[nsp-sec] Revisiting the DDOS Route Server project

SURFcert - Peter p.g.m.peters at utwente.nl
Thu Aug 13 03:47:00 EDT 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Scott A. McIntyre wrote on 13-8-2009 8:15:

>>> The botherder doesn't care for the bots to check-in.  He knows they
>>> are out there, some listening, some not, and waiting for his wake-up
>>> call.  One simple UDP packet and he instructs them all to attack.
>>
>> Are you thinking that they might send that single UDP packet to every
>> IPv4 address to compensate for not doing checkins?
> 
> I think that Hank's point is that the way most of us have the DDoS-RS
> peerings set up we only null-route traffic sent *to* addresses
> advertised.  I'm not sure how many have tried to make the right
> router-fu that would actually reject packets *from* entries based on
> some routing policy statements/maps/whatever.  I've never looked into
> that, but certainly we only use it as a list of addresses to dump as a
> destination.

We (at University Twente and a number of other universities) are using
source-based routing to redirect infected systems in our network to a
website explaining them what they have been up to. I have to check in
but I believe we block or redirect external IP addresses the same way
too. So no matter what protocol they use they will be trapped.

- --
Peter Peters
SURFcert Officer off Duty
cert at surfnet.nl                            http://cert.surfnet.nl/
office-hours: +31 302 305 305    emergency (24/7): +31 622 923 564
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iD8DBQFKg8TzelLo80lrIdIRAqbLAJ0RRtsaGeEQCpZ7CzOOIfbv+qDUJQCfe60g
Wu2dwGWiVCUg3xOwo8raWuo=
=5Ypc
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list