09-30 Thread Stephen J. Wilcox
we can handle most DoS's ourselves, this is the case with a lot/most? upstreams, we dont automatically forward blackholes upstream the only time anyone would need to do that is if a particular upstream's connection was saturated with the DoS. i'd agree automatically propogating these isnt good

Re: Blackhole Routes

2004-09-30 Thread Pete Templin
Deepak Jain wrote: If providers start tying their customer's blackhole announcements to the provider's upstreams' blackhole announcements in an AUTOMATIC process, bad things are likely to happen. What happens when a customer of a provider mistakenly advertises more routes than he should [lets s

Re: Blackhole Routes

2004-09-30 Thread Richard A Steenbergen
On Thu, Sep 30, 2004 at 11:43:42AM -0700, Wayne E. Bouchard wrote: > > Yes, well, in my case, I go through a dedicated server with multi-hop > sessions and set a prefix limit of 25 or so so I don't get bombarded > with 5 billion /32 routes and don't send those routes upstream. (I try > to play ni

Re: Blackhole Routes

2004-09-30 Thread Richard A Steenbergen
On Thu, Sep 30, 2004 at 08:03:05PM +0100, Stephen J. Wilcox wrote: > > we can handle most DoS's ourselves, this is the case with a lot/most? upstreams, > we dont automatically forward blackholes upstream > > the only time anyone would need to do that is if a particular upstream's > connection

ddos attack advice

2004-09-30 Thread adrian kok
Dear all I have ddos attack to our ip A.B.C.D yesterday. Someone suggest me to post it here and I might get advice from this newsgroup 1/ What's good methodology in blocking certain IP address? ACL or strictly filtering list, Which one is better? or some other effective ways also? 2/ We could

Re: Blackhole Routes

2004-09-30 Thread Christopher L. Morrow
On Thu, 30 Sep 2004, Jeff Aitken wrote: > > On Thu, Sep 30, 2004 at 02:15:49PM -0400, Deepak Jain wrote: > > provider mistakenly advertises more routes than he should [lets say > > specifics in case #1] you can flood your upstreams' routers with > > specifics and potentially cause flapping or mem

Re: Blackhole Routes

2004-09-30 Thread Petri Helenius
Eric Germann wrote: What I would to see (and have never researched in depth) is a way to apply the blackhole routes on a community to port basis (i.e. we set up a specific BGP community to filter mail, and that community goes to a route map that kills only port 25, another community applies to a ma

Re: Blackhole Routes

2004-09-30 Thread Mark Kasten
Richard A Steenbergen wrote: That said, it is still absolutely silly that we can't standardize on a globally accepted blackhole community. A provider with many transit upstreams who wishes to pass on blackhole routes for their customers could quickly find themselves with some very messy configs

Re: Blackhole Routes

2004-09-30 Thread Richard A Steenbergen
On Thu, Sep 30, 2004 at 04:47:30PM -0400, Mark Kasten wrote: > Richard A Steenbergen wrote: > > >That said, it is still absolutely silly that we can't standardize on a > >globally accepted blackhole community. A provider with many transit > >upstreams who wishes to pass on blackhole routes for

Re: Blackhole Routes

2004-09-30 Thread Stephen J. Wilcox
On Thu, 30 Sep 2004, Richard A Steenbergen wrote: > I'd have to disagree with you. While you and many other networks may be > able to handle most DoS attacks without involving your upstreams, there > are still plenty (the majority I would say) of networks who can't. In > fact, the entire CONCE

Re: Blackhole Routes

2004-09-30 Thread Randy Bush
>> If every BGP session in your network is protected by a max-prefix >> limit, no matter who leaks, the damage will be limited and contained. > true, also not univeral, the problem with max-prefix is it does not say *which* prefixes. so even if the drop-bgp stoopidity is corrected, you could end

Re: Blackhole Routes

2004-09-30 Thread Christopher L. Morrow
On Thu, 30 Sep 2004, Randy Bush wrote: > >> If every BGP session in your network is protected by a max-prefix > >> limit, no matter who leaks, the damage will be limited and contained. > > true, also not univeral, > > the problem with max-prefix is it does not say *which* prefixes. > so even if

Re: Blackhole Routes

2004-09-30 Thread Randy Bush
If every BGP session in your network is protected by a max-prefix limit, no matter who leaks, the damage will be limited and contained. >>> true, also not univeral, >> the problem with max-prefix is it does not say *which* prefixes. >> so even if the drop-bgp stoopidity is corrected