[nsp] BGP sessions drop during DOS and general DOS protections.
joshua sahala
joshua.ej.smith at usa.net
Tue Jul 22 09:07:24 EDT 2003
On Tuesday 22 July 2003 04:43, Glen Turner wrote:
> You can also use QoS to at least ensure your Hellos hit
> the wire ahead of outgoing DoS traffic. You should hassle
> your ISP to do the same (as hopefully the DoS is incoming).
just be mindful that your router has the horsepower to do the policing
when under attack - i have a 7513 that croaked under the load of an
attack (actually it was the vip that croaked first - but prior to,
the vip4-80 was averaging 40-60% utilization, so i was asking for
it...i am now running a vip6-80 and my cpu load on the vip has
dropped to about 15-20%).
but then i probably wouldn't suggest my company's architectural or qos
models, so you can take this with a grain of salt.
[cut]
> If you nail this, then your BGP should then only do odd
> things if all the user-space CPU on your router is starved
> (eg: lots of packets taking a slow processor path, perhaps
> the DoSer knows this and crafts the packet accordingly, or
> perhaps a buffer allocation is needed as the output link
> is slower than the ingress link, or perhaps your router
> isn't sized for full load).
i think that that is their goal ;)
going back to rob's post, the secure[ios|bgp] templates are full of
good suggestions...and i will personally attest (as will many others)
that they work. most of the attacks aimed at me (or my downstreams)
were garden variety syn and icmp attacks - spoofed, distributed
sources, mostly small packets, high pps, etc. rate-limiting syn and
icmp traffic seems to have helped, and although 'controversial',
bogon filtering has probably saved me more than i know.
my thanks to rob and team cymru :-)
/joshua
--
What difference does it make to the dead, the orphans, and the
homeless, whether the mad destruction is brought under the name of
totalitarianism or the holy name of liberty and democracy?
- Gandhi -
More information about the cisco-nsp
mailing list