[nsp-sec] DDoS Chicken and Egg Problem

Mike Palladino mpalladino at internap.com
Thu Mar 27 10:27:50 EDT 2008


> There are atleast 2 InterNap folks on-list perhaps they can help 
> directly?

Yes; we've engaged the right internal folks to investigate a potential 
fix, and I'll follow-up with Jason directly off-list.

Thanks,
-Mike

--------------------------------------------------------------------------
Mike Palladino, CCDP, CCNP              Internap Network Operations Center
Manager, Network Operations Center
                                         NOC: 1.877.THE.INOC
Email: mpalladino at internap.com          Email: noc at internap.com

    *The contents of this email message are confidential and proprietary*
--------------------------------------------------------------------------

On Thu, 27 Mar 2008, Chris Morrow wrote:

> ----------- nsp-security Confidential --------
>
>
>
> On Wed, 26 Mar 2008, Sean Donelan wrote:
>
>> ----------- nsp-security Confidential --------
>>
>>> To continue the other part of the thread, it would be a joy to see some
>>> kind of standard on how to manage control plane traffic.  I've seen some
>>> really good/clever ideas, but nothing that really seems to be the de
>>> facto method.
>>
>> Fred Baker has been pushing this rock up hill in the IETF for several
>> years.  There are several drafts, and maybe even an RFC or two now.
>
> so.. I think that the actual problem is mostly solved, until you do
> something wierd like drop an interface rate-limit on the interface. I
> suspect that if your rate-limit were to be removed and you slammed 2G down
> the 1G link bgp would stay up just fine... regardless of C/J platform
> (cause both manage to stick bgp down even a highly utilized interface),
> provided of course the boxes at each end of the link can actually sustain
> the packet rates of the attack :)
>
> So... I think Jason, you got stuck on a bad config :( or a config with
> un-intended consequences. There are atleast 2 InterNap folks on-list
> perhaps they can help directly?
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>



More information about the nsp-security mailing list