Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Matthew Moyle-Croft
If you're trying to do it on a /32 basis, I doubt you'd find too many border router operators interested in accepting a route that small, but I may be wrong. I can think of at least one Global Tier One that offers a service that allows one to do exactly this (ie. advertise a /30 or /32 to

Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Christopher Morrow
On Feb 3, 2008 5:18 PM, Ben Butler <[EMAIL PROTECTED]> wrote: > > Hi, > > > "your point here is that perhaps instead of this scheme one would just > advertise the max-prefix-length (/24 currently) from a 'better' place on > your network and suck all the 'bad' traffic (all traffic in point of > fa

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
Of Christopher Morrow Sent: 03 February 2008 20:56 To: Tomas L. Byrnes Cc: nanog@merit.edu Subject: Re: Blackholes and IXs and Completing the Attack. On Feb 3, 2008 2:53 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote: > 3: Backbone routers can't reasonably filter on a bunch of /32s

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
: nanog@merit.edu Subject: RE: Blackholes and IXs and Completing the Attack. -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > anyway, the idea behind multi-as blackholing has been (and apparently > continues to get) rehashed a few times over the last 5-8 years... good > luck! It seems

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Barry Greene (bgreene)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > anyway, the idea behind multi-as blackholing has been (and > apparently continues to get) rehashed a few times over the > last 5-8 years... good luck! It seems that way. People seem to forget about the conversations and work around 2000 - 20

Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Christopher Morrow
On Feb 3, 2008 2:53 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote: > 3: Backbone routers can't reasonably filter on a bunch of /32s and also > forward traffic at wire speed. yes they can. the size of the individual route doesn't matter to the devices in question, the NUMBER of routes does... (as

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Tomas L. Byrnes
rnet God", and in general, is likely to be more > effective in the real world. > > That whole "rough consensus and running code" ethos of the > IETF thing, as opposed to the "Cathedral" mentality of the > ITU (and ICANNt), which your approach would imply. &

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
Original Message- From: Tomas L. Byrnes [mailto:[EMAIL PROTECTED] Sent: 03 February 2008 07:54 To: Ben Butler; nanog@merit.edu Subject: RE: Blackholes and IXs and Completing the Attack. "Well then they wouldn't be peering with this route reflector " Well then, the utility is

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
From: Rick Astley [mailto:[EMAIL PROTECTED] Sent: 03 February 2008 06:56 To: Ben Butler Cc: nanog@merit.edu Subject: Re: Blackholes and IXs and Completing the Attack. I see your point, but I think maintaining the box for the control session would also require a decent amount of work. Presumably,

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Alex Pilosov
On Sat, 2 Feb 2008, Tomas L. Byrnes wrote: > I sincerely doubt that any backbone provider will filter at a /32. That > means they have to check EVERY PACKET AT FULL IP DEST against your AS > advertised routes. Since most backbone routers build circuits at the /18 > and above mask on MPLS, just to

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
al Message- > From: Ben Butler [mailto:[EMAIL PROTECTED] > Sent: Saturday, February 02, 2008 2:42 PM > To: Tomas L. Byrnes; nanog@merit.edu > Subject: RE: Blackholes and IXs and Completing the Attack. > > "If you're trying to do it on a /32 basis, I doubt you&

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
I see your point, but I think maintaining the box for the control session would also require a decent amount of work. Presumably, since you must all adhere to some quasi-standard to communicate with the control peer, you could probably also agree on creating a standard BGP community (ie. 64666:666

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow
some patents, and reviewed a bunch more. > > > > > -Original Message- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Christopher Morrow > > Sent: Saturday, February 02, 2008 12:58 PM > > To: Tomas L. Byrnes > > Cc: Ben Butler; Paul

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
nog@merit.edu > Subject: Re: Blackholes and IXs and Completing the Attack. > > On Feb 2, 2008 3:39 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote: > > > The bigger issue with all these approaches is that they run > afoul of a > > patent applied for by AT&T:

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Roland Dobbins <[EMAIL PROTECTED]> wrote: >On Feb 3, 2008, at 4:50 AM, Paul Ferguson wrote: > >> We (Trend Micro) do something similar to this -- a black-hole BGP >> feed of known botnet C&Cs, such that the C&C channel is effectively >> black-ho

FW: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
it. Kind Regards Ben From: Rick Astley [mailto:[EMAIL PROTECTED] Sent: 03 February 2008 01:02 To: Ben Butler Cc: nanog@merit.edu Subject: Re: Blackholes and IXs and Completing the Attack. While I am not sure I fully understand your suggestion, I don't

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Roland Dobbins
On Feb 3, 2008, at 4:50 AM, Paul Ferguson wrote: We (Trend Micro) do something similar to this -- a black-hole BGP feed of known botnet C&Cs, such that the C&C channel is effectively black-holed. What's the trigger (pardon the pun, heh) and process for removing IPs from the blackhole list

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
While I am not sure I fully understand your suggestion, I don't think it would be that hard to set up manually. Sure it would require asking the individual peers for their black hole communities, but of they don't have one they are unlikely to honor the infrastructure you describe anyway. Assume

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
--- From: Tomas L. Byrnes [mailto:[EMAIL PROTECTED] Sent: 02 February 2008 20:39 To: Ben Butler; Paul Vixie; nanog@merit.edu Subject: RE: Blackholes and IXs and Completing the Attack. You could achieve the exact same result simply by not advertising the network to your peers, or by advertising a bogus

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
ject: Re: Blackholes and IXs and Completing the Attack. > I was not proposing he Null routing of the attack source in the other > ISPs network but the destination in my network being Null routed as a > destination from your network out. i explained why this is bad -- it lowers the att

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
D] Sent: 02 February 2008 20:49 To: Ben Butler Cc: NANOG NANOG Subject: Re: Blackholes and IXs and Completing the Attack. On Feb 2, 2008, at 1:16 PM, Ben Butler wrote: > > So, given we all now understand each other - why is no one doing the > above? Some folks are doing this, just n

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- "Ben Butler" <[EMAIL PROTECTED]> wrote: >The effect of this would be that any BotNet controlled hosts in the >other member network would now be able to drop any attack traffic in >their network on destination at their customer aggregation router

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie
> I was not proposing he Null routing of the attack source in the other > ISPs network but the destination in my network being Null routed as a > destination from your network out. i explained why this is bad -- it lowers the attacker's costs in what amounts to an economics war. they can get a w

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow
On Feb 2, 2008 3:39 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote: > The bigger issue with all these approaches is that they run afoul of a > patent applied for by AT&T: > > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u > =%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Danny McPherson
On Feb 2, 2008, at 1:16 PM, Ben Butler wrote: So, given we all now understand each other - why is no one doing the above? Some folks are doing this, just not via some third-party route servers. For example, either via customer peering sessions, or other BGP interconnections between peers.

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
p;co1=AND&d=PG01&s1=200 60031575&OS=20060031575&RS=20060031575 USPTO App Number 20060031575 > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Ben Butler > Sent: Saturday, February 02, 2008 12:17 PM > To: Paul Vixi

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
to block the traffic before it traverses the IX and further back in their own networks. So? Ben -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul Vixie Sent: 02 February 2008 17:32 To: nanog@merit.edu Subject: Re: Blackholes and IXs and Completi

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie
[EMAIL PROTECTED] ("Ben Butler") writes: > ... > This hopefully will ensure a relatively protected router that is only > accessible from the edge routers we want and also secured to only accept > filtered announcements for black holing and in consequence enable the > system to be trusted similar

Blackholes and IXs and Completing the Attack.

2008-01-30 Thread Ben Butler
Hi, I have been working away on remote trigger blackholing and community based client initiated blackholing into transit ASes. It got me thinking that while this works great with a handful of upstream transit peers it does not really scale very well at an Internet Exchange with a high overhead c