netsec-sig - Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more...
Subject: Internet2 Network Security SIG
List archive
Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more...
Chronological Thread
- From: Mark Montalto <>
- To: "Schopis, Paul" <>, UCONN-Scott Taylor <>, "Spurling, Shannon" <>, "D'Angelo, Cas (Samuel)" <>, Steven Wallace <>, "" <>
- Cc: Internet2-RVietzke <>, Internet2-GKLoftus <>, John Moore <>, "Caroline Weilhamer" <>
- Subject: Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more...
- Date: Wed, 21 Oct 2015 13:44:51 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:23
re: the irony - can you make a conclusion or speculate as to whether there is a actual relationship between the deployment and the reduction/stop of attacks?
thank you
Mark Montalto OSHEAN.org Director, Business Development 617 827 6928 From: <> on behalf of Schopis, Paul <>
Sent: Wednesday, October 21, 2015 8:54 AM To: UCONN-Scott Taylor; Spurling, Shannon; D'Angelo, Cas (Samuel); Steven Wallace; Cc: Internet2-RVietzke; Internet2-GKLoftus; John Moore; Caroline Weilhamer Subject: RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more... Scott, We had a lot of attacks on k-12 as well, the precipitating event was electronic testing state wide. Most of k-12 here uses NAT tas well, but we were able to mitigate some of impact by identifying characteristics of the troublesome traffic and rate limiting it. That way we didn’t kill the site and the evil doers were using little used port numbers so it had minimal impact on legit traffic. We even built a custom monitor so we could easily see it when it started. It was a high enough profile issue politically that the Ohio Dept of Ed gave a 2.1 million dollar grant and the Arbor solution was deployed. They won an RFP. It is a 3 year contract and the irony is as it was rolled out the attacks stopped. It did seem to work well during the pilot testing and the sites are connected to OARnet via 10G.
From: [mailto:]
On Behalf Of Taylor, Scott J.
I’m curious to hear if anyone has had any success in building scrubbing type mitigation inside their networks? The majority of the attacks we see are focused on our K12 environment and range from 1-20Gbps. The K12 members often hide all their traffic behind a single NATed address and while we can blackhole traffic it still means they are either down or must renumber. When they renumber we often see the attack follow them to the new IP.
We’ve been investigating building a scrubbing solution to mitigate volumetric attacks up to about 40Gbps. Larger than that we’d blackhole or help broker redirecting their traffic to a mitigation service. So far we’ve had poor success but haven’t had a lot of time to spend on this either. We’ve done a lot of talking with vendors but only done a single POC, which failed to meet our requirements.
I’m starting to believe that the IU guys that are doing SCI-Flow (?) have the right model for DDoS mitigation as well as expressing elephant flows. Why can’t when we detect these attacks, we program a controller to drop. I’m also very curious to spend some more time with vendors on the BGP-Flowspec capabilities and maybe using something like that to drop traffic at our edge. Based on what we’ve seen in CT I have to believe we could easily knock out the less sophisticated attacks.
-Scott
From: <>
on behalf of "Spurling, Shannon" <>
Is scrubbing something I2 wants to provide or contract for? I think the power to leverage the AL2S for temporary up-links into a scrubbing service that is a pay-as-you-go type offering could be powerful. There has been some trepidation on the part of certain members with making full use of the TR-CPS service, and then there is also the location limited membership of the TR-CPS peers. If the scrubbing service’s outside facing presence is sufficiently diverse and present in the unwashed mass of the Internet, coming in through the backside with AL2S might be the big plus over layer3 tunneling. I think getting a large enough and diverse enough group of touch points into commodity Internet to make the scrubbing work well would be hard for I2 without complete community participation. Maybe something Members would have to be willing to host a box that could draw dirty traffic in to be scrubbed and advertise those routes out to their Internet providers in some way. But that’s cazy… Right?
Personally, I’m not sold on scrubbing. Sometimes it’s best to scuttle the IP during the attack and adopt some edge based practices that let you have some flexibility at the edge. Some of the lamest (as far as target value or reason behind it) DDOS’s are enormous, and I don’t see any way to effectively scrub them out. Then there’s the camouflaged ones, where you would need something application or state aware to properly remove the bad traffic. That is very computationally expensive.
Shannon Spurling
From:
[]
On Behalf Of D'Angelo, Cas (Samuel)
Steve,
I like your list of requirements. Should we say something about the pricing model we'd prefer? small recurring charge with burst fee for scrubbing higher recurring charge with no additional fees some other model
Does Internet2 (and TR-CPS) provide the routing based tools today? Should we start a separate project asking I2 to implement:
maybe more???
Thanks.
Cas
From:
<> on behalf of Steven Wallace <>
[cc’ing Caroline for NTAC engagement]
I received a couple of volunteers (i.e. 2) to participate in developing a fast-tracked set of recommendations to Internet2 concerning possible DDoS service offerings. Since this is going to be very light weight, I’m soliciting the entire group to weigh in.
I confirmed with Rob Vietzke that our charge is:
“Internet2 requests that the Security WG recommend a set of DDoS mitigation capabilities to be delivered using, or in conjunction with, the Internet2 network. The intent is to inform Internet2’s expeditious engagement with mitigation providers to on-board services.”
The idea is that the group would provide a list of DDoS mitigation capabilities Internet2 might offer. To expedite I2’s delivery of these capabilities, I2 is not seeking specific vendor recommendations. It’s also my understanding that such services may or may not be delivered via Net+ (as someone said expeditiously and via Net+ have not been proven to co-exist ;-).
I’m going to take this charge a bit farther and also solicit additional Internet2 operational capabilities, such as RTBH with BGP Flowspec and participation in UTRS.
I’ll prime the pump with some desired capabilities:
I think it also good to list any constraints that will help inform I2’s efforts.
Let’s use the list to contribute. Next Friday I’ll summarize and deliver to I2 are recommendations. This feels like real progress for this group.
thanks,
ssw
|
- [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Steven Wallace, 10/16/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Dale W. Carder, 10/16/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., D'Angelo, Cas (Samuel), 10/20/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Spurling, Shannon, 10/20/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/20/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Taylor, Scott J., 10/21/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/21/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Mark Montalto, 10/21/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/21/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Taylor, Scott J., 10/21/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/21/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Spurling, Shannon, 10/21/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/21/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Mark Montalto, 10/21/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Dale W. Carder, 10/22/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., George Loftus, 10/22/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/22/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Dale W. Carder, 10/22/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Nick Buraglio, 10/22/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Dale W. Carder, 10/22/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Schopis, Paul, 10/21/2015
- Re: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Michael H Lambert, 10/22/2015
- RE: [Security-WG] fast track for DDoS recommendations to Internet2, and a bit more..., Spurling, Shannon, 10/20/2015
Archive powered by MHonArc 2.6.16.