On 17 avril 2014 19:02:14 CEST, Claudio Jeker <cje...@diehard.n-r-g.com> wrote: >On Thu, Apr 17, 2014 at 05:17:15PM +0200, Tristan PILAT wrote: >> 2014-04-17 15:23 GMT+02:00 Tristan PILAT <tristan.pi...@gmail.com>: >> >> > 2014-04-17 13:20 GMT+02:00 Tristan PILAT <tristan.pi...@gmail.com>: >> > >> > 2014-04-17 12:25 GMT+02:00 Gregory Edigarov <ediga...@qarea.com>: >> >> >> >>> On 04/17/2014 12:24 PM, Tristan PILAT wrote: >> >>> >> >>> 2014-04-15 18:42 GMT+02:00 Laurent Caron (Mobile) < >> >>>> lca...@unix-scripts.info> >> >>>> : >> >>>> >> >>>> On 14 avril 2014 17:57:53 CEST, Tristan PILAT ><tristan.pi...@gmail.com >> >>>>> > >> >>>>> wrote: >> >>>>> >> >>>>>> match from any community 64514:888 set nexthop blackhole >> >>>>>> >> >>>>>> Hi, >> >>>>> >> >>>>> Make sure you dont accept from any but eg from group customers, >make >> >>>>> sure >> >>>>> the address *does* belong to your customers space (to avoid a >customer >> >>>>> installing a blackhole route on a route you advertise). >> >>>>> Make sure you do strip 64514:888 from other peers. >> >>>>> ... >> >>>>> >> >>>>> And what about the client side ? Which command should he enter >if he >> >>>>>> wishes >> >>>>>> to blackhole ip 1.2.3.4 eg >> >>>>>> >> >>>>>> Is it something like that ? bgpctl network add 1.2.3.4/32 >community >> >>>>>> 64514:888 >> >>>>>> >> >>>>> Exactly. >> >>>>> >> >>>>> Hi, >> >>>>> >> >>>> Thanks for your reply ! I just tested this in my lab and it's >working >> >>>> like >> >>>> a charm but only if I set "allow from any inet prefixlen 8 - 32" >and >> >>>> this >> >>>> is annoying. >> >>>> >> >>>> Is there a way to make this work with "allow from any inet >prefixlen 8 - >> >>>> 24" to accept /32 only for the blackhole ? >> >>>> >> >>>> -- >> >>>> Tristan >> >>>> >> >>> like this: >> >>> >> >>> >> >>> allow from any inet prefixlen 8 - 24 >> >>> allow from any inet prefixlen 32 community 64514:888 >> >>> >> >>> >> >> That goes without saying after all :-) Thanks ! >> >> >> >> -- >> >> Tristan >> >> >> > >> > Another question... Anyone knows if there is a way to do Source >> > Base Remotely-Triggered Black Hole with OpenBGPd ? eg If I am >attacked by a >> > single IP and i want to blackhole it. >> > >> >> I found something to do Source Base Remotely-Triggered Black Hole. >> >> On the provider side, i can set labels like that : >> In bgpd.conf --> match from any community 64514:999 set rtlabel dos >> In pf.conf --> block drop from route dos >> >> On the client side, if we want to black 4.3.2.1/32 source ip : >> bgpctl network add 4.3.2.1/32 community 64514:999 >> >> Unfortunaly this is not working, i certainly missed something ! >Please give >> me hints :-) > >You can't use rtlabels for matching the source, at least I think it >does >not work. I would try to use the "set pftable dos" in bgpd and >"block quick drop from <dos>" in pf.
Ok i will try this tomorrow thanks. But if it does not work. How can I set up blockhole based on source address as described in RFC5635 with OpenBSD ? -- Tristan