Re: FlowSpec

2020-04-23 Thread Roland Dobbins
mer A the ability to interfere with Customer B's traffic, and the difficulty of implementing such constraints). It can be an option worth exploring, in many circumstances. -------- Roland Dobbins

Re: UDP/123 policers & status

2020-03-28 Thread Roland Dobbins
e well-understood and -documented, and a bit of research can help bring one up to speed on them pretty quickly. -------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
niversal source-address validation (SAV). Without the ability to spoof, there would be no reflection/amplification attacks. ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
point is that when applying broad policies of this nature, one must be very conservative, else one can cause larger problems on a macro scale. Internet ateriosclerosis is a significant issue. ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
in your span of administrative control. * btw, what can you experts tell me about tcp-based volumetric attacks... TCP reflection/amplification. ----------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
and should use them in a situationally-appropriate manner. And when we're using techniques like QoSing down certain ports/protocols, we must err on the side of caution, lest we cause larger problems than the attacks themselves. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
ng_Isp_v2.pdf> ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
neral. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-30 Thread Roland Dobbins
/s/xznjloitly2apixr5xge> ----------- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
it the attacker. ------- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
On 15 Aug 2018, at 6:28, Grant Taylor via NANOG wrote: > Is there something that I've missed the boat on? No - it's a belt-and-suspenders sort of thing, along with GTSM. ------- Roland Dobbins

Re: SP security knowledge build up

2018-07-23 Thread Roland Dobbins
tworking-Technology-ebook/dp/B0051TM5L2/> ----------- Roland Dobbins

Re: Attacks on BGP Routing Ranges

2018-04-18 Thread Roland Dobbins
infrastructure self-protection concepts: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> --- Roland Dobbins

Re: New Active Exploit: memcached on port 11211 UDP & TCP being exploited for reflection attacks

2018-02-27 Thread Roland Dobbins
access policies at the IDC edge which disallow unwanted UDP/11211 as well as TCP/11211 from reaching abusable memcached deployments. ------- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:19, Roland Dobbins wrote: > <https://app.box.com/s/ko8lk4vlh1835p36na3u> This is the correct URI for the first preso, apologies: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> ------- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:54, valdis.kletni...@vt.edu wrote: > I'll go out on a limb and suggest that except for a very basic home/SOHO > network, "You may need" should be "You will probably need". Concur, heh. ------- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
You may need one set of ACLs at the peering/transit edge, and other, more specific ACLs, at the IDC distribution gateway, customer aggregation gateway, et. al. --- Roland Dobbins

Re: Consumer networking head scratcher

2017-03-01 Thread Roland Dobbins
on Windows boxes, IIRC. ------- Roland Dobbins

Re: Software for network modelling / documentation / GIS

2017-02-23 Thread Roland Dobbins
rt of capability, too. --- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
On 7 Jan 2017, at 14:22, Joly MacFie wrote: > Blind backlash from IoT DDoS? Looming billions of rf tagged items​? None of this has anything to do with this 'DOA' thing, though. ------- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
nature, I've been waiting for the ITU to impose GOSIP or whatever on us for the last ~30 years or so - but so far, nothing much has happened in that regard. Is there actually a reason to suspect that this time it will be any different? --- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
ectory services, per se. Can you provide more context? ------- Roland Dobbins

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
ter/ttl-expiry-attack.html> ----------- Roland Dobbins

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
On 22 Dec 2016, at 20:27, Jean | ddostest.me via NANOG wrote: the already known Layer 4 amp DDoS like dns, ntp, ssdp, snmp These are layer-7 reflection/amplification attacks - i.e., application-layer - *not* layer-4. --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-20 Thread Roland Dobbins
On 20 Dec 2016, at 12:18, Laurent Dumont wrote: > As a student in the field, this is the kind of stuff I live for! ;) <https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse#Notable_cases> ------- Roland Dobbins

Re: Prepending with another ASN you don't own

2016-12-16 Thread Roland Dobbins
On 17 Dec 2016, at 0:13, Job Snijders wrote: There are providers who inspect the AS_PATH's contents and make decisions to reject (ignore) a route announcement or not based on the presence of certain values. +1 --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
On 16 Dec 2016, at 16:40, Roland Dobbins wrote: Looking at the source IP distribution, does a significant proportion of the larger query base seem to originate out-of-region? And are do they appear to be mostly broadband access networks, or

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
? --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:17, Roland Dobbins wrote: <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> Over on nznog, Cameron Bradley posited that this may be related to a TR-069/-064 Mirai variant, which makes use of a 'SetNTPServers' exploit. Perhaps one of them is

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:16, Roland Dobbins wrote: > <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> ------- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:09, Dan Drown wrote: This seems more like "someone pushed out bad firmware" rather than something malicious. Everything old is new again . . . ------- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
esync queries, or lots of level-6/level-7 admin command attempts? --- Roland Dobbins

Re: Favorite Speed Test Systems

2016-12-05 Thread Roland Dobbins
On 5 Dec 2016, at 21:50, Graham Johnston wrote: What is your preferred one and why? <http://testmy.net/> Thorough, reasonable teat methodology, allows one to store history, decent range of test servers worldwide. --- Roland Dobbins

Re:

2016-12-02 Thread Roland Dobbins
On 2 Dec 2016, at 22:31, Christopher Morrow wrote: > that statement seems ... hard to prove. Paging Geoff Huston to the white courtesy phone . . . ;> --- Roland Dobbins

Re: Spitballing IoT Security

2016-12-02 Thread Roland Dobbins
e actors' are somehow 'learning how to take down the Internet' is equally uninformed. State actors already know how to do this, they don't need to 'learn' or 'test' anything. DDoS attacks are the Great Equalizer; when it comes to DDoS, nation-states are just another player. --- Roland Dobbins

Re: How to find all of an ISP's ASNs

2016-10-25 Thread Roland Dobbins
On 26 Oct 2016, at 0:41, Gary Baribault wrote: > other than the two local major ISPs (keeping last Friday in mind!) . . . why would you want to expose them to the public Internet at all? There are many, many reasons not to do so. --- Roland Dobbins

Re: Dyn DDoS this AM?

2016-10-21 Thread Roland Dobbins
On 21 Oct 2016, at 23:01, Mike Hammett wrote: > Are there sites that can test your BCP38\84 compliance? <https://www.caida.org/projects/spoofer/> ------- Roland Dobbins

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
On 20 Oct 2016, at 23:32, Mark Tinka wrote: Some requirements call for Ethernet transport as opposed to IP. Sure - but it's probably worth revisiting the origins of those requirements, and whether there are better alternatives. --- Roland Dobbins

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
moving forward. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 28 Sep 2016, at 0:18, Brielle Bruns wrote: > I call shenanigans on providers not seeing their unruly users. I was talking about the users, not the ISPs. --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
world, however. Especially the Internet part. ;> --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
* the unruly children, but *choose* to ignore them. That's the difference. Keep in mind, most of the folks on this list are not representative of the average consumer in terms of the skill-sets which are relevant in this problem space. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 27 Sep 2016, at 22:37, Patrick W. Gilmore wrote: All the more reason to educate people TODAY on why having vulnerable devices is a Very Bad Idea. Yes, but how do they determine that a given device is vulnerable? --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
e a single provider, just as they typically do for electricity and water. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
cle of clothing they own, every can of soda in their refrigerator, ever major (and many minor) components of their automobiles, every blade in their windowshades, etc. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
g similar would work here. Concur that this is the least-improbable model, absolutely. But keep in mind that subscriptions/services for in-home wiring were (and are) also a tiny percentage of the user base. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
elf how many people set up and use 2FA for any online service which supports it, on their own initiative (i.e., not having a bank ship them a pre provisioned dongle). The number of people capable of doing this troubleshooting for themselves is roughly equivalent to the number of people who've successfully set up 2FA on their own initiative. --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
iferation of connected devices - militates against user troubleshooting, as well. --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
e's no separation in the public mind of 'my network' from 'the Internet' that is analogous to the separation between 'the power company' and 'the electrical wiring in my house/apartment' (and even in that space, the conceptual separation often isn't present). --- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-21 Thread Roland Dobbins
re sending .gifs or something, surely this might be possible, yes? It seems within the realm of possibility this sort of response - or lack thereof - could result in some gaming network operators becoming a bit jaded. And perhaps some customers, too. ------- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
is a dearth of engagement of clueful folks in the global operational community. Some gaming-oriented networks are well-represented; others are not, sadly. ------- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
m with NAT; as CGN becomes more prevalent on wireline broadband networks, it's only going to get worse. AFAIK, PSN doesn't support IPv6. That would be another topic of discussion with the operational folks. ------- Roland Dobbins

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Roland Dobbins
uring they can be enforced. --- Roland Dobbins

Re: Thinking Methodically about building a PoC

2016-06-12 Thread Roland Dobbins
On 13 Jun 2016, at 8:52, Kasper Adel wrote: > 2) Do some planning and research first. This. --- Roland Dobbins

Re: AW: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
're now experiencing. Sometimes it isn't possible, of course. ------- Roland Dobbins

Re: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
dom, if ever, accomplishes anything useful in terms of successfully defending against DDoS attacks. --- Roland Dobbins

Re: Turning Off IPv6 for Good (was Re: Netflix VPN detection - actual engineer needed)

2016-06-01 Thread Roland Dobbins
their ISPs? ;> --- Roland Dobbins

Re: NIST NTP servers

2016-05-10 Thread Roland Dobbins
ing-Opensourcely-wp.pdf> Just keep in mind, *nothing* is perfect. --- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
on reading various reports and research papers, but rather upon our actions which generate the data and experiential observations upon which such reports and research papers are based. ----------- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
stood out in my mind); those espousing it pretty quickly changed their tunes once their networks had been knocked flat a couple of times. ;> --- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
to provide for a higher degree of automation, increased rapidity of response, and interoperability in both inter- and intra-network DDoS mitigation scenarios. --- Roland Dobbins

Re: BGP FlowSpec

2016-04-30 Thread Roland Dobbins
On 30 Apr 2016, at 19:56, Pierre Lamy wrote: > to null out the destination rather than the source. <https://tools.ietf.org/html/rfc5635> ------- Roland Dobbins

Re: Why the US Government has so many data centers

2016-03-12 Thread Roland Dobbins
On 13 Mar 2016, at 3:03, George Herbert wrote: > It's a symptom of trying to save a few cents at the risk of dollars. Concur 100%. Not to mention the related security issues. --- Roland Dobbins

Re: Why the US Government has so many data centers

2016-03-11 Thread Roland Dobbins
rvers just lying around in random rooms, and that those rooms are de facto government data centers, whether those who're responsible for said rooms/servers know it or not . . . ------- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
grow wearisome. I will not reply any further to this thread, so as to avoid further spamming the list. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
ation about traffic via FNF or IPFIX EE mechanisms isn't desirable. But you are simply wrong about the utility of NetFlow and/or IPFIX with classical flow templates. I really like to hear feedback about my vision. See above. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
pes of DDoS attacks utilizing NetFlow implementations (with the exceptions of crippled implementations like the aforementioned EARL6/EARL7 and pre-Sup7 Cisco 4500) are simply untrue. ----------- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
incorrect, and reflects an inaccurate understanding of how NetFlow/IPFIX actually works, in practice. It's often repeated by those with little or no operational experience with NetFlow/IPFIX. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
acket, anyways. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
27;t support 1:1. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 8:06, Keith Medcalf wrote: Consumer Narrowband Access Networks use these protocols all the time. Most broadband access customers do not actively use these protocols, themselves, with the partial exception of SIP. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:59, John Levine wrote: I think that most if not all of the consumer over the top VoIP phones like Vonage use SIP. That's true. One would hope that they're not globally reachable, however. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:23, John Levine wrote: The VoIP phones sure use SIP. True, but how prevalent are 'bare' SIP phones vs. VoIP systems utilized by remote workers via VPNs? ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 4:03, John Levine wrote: A certain number of us work from home and connect to headquarters with a VPN. and have SIP phones, you know. Not typically via/requiring the protocols you mentioned. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
what's being discussed in this thread. It's a different story for transit operators. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
nnection. Caveat emptor. ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
ew up. Also, see this article: <http://arstechnica.com/security/2016/02/asus-lawsuit-puts-entire-industry-on-notice-over-shoddy-router-security/> and this .pdf preso: <https://app.box.com/s/rblnddlhda44giwfa8hy> ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
running out-of-date software that is abusable in multiple ways. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
s://app.box.com/s/r7an1moswtc7ce58f8gg> ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
fiers (which is often the case). And even that small tenth of a percent who're deliberately running their own DNS servers can end up inadvertently causing disruption if they're running those DNS servers as open recursors. ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
esponsible. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
ckets *destined* for UDP/53 on broadband access networks, not *sourced from*. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-25 Thread Roland Dobbins
ly emanate from broadband access networks due to abusable CPE. Others, as well, of course, but those are generally the most prevalent. ------- Roland Dobbins

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
, apart from the immediate upstream. ------- Roland Dobbins

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
he DNS changes. ------- Roland Dobbins

Re: Netflix NOC? VPN Mismarked?

2016-01-28 Thread Roland Dobbins
On 29 Jan 2016, at 0:05, Crane, Todd wrote: > Imagine the issues if EoL'ed and EoS'ed those iPads. Um, I think they are . . . ------- Roland Dobbins

Re: Netflix stuffing data on pipe

2015-12-30 Thread Roland Dobbins
x, or . . . ? --- Roland Dobbins

Re: John McAfee: Massive DDoS attack on the internet was from smartphone botnet on popular app

2015-12-12 Thread Roland Dobbins
On 13 Dec 2015, at 0:23, Jim Shankland wrote: Am I missing something, or is an even distribution of originating IP addresses virtually impossible *without* using spoofing? If his remarks were reported correctly, they are incorrect. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
some preemptive ACLs so that you aren't forced into completing the DDoS. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
lt;https://app.box.com/s/776tkb82634ewvzvp26nnout6v4ij39q> <https://app.box.com/s/r7an1moswtc7ce58f8gg> ----------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-08 Thread Roland Dobbins
tuationally-specific. ------- Roland Dobbins

Re: Questions regarding equipment for a large LAN event

2015-12-06 Thread Roland Dobbins
On 7 Dec 2015, at 13:41, Laurent Dumont wrote: > I appreciate any input on the matter! 1. cisco-nsp is a better list for this type of question. 2. The ASR9K is an edge router, not an access switch. 3. Why not just ask Cisco, for starters? --- Rol

Re: Staring Down the Armada Collective

2015-12-03 Thread Roland Dobbins
DDoS attacks, FYI. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
pe. Start with the BCPs, then move to the macroanalytical. Only dip into the microanalytical when required, and even then, do so very selectively. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 4 Dec 2015, at 2:38, Dovid Bender wrote: > The last I spoke with NTT they said the largest they ever saw was > 300GB That wasn't DD4BC or Armada Collective. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:04, Josh Reynolds wrote: > None of those names you just mentioned have made the international news. Of course they have. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:26, Nick Hilliard wrote: > If you believe that someone who issues a ransom threat will stop if you pay > them off, you're smoking crack. +1 These attacks aren't rocket-science to defend against. OP, ping me 1:1. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
ontact me 1:1 and I'll work to hook you up with the right folks. --- Roland Dobbins

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
On 2 Dec 2015, at 0:14, Roland Dobbins wrote: Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. I forgot to mention RRL on authoritative servers, apologies. --- Roland Dobbins

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
ed out' by programmatically-generated attack traffic). The real solution to this entire problem set is source-address validation, as you indicate. Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. ----------- Roland Dobbins

  1   2   3   4   5   >