Jon Kibler wrote:
> Zhiyun Qian wrote:
>> Hi all,
> 
>> What is the common practice for enforcing port blocking policy (or what
>> is the common practice for you and your ISP)? More specifically, when
>> ISPs try to block certain outgoing port (port 25 for instance), they
>> could do two rules:
>> 1). For any outgoing traffic, if the destination port is 25, then drop
>> the packets.
>> 2). For any incoming traffic, if the source port is 25, then drop the
>> packets.
> 
>> Note that either of the rule would be able to block outgoing port 25
>> traffic since each rule essentially represent one direction in a TCP
>> flow. Of course, they could apply both rules. However, based on our
>> measurement study, it looks like most of the ISPs are only using rule
>> 1). Is there any particular reason why rule 1) instead of rule 2)? Or
>> maybe both?
> 
>> Also, is it common that the rules are based on tcp flags (e.g. SYN,
>> SYN-ACK)? One would think block SYN packet is good enough.
> 
>> Regards.
>> -Zhiyun
> 
> I understand your question, and I believe that you have been given a lot of 
> good
> answers. However, I believe that, as an ISP, you are asking the wrong 
> question;
> more precisely, you are only asking part of the real question you should be
> asking. The more appropriate question should be: "What should be our network
> filtering policies?"
> 
> To answer that question, I would start with ingress and egress filtering by IP
> address, protocol, etc.:
>    1) Never allow traffic to egress any subnet unless its source IP address is
> within that subnet range.

Sorry to nit, but shouldn't your uRPF setup take care of this (and many
other of your list items), long before ACL?

It's absolutely great if you have your list implemented, but imho, all
ISP's, no matter how small should investigate and implement urpf. It's
especially fun to play with RTBH.

To be honest, the smaller you are, the easier it is to implement (ie.
urpf strict everywhere!  :)

Steve

Reply via email to