[nsp-sec] DDoS Chicken and Egg Problem
Barry Greene (bgreene)
bgreene at cisco.com
Wed Mar 26 16:48:04 EDT 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
To me this is not a chicken and an egg problem. It is a problem with not
deploying Diffserv Phase 0 as a core security tool. Any packet coming
into your network needs to have the DSCP value reset to 0 unless there
is an explicit contract/service which requires it to be another value.
Control Plane traffic (i.e. in your case - BGP) is a explicit contract,
allowing for DCSP values of 48 (Routing protocols) and 56 (SSH).
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Jason Gardiner
> Sent: Wednesday, March 26, 2008 12:40 PM
> To: Nsp-Security
> Subject: [nsp-sec] DDoS Chicken and Egg Problem
>
> ----------- nsp-security Confidential --------
>
> Hey,
>
> So we have some GigE feeds with an InterNAP that are rate
> limited. A while back, we had a DoS attack that filled the
> pipe. Unfortunately the provider is doing simple rate
> limiting, so BGP was caught up in the policing and the
> sessions dropped.
>
> We are running remote triggered blackhole with the provider,
> but the whole exercise raised a very interesting question.
> How does one send the BGP community trigger to the provider
> if the provider isn't doing anything to assure that the BGP
> session remains stable during an attack? I suggested
> exempting BGP from policing to avoid the catch-22, but they
> didn't see value in doing so.
>
> Any thoughts or recommendations would be appreciated.
>
> --
> Thanks,
>
> Jason Gardiner
> $company_name Engineering
>
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security community. Confidentiality is essential for
> effective Internet security counter-measures.
> _______________________________________________
>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBR+q2hL/UEA/xivvmEQJyqQCg438BOfj/tzCKdSjmt93j33tCaDYAoOVU
lPvDEvwwNa+AMxUO3XVCcus6
=VS8n
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list