On Fri, 11 Feb 2000, Paul Ferguson wrote:

> Vijay,
> 
> We (at least cisco, anyways) already have a knob for this:
> 
>   [no] ip verify unicast reverse-path
> 
> We call it Unicast RPF.

This only works on single homed customers. Due to asymmetric routing, the
customer can source _valid_ ip addresses from an ip source address that is
not routed over that interface.  I too would prefer some sort of magic
unicast RPF, but the best compromise is the built-in access filter.  The
solution must be general enough to work for multihomed, defaulting out
customers with blocks from n providers,

/vijay


> See also:
> 
> Craig Huegen's very useful web page on minimizing the effects
> of DoS attacks:
> http://users.quadrunner.com/chuegen/smurf.cgi
> 
> Cisco: Distributed Denial of Service (DDoS) News Flash,
> February 9, 2000
> http://www.cisco.com/warp/public/707/newsflash.html
> 
> Dave Dittrich's (University of Washington) very good
> analysis of the recent DDoS attack tools.
> http://www.washington.edu/People/dad/
> 
> NIPC (National Infrstructure Protection Center),
> TRINOO/Tribal Flood Net/tfn2k stuff:
> http://www.fbi.gov/nipc/trinoo.htm
> 
> "Handling A Distributed Denial of Service Trojan
> Infection: Step-by-Step."
> http://www.sans.org/y2k/DDoS.htm
> 
> CERT (Computer Emergency Response Team at CMU)
> http://www.cert.org/
> 
> Cisco: Internet Security Advisories
> http://www.cisco.com/warp/public/707/advisory.html
> 
> Characterizing and Tracing Packet Floods Using
> Cisco Routers
> http://www.cisco.com/warp/public/707/22.html
> 
> Cisco Product Security Incident Response (PSIRT)
> http://www.cisco.com/warp/public/707/sec_incident_response.shtml
> 
> "Essential IOS" - Features Every ISP Should Consider
> http://www.cisco.com/public/cons/isp/documents/IOSEssentialsPDF.zip
> 
> Know your enemy: Script Kiddies
> http://www.enteract.com/~lspitz/enemy.html
> 
> Cisco Flow Logs and Intrusion Detection at the Ohio
> State University
> http://www.usenix.org/publications/login/1999-9/osu.html
> 
> 
> If anyone else has useful links (it doesn't matter who
> is the vendor, whatever), please let me know.
> 
> - paul
> 
> At 09:01 PM 02/11/2000 -0500, Vijay Gill wrote:
> 
> >CC'd to NANOG, maybe we can move this there.
> >
> >On Fri, 11 Feb 2000, Paul Ferguson wrote:
> >
> > > It would allow the attacks to be traced back to the zombies (in
> > > the case of these DDoS attacks), and the perpetrators to be traced
> > > back and identified.
> >
> >To make that easier, what is needed is something associated with a
> >downstream interface that is a part of the configuration itself, not a
> >separate access-list.  This makes it much easier to track on a large box
> >with many hundreds of customer links and so forth.
> >
> >Something like so:
> >
> >interface XXXm/n/p.q
> >description whatever customer
> >encaps ...
> >ip address x y
> >ip allow-source blocks-that-are-valid
> >ip allow-source ...more-blocks-
> >
> >so on and so forth.
> >
> >/vijay
> 
> 

Vijay Gill                         |The (paying) customer is always right.
[EMAIL PROTECTED], [EMAIL PROTECTED]  |                  - Piercarlo Grandi
http://www.gl.umbc.edu/~vijay      | Eagles may soar, but weasels don't get
These are my opinions only.        | sucked into jet engines.

Reply via email to