[j-nsp] Dynamic blocklists/blacklists...?
Chris Morrow
morrowc at ops-netman.net
Tue Aug 16 21:14:51 EDT 2005
On Tue, 16 Aug 2005, Jeff Aitken wrote:
> On Tue, Aug 16, 2005 at 07:30:10PM +0000, Chris Morrow wrote:
>> 1) setup dsc0 interface with /30 address
>> 2) setup dsc0 interface with output acl content:
>> filter drop-all-count {
>> term deny-count {
>> then count deny-dsc0 discard;
>> }
>> }
>> 3) reset nexthop or set nexthop in quagga/bgpd to /30 far-end
>
> Unless I'm missing something, this only works for dst-ip based
> filtering. If you have a list of bad src-ips (e.g., from
> IDS/Arbor/whatever) and want to throw away traffic from them, you
> need something else due to the aforementioned difference in how
> Cisco & Juniper implement the uRPF check.
>
oh yea... hrm, silly me. I was trying to avoid a dynamic update to the
config for you :( oh well.
>
>> be happy, don't do 'dynamic' filters....
>
> Agreed; my preference would be for Juniper to mimic the Cisco behavior
> (i.e., it should be possible to configure the box such that the uRPF
> check FAILS if the route to the src-ip of an incoming packet recurses
> to null0) but as I recall they said that this was hard/impossible.
>
I'm not clear as to why it would be 'impossible' for them to do it, but
I'm just a chemical engineer :)
> However, as Pedro notes, the distributed flow-spec approach gives
> you more granularity such as the ability to filter based on src-ip,
> proto, port, etc. It probably won't be long before your favorite
> IDS/DDoS detection software will give you the option of injecting
> filters this way... which is scary. :-)
>
for that I'd look at TIDP... which is a 'competitor' (alternative?) to
flow-spec... TIDP is supposed to give you a daemon-like functionality on
any end system that could ask for 'help' from the upstream networking
devices. Oh well, like many things in the networking world, there are more
than 1 ways to skin the cat.
More information about the juniper-nsp
mailing list