Fwd: [i...@arin.net: [arin-announce] ARIN DoS Attack]

2017-01-24 Thread Rich Kulawiec
[FYI. ---rsk ] - Forwarded message from ARIN - > Date: Tue, 24 Jan 2017 12:59:04 -0500 > From: ARIN > To: arin-annou...@arin.net > Subject: [arin-announce] ARIN DoS Attack > > Starting at 10:53 AM ET on Tuesday, 24 January, a DoS attack began > against ARIN. This

RE: DOS Attack

2016-02-27 Thread Frank Bulk
:41 PM To: 'NANOG' Subject: DOS Attack Hi Do you know about a DOS attack protection provider that you can recommend to me please? Thank you KARIM M.

DOS Attack

2016-02-27 Thread K MEKKAOUI
Hi Do you know about a DOS attack protection provider that you can recommend to me please? Thank you KARIM M.

Re: Last-call DoS/DoS Attack BCOP

2015-03-25 Thread Christopher Morrow
On Wed, Mar 25, 2015 at 8:50 AM, John Kristoff wrote: > On Wed, 25 Mar 2015 08:27:14 -0400 > Rob Seastrom wrote: > >> John's statement was in the context of general advice to be included >> in a BCOP document and I felt compelled to say "whoa there". ok, that was my reaction as well. > My inten

RE: Last-call DoS/DoS Attack BCOP

2015-03-25 Thread Chuck Church
Other phrases can be substituted. "no guts, no glory" "go big or go home" "no pain, no pain" Chuck -Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Scott Weeks Sent: Wednesday, March 25, 2015 1:41 AM To: nanog@nanog.org Subject

Re: Last-call DoS/DoS Attack BCOP

2015-03-25 Thread John Kristoff
On Wed, 25 Mar 2015 08:27:14 -0400 Rob Seastrom wrote: > John's statement was in the context of general advice to be included > in a BCOP document and I felt compelled to say "whoa there". My intent was for it to be taken as a DDoS mitigation response option, not as a general practice. John

Re: Last-call DoS/DoS Attack BCOP

2015-03-25 Thread Rob Seastrom
Christopher Morrow writes: > On Tue, Mar 24, 2015 at 5:27 AM, Rob Seastrom wrote: >> >> John Kristoff writes: >> >>> If the attack is an infrastructure attack, say a routing interface that >>> wouldn't normally receive or emit traffic from its assigned address >>> except perhaps for network co

Re: Last-call DoS/DoS Attack BCOP

2015-03-24 Thread Scott Weeks
-- > measures". I volunteer to write the article on "YOLO upgrades", > wherein one loads untested software on equipment with no OOB, types > "request system reboot", shouts "YOLO", and hits return. :: YOLO - If a manager forces me to do

Re: Last-call DoS/DoS Attack BCOP

2015-03-24 Thread Christopher Morrow
On Tue, Mar 24, 2015 at 5:27 AM, Rob Seastrom wrote: > > John Kristoff writes: > >> If the attack is an infrastructure attack, say a routing interface that >> wouldn't normally receive or emit traffic from its assigned address >> except perhaps for network connectivity testing (e.g. traceroute) o

Re: Last-call DoS/DoS Attack BCOP

2015-03-24 Thread Maxwell Cole
On 3/24/15 5:27 AM, Rob Seastrom wrote: John Kristoff writes: If the attack is an infrastructure attack, say a routing interface that wouldn't normally receive or emit traffic from its assigned address except perhaps for network connectivity testing (e.g. traceroute) or control link local co

Re: Last-call DoS/DoS Attack BCOP

2015-03-24 Thread Rob Seastrom
John Kristoff writes: > If the attack is an infrastructure attack, say a routing interface that > wouldn't normally receive or emit traffic from its assigned address > except perhaps for network connectivity testing (e.g. traceroute) or > control link local control traffic (e.g. local SPF adjace

Re: Last-call DoS/DoS Attack BCOP

2015-03-23 Thread John Kristoff
On Mon, 23 Mar 2015 19:00:14 -0400 Yardiel D.Fuentes wrote: > Since there have been good feedback for this BCOP. The committee > decided to extend the "last-call period" for another two weeks to > give ample chance to further feedback. > > So, it is not late for more comments, Hi Yardiel, Nice

Re: Last-call DoS/DoS Attack BCOP

2015-03-23 Thread Yardiel D . Fuentes
Thank you all who have contributed your feedback, comments and discussion points towards the DDoS/DoS attack BCOP. I have updated the current version of the BCOP with the agreed upon feedback: http://bcop.nanog.org/index.php/BCOP_Drafts Since there have been good feedback for this BCOP. The

Last-call DoS/DoS Attack BCOP

2015-02-27 Thread Yardiel D . Fuentes
Hello NANOGers, Following up on the below effort from last year, the DDoS/DoS Attack BCOP Draft document is ready for the last call 2-week period. After this period and unless notable objections are raised, the current document will be ratified as such. The current document can be found in

Re: DOS ATTACK ON BGP , LPTS ??

2012-02-06 Thread Peter Ehiwe
Thanks Roland, Does anyone have a recommended value for tuning LPTS based on experience ? Rgds Peter On Tue, Feb 7, 2012 at 7:45 AM, Dobbins, Roland wrote: > > On Feb 7, 2012, at 1:43 PM, Peter Ehiwe wrote: > > > What is the attacker spoofs the correct peering address , > > In that case, work wi

Re: DOS ATTACK ON BGP , LPTS ??

2012-02-06 Thread Dobbins, Roland
On Feb 7, 2012, at 1:37 PM, Peter Ehiwe wrote: > What is the best way to mitigate DOS attack against the bgp process of a > router , iACLs and CoPP: <https://files.me.com/roland.dobbins/prguob --- Roland Dobbins

DOS ATTACK ON BGP , LPTS ??

2012-02-06 Thread Peter Ehiwe
Hi , What is the best way to mitigate DOS attack against the bgp process of a router , is LPTS on IOS-XR enough ? Rgds Peter

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
irst place. Just punt the > packet up and move on. > I think Jeff's focus here is on the kinds of core and TOR switches that are mostly used in datacenters, not so much the CPE end of the world. > > Still, you've sold me on part of the claim: A /64 is inherently > vulnerable t

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
On Jul 17, 2011, at 1:17 PM, Jeff Wheeler wrote: > On Sun, Jul 17, 2011 at 3:40 PM, Owen DeLong wrote: >> Basically an ND entry would have the following states and timers: > > I've discussed what you have described with some colleagues in the > past. The idea has merit and I would certainly no

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread William Herrin
find out about the "good" ones when the response comes back. This means you could multiply a unicast flood into a multicast flood but you'll have to pump out several orders of magnitude more packets than with the original problem before it causes me grief. Still, you've sold

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Jeff Wheeler
On Sun, Jul 17, 2011 at 3:40 PM, Owen DeLong wrote: > Basically an ND entry would have the following states and timers: I've discussed what you have described with some colleagues in the past. The idea has merit and I would certainly not complain if vendors included it (as a knob) on their boxes

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
On Jul 17, 2011, at 10:35 AM, Jeff Wheeler wrote: > On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: >> My off-the-cuff naive solution to this problem would be to discard the >> oldest incomplete solicitation to fit the new one and, upon receiving >> an apparently unsolicited response to

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Jeff Wheeler
On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: > My off-the-cuff naive solution to this problem would be to discard the > oldest incomplete solicitation to fit the new one and, upon receiving > an apparently unsolicited response to a discarded solicitation, > restart the process flagging

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread William Herrin
you're a hacker with an ability to generate arbitrary packets on a LAN, DOSing the adjacent router by overwhelming its ARP cache is one of the least interesting things you can do... and one of the easiest to get busted at. It isn't necessary (or possible) to solve every conceivable *lo

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> Interesting, thnaks. It's not the vendors I would expect, and it's >> not based on SEND (which is not surprising at all and actually a >> good thing). > > Personally I think SEND is never going to get any traction. Last time

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > Interesting, thnaks. It's not the vendors I would expect, and it's not > based on SEND (which is not surprising at all and actually a good > thing). Personally I think SEND is never going to get any traction. > Is this actually secure in the sense

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> Others use tunnels, PPPoE or lots of scripting, so certainly >> something can be done about it. To my knowledge, SAVI SEND is still >> at a similar stage. Pointers to vendor documentation would be >> appreciated if this is n

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > Others use tunnels, PPPoE or lots of scripting, so certainly something > can be done about it. To my knowledge, SAVI SEND is still at a similar > stage. Pointers to vendor documentation would be appreciated if this is > not the case. -- Mikael

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> In practice, the IPv4 vs IPv6 difference is that some vendors >> provide DHCP snooping, private VLANs and unicast flood protection in >> IPv4 land, which seems to provide a scalable way to build Ethernet >> networks with addre

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > In practice, the IPv4 vs IPv6 difference is that some vendors provide > DHCP snooping, private VLANs and unicast flood protection in IPv4 land, > which seems to provide a scalable way to build Ethernet networks with > address validation---but there i

Re: NDP DoS attack

2011-07-17 Thread Dobbins, Roland
On Jul 17, 2011, at 4:15 PM, Florian Weimer wrote: > In practice, the IPv4 vs IPv6 difference is that some vendors provide DHCP > snooping, private VLANs and unicast flood protection in IPv4 > land, which seems to provide a scalable way to build Ethernet networks with > address validation---but

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Dobbins, Roland
On Jul 15, 2011, at 10:24 AM, Jimmy Hess wrote: > In most cases if you have a DoS attack coming from the same Layer-2 network > that a router is attached to, > it would mean there was already a serious security incident that occured to > give the attacker that special point to atta

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Jared Mauch: > Solving a local attack is something I consider different in scope > than the current draft being discussed in 6man, v6ops, ipv6@ etc... That's not going to happen because it's a layering violation between the IETF and IEEE. It has not been solved during thirty years of IPv4 over

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-15 Thread Christopher Morrow
On Thu, Jul 14, 2011 at 9:47 PM, Owen DeLong wrote: > > Very true. This is where Mr. Wheeler's arguments depart from reality. He's > right > in that the problem can't be truly fixed without some very complicated code > added > to lots of devices, but, it can be mitigated relatively easily and m

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-15 Thread Valdis . Kletnieks
On Thu, 14 Jul 2011 23:13:03 PDT, Owen DeLong said: > On Jul 14, 2011, at 8:24 PM, Jimmy Hess wrote: > > In most cases if you have a DoS attack coming from the same Layer-2 > > network that a router is attached to, > > it would mean there was already a serious security incid

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Owen DeLong
ng to keep the majority of thoughts here for layer-3 >> originated attacks, even if the target is a layer2 item. >> - Jared > > In most cases if you have a DoS attack coming from the same Layer-2 > network that a router is attached to, > it would mean there was already a ser

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/15/2011 12:24 AM, Jimmy Hess wrote: > A similarly hazardous situation exists with IPv4, and it is basically > unheard of for IPv4's Layer 2/ARP security weaknesses to be exploited > to create a DoS condition, even though they can be (very easily), IMO, the situation is different, in that

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jimmy Hess
acks, even if the target is a layer2 item. > - Jared In most cases if you have a DoS attack coming from the same Layer-2 network that a router is attached to, it would mean there was already a serious security incident that occured to give the attacker that special point to attack from. A

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jared Mauch
http://tools.ietf.org/html/draft-gashinsky-v6nd-enhance-00 Sent from my iThing On Jul 14, 2011, at 10:57 PM, Fernando Gont wrote: > On 07/14/2011 11:35 PM, Jared Mauch wrote: > >>> Well, unless there's some layer-2 anti-spoofing mitigation in >>> place, with /64 subnets the "local attacker" ty

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/14/2011 11:35 PM, Jared Mauch wrote: >> Well, unless there's some layer-2 anti-spoofing mitigation in >> place, with /64 subnets the "local attacker" typically *will* have >> enough addresses. > > Solving a local attack Well, I was talking about not *introducing* ;-) one. > is something

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jared Mauch
On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote: >> It should be possible to mitigate this, so long as the attack does not >> actually >> originate from a neighbor on the same subnet as a router IP interface on >> an IPv6 subnet with sufficient number of IPs. > > Well, unless there's some

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/14/2011 10:24 PM, Jimmy Hess wrote: >> In this particular case, if the implementation enforces a limit on the >> number of entries in the "INCOMPLETE" state, then only nodes that have >> never communicated with the outside world could be affected by this >> attack. And if those entries that a

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Owen DeLong
On Jul 14, 2011, at 6:24 PM, Jimmy Hess wrote: > On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote: >> On 07/11/2011 09:17 PM, Karl Auer wrote: >> Vulnerability to this specific issues has a great deal to do with the >> implementation. After all, whenever there's a data structure that can > Y

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jimmy Hess
On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote: > On 07/11/2011 09:17 PM, Karl Auer wrote: > Vulnerability to this specific issues has a great deal to do with the > implementation. After all, whenever there's a data structure that can Yes > In this particular case, if the implementation enf

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/11/2011 09:17 PM, Karl Auer wrote: > I realise this is not "specific implementations" as you requested, but > it seems to me that the problem is generic enough not to require that. > > The attack is made possible by the design of the protocol, not any > failing of specific implementations. S

NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-11 Thread Karl Auer
ble to obtain Neighbor Discovery service from the last hop router as it will be already busy with sending other solicitations. This DoS attack is different from the others in that the attacker may be off-link. The resource being attacked in this case is the conceptual neighbor cache,

Re: DOS attack assistance?

2008-11-27 Thread David Freedman
> Null routing the source isn't going to stop Except when doing source based blackholing, see http://tools.ietf.org/html/draft-kumari-blackhole-urpf-02 section #4 Dave.

Re: DOS attack assistance?

2008-11-26 Thread Max Larson Henry
Hi, Please look for proxad.fr <-- Free Free is an ADSL provider based in France and proxad is a hosting company (please give a look at the "dig -x" below) dig -x 88.191.63.28 ; <<>> DiG 9.5.0b2 <<>> -x 88.191.63.28 ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, stat

RE: DOS attack assistance?

2008-11-26 Thread Darrell Hyde
>One of my customers, a host at 64.8.105.15, is feeling a "bonus" >~130kpps from 88.191.63.28. I've null-routed the source, though our >Engine2 GE cards don't seem to be doing a proper job of that, >unfortunately. The attack is a solid 300% more pps than our aggregate >traffic levels. Null routi

Re: DOS attack assistance?

2008-11-26 Thread Pete Templin
Mikael Abrahamsson wrote: Do you really call this "little if any information publically visible"? Nope, I was wrong about that. My search-fu on RIPE isn't up to snuff, apparently; hence the request for assistance. pt

Re: DOS attack assistance?

2008-11-26 Thread ポール・ロラン
Hello, On Wed, 26 Nov 2008 05:37:59 -0500 Pete Templin <[EMAIL PROTECTED]> wrote: > One of my customers, a host at 64.8.105.15, is feeling a "bonus" > ~130kpps from 88.191.63.28. I've null-routed the source, though our > Engine2 GE cards don't seem to be doing a proper job of that, > unfortun

Re: DOS attack assistance?

2008-11-26 Thread Jay Coley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Pete Templin wrote: > One of my customers, a host at 64.8.105.15, is feeling a "bonus" > ~130kpps from 88.191.63.28. I've null-routed the source, though our > Engine2 GE cards don't seem to be doing a proper job of that, > unfortunately. The attack

Re: DOS attack assistance?

2008-11-26 Thread Mikael Abrahamsson
On Wed, 26 Nov 2008, Pete Templin wrote: It's coming in via 6461, but they don't appear to have any ability to backtrack it. Their only offer is to blackhole the destination until the attack subsides. BGP tells me the source is in AS 12322, a RIPE AS that has little if any information public

DOS attack assistance?

2008-11-26 Thread Pete Templin
One of my customers, a host at 64.8.105.15, is feeling a "bonus" ~130kpps from 88.191.63.28. I've null-routed the source, though our Engine2 GE cards don't seem to be doing a proper job of that, unfortunately. The attack is a solid 300% more pps than our aggregate traffic levels. It's comin