Le 2018-03-02 22:07, Barry Raveendran Greene a écrit :

> Hi Todd,
> 
> What you are describing is uRPF VRF mode. This was phase 3 of the uRPF work. 
> Russ White and I worked on it while at Cisco. 
> 
> Given that you are setting up prefix filters with your peers, you can add to 
> the peering agreement that you will only accept packets whose source 
> addresses matches the prefixes sent. 
> 
> You then take that BGP session, feed that into a VRF on the interface, and 
> run uRPF against that VRF. If a source address does not match, drop. 
> 
> If the BGP session adds more routes, those automatically update the VRF 
> "white list" for the uRPF. 
> 
> It was build to scale. Not sure where it is at in the code or the hardware. 
> Ask Cisco.
> 
> Barry
> 
> PS - So yes, you can do uRPF on your peering sessions. It was coded and 
> deployed back in 2006.
> 
> On Mar 1, 2018, at 13:57, Todd Crane <t...@toddcrane.com> wrote:
> 
> Question:
> Since we cannot count on everyone to follow BCP 38 or investigate their 
> abuse@, I was thinking about the feasibility of using filtering to prevent 
> spoofing from peers' networks.
> 
> With the exception of a few edge cases, would it be possible to filter 
> inbound traffic allowing only packets with source addresses matching the 
> peer's BGP announcement?  Theoretically it should be a two way street to any 
> address I can receive from, thus if I can't send to it, I shouldn't be 
> receiving from it. I realize this is not currently a feature of any router 
> (to my knowledge), but could it be implemented into some NOSs fairly easily 
> and jerry-rigged into others for the time being.
> 
> This would allow us to peer with OVH et al, and not worry as much. 
> Furthermore, whereas BCP 38 is reliant upon everybody, this could 
> significantly reduce amplification attacks with even just a handful of 
> adopters.
> 
> --Todd
> 
> On Feb 28, 2018, at 6:52 PM, Job Snijders <j...@ntt.net> wrote:
> 
> On Tue, Feb 27, 2018 at 09:52:54PM +0000, Chip Marshall wrote: On 2018-02-27, 
> Ca By <cb.li...@gmail.com> sent: Please do take a look at the cloudflare blog 
> specifically as they
> name and shame OVH and Digital Ocean for being the primary sources
> of mega crap traffic
> 
> https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/
> 
> Also, policer all UDP all the time... UDP is unsafe at any speed. 
> Hi, DigitalOcean here. We've taken steps to mitigate this attack on
> our network.

NTT too has deployed rate limiters on all external facing interfaces on
the GIN backbone - for UDP/11211 traffic - to dampen the negative impact
of open memcached instances on peers and customers.

The toxic combination of 'one spoofed packet can yield multiple reponse
packets' and 'one small packet can yield a very big response' makes the
memcached UDP protocol a fine example of double trouble with potential
for severe operational impact.

Kind regards,

Job 

Hope one day the 3rd mode of uRPF will be something else than a plan ...
uRPF is not very usefull when multi homed. And as far as I know, multi
homed networks are increasing as fast as PNI development ;)

-- 
FABIEN VINCENT 
_@beufanet_

Reply via email to