RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
> I believe that these comments were more along the lines of 'servers can > better handle this that stateful firewalls', not ruling out the use of > load-balancers, reverse-proxy caches, etc. as appropriate. > > --- > Roland Dobbi

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Christopher Morrow
On Mon, Jan 11, 2010 at 12:26 AM, jul wrote: > Martin Hannigan wrote on 05/01/10 16:50: >>> I see two possible solutions: >>> - Netflow/sFlow/***Flow  feeding a BGP RTBH >>> - Inline device >>> >>> >> >>      - Outsource to service provider > > I want to add some stuff on this as I didn't see them

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 11, 2010, at 12:56 PM, George Bonser wrote: > One would probably have a load balancer of some sort in front of those > machines. That is the device that would be fielding any DoS. Yes, and as you've noted previously, it should be protected via stateless ACLs in hardware capable of han

RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
> > And I don't believe anyone is necessarily advocating exposing > individual > > servers directly to the internet either. > > Actually, some of us are. That can be difficult to do when you have maybe 300 or 400 servers that handle one service. Let's say you have a site called www.foobar.com an

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread jul
Martin Hannigan wrote on 05/01/10 16:50: >> I see two possible solutions: >> - Netflow/sFlow/***Flow feeding a BGP RTBH >> - Inline device >> >> > > - Outsource to service provider I want to add some stuff on this as I didn't see them with a quick check on the thread. Local solution always

Re: I don't need no stinking firewall!

2010-01-10 Thread Brian Keefer
On Jan 10, 2010, at 5:40 PM, George Bonser wrote: > And I don't believe anyone is necessarily advocating exposing individual > servers directly to the internet either. Actually, some of us are. > There are other devices that > can handle isolation of the servers and protect them against such th

Re: I don't need no stinking firewall!

2010-01-10 Thread Randy Bush
> And I don't believe anyone is necessarily advocating exposing > individual servers directly to the internet either. some of us do that takes all kinds :) randy

RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
> I certainly understand and agree with your position, in most cases, but > there are some instances when a firewall serves an excellent purpose. > As an > example, we manage hundreds of heterogeneous servers where customers > also > have administrative access to the devices. As such, we can nev

Re: I don't need no stinking firewall!

2010-01-10 Thread Michael K. Smith
On 1/9/10 10:32 PM, "Dobbins, Roland" wrote: > > On Jan 10, 2010, at 1:22 PM, harbor235 wrote: > >> Again, a firewall has it's place just like any other device in the network, >> defense in >>> depth is a prudent philosophy to reduce the chances of >> compromise, it does not >>>eliminate it

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Kevin Oberman
> From: "Dobbins, Roland" > Date: Sun, 10 Jan 2010 21:56:38 + > > On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: > > > The only thing you've said that is being disputed is the the claim > > that a firewall under a DDoS type of attack will fail before a > > server under the same type > of

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 11, 2010, at 4:55 AM, James Hess wrote: > I don't agree with "You never need a proxy in front of a server, it's only > there to fail". Again, reverse proxy *caches* are extremely useful in front of Web farms. Pure proxying makes no sense. -

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Dobbins, Roland
On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: > The only thing you've said that is being disputed is the the claim that a > firewall > under a DDoS type of attack will fail before a server under the same type > of attack. It's so obvious that well-crafted programmatically-generated attack

Re: I don't need no stinking firewall!

2010-01-10 Thread James Hess
On Sun, Jan 10, 2010 at 11:47 AM, William Herrin wrote: > On Sun, Jan 10, 2010 at 3:48 AM, James Hess wrote: >> there are a few different  things that can be >> done,  such as  the firewall answering on behalf of the server (using >> SYN cookies) and negotiating connection with the server after t

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
> On Sun, 10 Jan 2010 08:54:09 CST, Joe Greco said: > > The use of the words "intended recipient" are also extremely problematic; > > by definition, if it is addressed to me, I can be construed as being the > > "intended recipient." If I then turn around and forward it to you, you > > are now also

Re: I don't need no stinking firewall!

2010-01-10 Thread Joe Greco
> On Fri, Jan 8, 2010 at 10:48 AM, Joe Greco wrote: > > Putting a stateful firewall in front of that would be dumb; the server > > is completely capable of coping with the superfluous SYN's in a much > > more competent manner than the firewall. > > The trouble with blanket statements about "all s

Re: he.net down/slow?

2010-01-10 Thread JC Dill
Joe Greco wrote: Spam filter your inbox on /CONFIDENTIALITY NOTICE.*intended recipient.*destroy.*copies/siand be done with it.The individual sender normally has no control over the matter, so their only two choices are: (a) Post with the notice, or (b) Don't post at all. Wow, a

Re: I don't need no stinking firewall!

2010-01-10 Thread William Herrin
On Sun, Jan 10, 2010 at 12:47 PM, William Herrin wrote: > Even if it does > send an RST, most application developers aren't well enough versed in > sockets programming to block on the shutdown and check the success > status, Sorry, I got that wrong. shutdown() will succeed without waiting for a F

Re: I don't need no stinking firewall!

2010-01-10 Thread William Herrin
On Sun, Jan 10, 2010 at 3:48 AM, James Hess wrote: > there are a few different  things that can be > done,  such as  the firewall answering on behalf of the server (using > SYN cookies) and negotiating connection with the server after the > final ACK. James, That's called a proxy or sometimes an

Re: he.net down/slow?

2010-01-10 Thread Valdis . Kletnieks
On Sun, 10 Jan 2010 08:54:09 CST, Joe Greco said: > The use of the words "intended recipient" are also extremely problematic; > by definition, if it is addressed to me, I can be construed as being the > "intended recipient." If I then turn around and forward it to you, you > are now also an "inte

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Valdis . Kletnieks
On Sun, 10 Jan 2010 08:19:27 PST, Roger Marquis said: > > Then you need to get rid of that '90's antique web server and get > > something modern. When you say "interrupt-bound hardware," all you > > are doing is showing that you're not familiar with modern servers > > and quality operating systems

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Manolo Hernandez
From someone who mostly lerks but has been in network engineering operations biz for 17 years, the only OS that seems to always keel over under a ddos and need a firewall is windows. Linux in its current incarnation can handle a substantially larger attack before needing mitigation by firewall t

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
> > Then you need to get rid of that '90's antique web server and get > > something modern. When you say "interrupt-bound hardware," all you > > are doing is showing that you're not familiar with modern servers > > and quality operating systems that are designed to mitigate things > > like DDoS at

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Dobbins, Roland wrote: My employer's products don't compete with firewalls, they *protect* them; if anything, it's in my pecuniary interest to *encourage* firewall deployments, so said firewalls will fall down and need protection, heh. Nobody's disputing that Roland, or the fact that different

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Then you need to get rid of that '90's antique web server and get something modern. When you say "interrupt-bound hardware," all you are doing is showing that you're not familiar with modern servers and quality operating systems that are designed to mitigate things like DDoS attacks. "Modern" s

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
> Actually that's not a great idea. A notice that the recipient is > expected to handle information with unusual attention to > confidentiality is required by law to stand out so that there isn't > any ambiguity about the duties demanded of the recipient. Trade secret > cases have been lost because

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
> Spam filter your inbox on /CONFIDENTIALITY NOTICE.*intended > recipient.*destroy.*copies/siand be done with it.The > individual sender normally has no control over the matter, so their > only two choices are: (a) Post with the notice, or (b) Don't post at > all. Wow, are you implying

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
> Firewalls do a good job of protecting servers, when properly configured, > because they are designed exclusively for the task. Their CAM tables, > realtime ASICs and low latencies are very much unlike the CPU-driven, > interrupt-bound hardware and kernel-locking, multi-tasking software on a > ty

Re: trying to analyze vispa isp outage

2010-01-10 Thread Raymond Dijkxhoorn
Hi! I have try to check BGP traffic behaviors related to recent VISPA ISP DDOS. For this task I have using BGplay and I need feedback about my analysis. If you are interested check http://extraexploit.blogspot.com/2010/01/trying-to-analyze-vispa-isp-outage_08.html Thank you for your attention.

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 10, 2010, at 3:48 PM, James Hess wrote: > Firewalls do not need to build a state entry for > partial TCP sessions, there are a few different things that can be > done, such as the firewall answering on behalf of the server (using > SYN cookies) and negotiating connection with the serve

Re: I don't need no stinking firewall!

2010-01-10 Thread James Hess
On Fri, Jan 8, 2010 at 10:48 AM, Joe Greco wrote: > Putting a stateful firewall in front of that would be dumb; the server > is completely capable of coping with the superfluous SYN's in a much > more competent manner than the firewall. The trouble with blanket statements about "all stateful fire