RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Alex Pilosov
On Sat, 2 Feb 2008, Tomas L. Byrnes wrote: I sincerely doubt that any backbone provider will filter at a /32. That means they have to check EVERY PACKET AT FULL IP DEST against your AS advertised routes. Since most backbone routers build circuits at the /18 and above mask on MPLS, just to

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
yes absolutely, if an agreement could be reached - then that is a neater solution, but I wonder if an agreement could ever be reached in a timescale that doesn't make deployment of the alternative more attractive as it doesn't require everyone to agree. From:

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
Hi, I am no lawyer, but I question whether ATT can patent anything that uses the existing technology and commands implemented in BGP. The idea that you can patent a persons intent in advertising a prefix in BGP seems somewhat bizarre. Surely a patent relates to the use of a new bit of

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Tomas L. Byrnes
IANAL, but my understanding of patents is that anyone can patent any innovative combination of existing things, if it produces a new effect or is used in a new way. According to the patent lawyers I've worked with, that is, in fact, the most common type of patent. As an example, Watt's steam

Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Christopher Morrow
On Feb 3, 2008 2:53 PM, Tomas L. Byrnes [EMAIL PROTECTED] wrote: 3: Backbone routers can't reasonably filter on a bunch of /32s and also forward traffic at wire speed. yes they can. the size of the individual route doesn't matter to the devices in question, the NUMBER of routes does... (as

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Barry Greene (bgreene)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 anyway, the idea behind multi-as blackholing has been (and apparently continues to get) rehashed a few times over the last 5-8 years... good luck! It seems that way. People seem to forget about the conversations and work around 2000 -

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
Hi Barry, Thank you for some really useful pointers, I am off to do some more reading. Kind Regards Ben -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Greene (bgreene) Sent: 03 February 2008 21:07 To: Christopher Morrow; Tomas L. Byrnes Cc:

RE: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Ben Butler
Hi, snip your point here is that perhaps instead of this scheme one would just advertise the max-prefix-length (/24 currently) from a 'better' place on your network and suck all the 'bad' traffic (all traffic in point of fact) for the attacked destination via a transit/peer/place which can deal

Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Christopher Morrow
On Feb 3, 2008 5:18 PM, Ben Butler [EMAIL PROTECTED] wrote: Hi, snip your point here is that perhaps instead of this scheme one would just advertise the max-prefix-length (/24 currently) from a 'better' place on your network and suck all the 'bad' traffic (all traffic in point of fact)

Re: Blackholes and IXs and Completing the Attack.

2008-02-03 Thread Matthew Moyle-Croft
If you're trying to do it on a /32 basis, I doubt you'd find too many border router operators interested in accepting a route that small, but I may be wrong. I can think of at least one Global Tier One that offers a service that allows one to do exactly this (ie. advertise a /30 or /32

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie
[EMAIL PROTECTED] (Ben Butler) writes: ... This hopefully will ensure a relatively protected router that is only accessible from the edge routers we want and also secured to only accept filtered announcements for black holing and in consequence enable the system to be trusted similar to

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
Hi, I was not proposing he Null routing of the attack source in the other ISPs network but the destination in my network being Null routed as a destination from your network out. This has no danger to the other network as it is my network that is going to be my IP space that is blackholed in

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
You could achieve the exact same result simply by not advertising the network to your peers, or by advertising a bogus route (prefixing a known bogon AS for the addresses you want null-routed). I realize you would have to subnet/deaggregate your netblocks, and therefore could wind up with a

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Danny McPherson
On Feb 2, 2008, at 1:16 PM, Ben Butler wrote: So, given we all now understand each other - why is no one doing the above? Some folks are doing this, just not via some third-party route servers. For example, either via customer peering sessions, or other BGP interconnections between peers.

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow
On Feb 2, 2008 3:39 PM, Tomas L. Byrnes [EMAIL PROTECTED] wrote: The bigger issue with all these approaches is that they run afoul of a patent applied for by ATT: http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2Sect2=HITOFFp=1u

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie
I was not proposing he Null routing of the attack source in the other ISPs network but the destination in my network being Null routed as a destination from your network out. i explained why this is bad -- it lowers the attacker's costs in what amounts to an economics war. they can get a web

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
destination-based blackhole routing for mitigation *effectively completes the attack*, which is often times undesirable. Inter-domain source-based blackhole routing is pretty much a non-option. That is why I put Completing the Attack in my subject line - and didnt attempt to sujest this as an

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
Hi, i explained why this is bad -- it lowers the attacker's costs in what amounts to an economics war. they can get a web site taken down by its own provider just by attacking it. they need fewer resources for their attack once they know the provider's going to blackhole the victim. I

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler
If you're trying to do it on a /32 basis, I doubt you'd find too many border router operators interested in accepting a route that small, but I may be wrong. Well then they wouldn't be peering with this route reflector in the first place. -Original Message- From: Tomas L. Byrnes

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
While I am not sure I fully understand your suggestion, I don't think it would be that hard to set up manually. Sure it would require asking the individual peers for their black hole communities, but of they don't have one they are unlikely to honor the infrastructure you describe anyway. Assume

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Roland Dobbins
On Feb 3, 2008, at 4:50 AM, Paul Ferguson wrote: We (Trend Micro) do something similar to this -- a black-hole BGP feed of known botnet CCs, such that the CC channel is effectively black-holed. What's the trigger (pardon the pun, heh) and process for removing IPs from the blackhole list

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
ATT has no reason to pull their application, what needs to happen is that the publisher of the prior art contact the USPTO. If ATT willingly failed to note the prior art in their app, that may be a problem, but it isn't their duty to report ALL prior art, just the stuff they know about. IANAL,

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow
On Feb 2, 2008 11:40 PM, Tomas L. Byrnes [EMAIL PROTECTED] wrote: ATT has no reason to pull their application, what needs to happen is that the publisher of the prior art contact the USPTO. If ATT willingly failed to note the prior art in their app, that may be a problem, but it isn't their

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
I see your point, but I think maintaining the box for the control session would also require a decent amount of work. Presumably, since you must all adhere to some quasi-standard to communicate with the control peer, you could probably also agree on creating a standard BGP community (ie. 64666:666

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes
Well then they wouldn't be peering with this route reflector Well then, the utility is probably close to 0, isn't it? I doubt most of the sources of DDOS traffic, especially those without ingress source filtering, are going to peer with your route reflector. What's their economic incentive to