[nsp-sec] CUTRS: Community Unwanted Traffic Removal Service

Hank Nussbacher hank at efes.iucc.ac.il
Tue May 20 10:47:50 EDT 2014


At 09:54 20/05/2014 -0400, Rabbi Rob Thomas wrote:

- Will Team Cymru publish a list of those ASNs that are participating 
(closed to the general public)?
- How secret is this?  How can we implement it with our NOC without letting 
them in on the details?

Thanks,
Hank



>----------- nsp-security Confidential --------
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>Hi, team.
>
> > What if the DDoS is big enough that even your transit providers can't
> > handle it?  Not an unheard of situation with the popular
> > reflection+amplification attacks.  You ask Cymru to ask "everyone" to
> > null route the target, thus stopping the traffic much closer to the
> > sources.
>
>Exactly right, thank you, Jon!
>
> >> We would probably prefix filter this to a specific small number (50 100?)
> >
> > My assumption would be this is intended to be used only for attack
> > mitigation.  How many active large scale reflection+amplification DDoS's
> > are generally going on at one time these days?
>
>Agreed, it would be a small number.  The geek in me hesitates to set a
>hard limit, but the liberal arts major in me says "oh sure, 100 is way
>more than we envision."  :)
>
> > Another question, I need answered is, do you have to participate in the
> > RTBH part (accepting null routes from the CURTS servers) to be allowed
> > to have Cymru advertise your IPs?  i.e. do you have to participate in
> > the mitigation to be eligible to have CURTS mitigate an attack against
> > your network?  This is a tool I'd like to have "just in case" we need
> > it, but I don't know if I'll be able to sell "some 3rd party gets to
> > decide what we null route".  OTOH, if there isn't enough participation
> > in that part of it, then the service is pointless.
>
>Your last point is the most important:  If there isn't significant
>community adoption, this won't work.  It has to scale to scale.  :)
>
>Folks, this isn't for the purpose of blocking the routine.  That's why
>we make available the DDoS-RS and the text file version of that.
>
>The purpose of the CUTRS is for those massive DDoS attacks (100Gbps+
>today) that impact you, your customers, and perhaps others around you
>such as those at the same exchange(s).  This is for those moments when
>your own expertise at mitigation, and infrastructure for mitigation, is
>simply overwhelmed by a surfeit of traffic or packets.  It's a community
>response, automated through BGP.
>
>Would I expect folks to blindly accept what we publish?  No, but we
>won't be the publishers.  We're simply the messengers.
>
>The system is setup such that we inject nothing.  Only the providers
>will be able to inject their own prefixes.  Think of your own RTBH
>services as an example.  Our role will be to verify that Don can
>announce things from AS209 and within IP space x.x.x.x, y.y.y.y, etc.
>We will have filters in place to ensure only approved space and ASNs
>participate and are propagated, not unlike what many of us do today on
>our peering sessions.
>
>Long winded answer, sorry, Jon.  No, you don't have to accept to
>announce, or announce to accept.  How you use the service is up to you.
>
>What I think the community does need is something superior to the ad-hoc
>approach of calls and email and messaging to mitigate massive attacks.
>If we can squelch massive attacks quickly, then the bad guys have lost
>the ability to cause widespread damage in this manner (e.g. NTP amp, DNS
>amp, et al.).  It's no panacea, but I do think it helps.
>
>That said, we're wide open to all ideas!
>
>Thoughts?
>
>Thank you!
>Rob.
>- --
>Rabbi Rob Thomas
>Team Cymru                                https://www.team-cymru.org/
>"Of all tyrannies, a tyranny sincerely exercised for the good of its
>  victims may be the most oppressive." - C.S. Lewis
>
>-----BEGIN PGP SIGNATURE-----
>
>iQCVAwUBU3tekFkX3QAo5sgJAQKYaQQAiZLEunHhCs1vtg05JrqaINtTQrav8VYN
>ArgWNDnOGgAbIf+OCWJAVPspuEbBfG3xhssYe32YME1/9+DqfO9MkOvms3DSIOkH
>l+P4VrqalHwSjmGMZmGySrV43YJS9k6VD1jASEj6CFOkPwS8EjDRQR2iFR2kpqGn
>VOy9zQ8w3P4=
>=eOHh
>-----END PGP SIGNATURE-----
>
>
>_______________________________________________
>nsp-security mailing list
>nsp-security at puck.nether.net
>https://puck.nether.net/mailman/listinfo/nsp-security
>
>Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>community. Confidentiality is essential for effective Internet security 
>counter-measures.
>_______________________________________________




More information about the nsp-security mailing list