[nsp-sec] DDoS Chicken and Egg Problem

Barry Greene (bgreene) bgreene at cisco.com
Wed Mar 26 17:29:10 EDT 2008


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Cisco sets BGP traffic at Prec 6. At least we did. I think Juniper did
the same.  

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Johnson, Ron
> Sent: Wednesday, March 26, 2008 1:49 PM
> To: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] DDoS Chicken and Egg Problem
> 
> ----------- nsp-security Confidential --------
> 
>  
> It is a shame that there is no mechanism that I am aware of 
> to easily flag BGP traffic with an IP priority bit on direct peers. 
> The provider could then setup a QOS queuing policy to always 
> forward priority traffic first. 
> 
> It would be nice if Cisco/Juniper had a command like:
> 
> Router bgp 19029
> Bgp priority-bit dscp EF
> !
> 
> There may be a way to set QOS bits on the BGP traffic as it 
> passes through the interface between your AS and upstream 
> provider. The easiest I can imagine is to ensure your BGP 
> session is not via a direct interface to interface 
> connection, but configured eBGP-multihop and passes through a 
> router in the middle that could be matching and flagging BGP 
> traffic, so the routers with the direct connections would QOS 
> enforce based upon these flags.
> 
> This would allow BGP traffic flagged with EF to process 
> through the queue first, and avoid BGP session drop due to 
> keepalive failures.
> 
> 
> Ron Johnson
> New Edge Networks
> 
> 
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> David Freedman
> Sent: Wednesday, March 26, 2008 12:42 PM
> To: Jason Gardiner; nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] DDoS Chicken and Egg Problem
> 
> ----------- nsp-security Confidential --------
> 
> I see only three options really:
> 
> 1. Getting assured delivery of BGP packets during congestion 
> (no shaping for BGP) 2. Seperate out-of-band connection for 
> BGP blackhole (get them to run you a FastE connection for BGP 
> only) 3. Get another provider
> 
> 
> 
> ------------------------------------------------
> David Freedman
> Group Network Engineering
> Claranet Limited
> http://www.clara.net
> 
> 
> 
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net on behalf of Jason Gardiner
> Sent: Wed 3/26/2008 19:40
> To: Nsp-Security
> Subject: [nsp-sec] DDoS Chicken and Egg Problem
>  
> ----------- nsp-security Confidential --------
> 
> Hey,
> 
> So we have some GigE feeds with an InterNAP that are rate limited.  A 
> while back, we had a DoS attack that filled the pipe.  
> Unfortunately the
> 
> provider is doing simple rate limiting, so BGP was caught up in the 
> policing and the sessions dropped.
> 
> We are running remote triggered blackhole with the provider, but the 
> whole exercise raised a very interesting question.  How does one send 
> the BGP community trigger to the provider if the provider isn't doing 
> anything to assure that the BGP session remains stable during an 
> attack?  I suggested exempting BGP from policing to avoid the 
> catch-22, 
> but they didn't see value in doing so.
> 
> Any thoughts or recommendations would be appreciated.
> 
> -- 
> Thanks,
> 
> Jason Gardiner
> $company_name Engineering
> 
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security
> counter-measures.
> _______________________________________________
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security
> counter-measures.
> _______________________________________________
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBR+q6vb/UEA/xivvmEQLHtQCg47qKca6eCs5JRI45OR/vNwUd0eYAn1qQ
XlVPI0kH6gL5eAtlObp1Oigz
=06GN
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list