netsec-sig - RE: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy
Subject: Internet2 Network Security SIG
List archive
- From: Michael Hare <>
- To: "" <>
- Subject: RE: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy
- Date: Sun, 25 Sep 2016 01:49:26 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23:rfX0jhWBdkrlP52+fAEjMLAq6N3V8LGtZVwlr6E/grcLSJyIuqrYZR2Pt8tkgFKBZ4jH8fUM07OQ6P+wHzFbqs/c+Fk5M7VyFDY9wf0MmAIhBMPXQWbaF9XNKxIAIcJZSVV+9Gu6O0UGUOz3ZlnVv2HgpWVKQka3ZkJJIbG/AYPZkt62y/H35JL7YgNUiSC7bK8oahi6sE+Z4tIbipZ4K7ogjwTGinpOZ+lMw250fxSekwuqtemq+5s21iVbu/ss84ZgWL/3N/A9TLdYBTkidWA8/sDDqhjYRk2C6mZKATZeqQZBHwWQtEKyZZz2qCav7uc=
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
The downside to GRE is that it is usually world reachable and therefore a target itself. It’s hypothetically possible the I2 membership could use RFC1918 [or v6 equivalent] for clean return, but by using
an unnumbered service such as MPLS or other Ethernet transport that coordination can be sidestepped. Controversial for some, but it would also allow I2 to provide a higher level of QoS for clean/return LSPs. With regard to the report, I am concerned that paragraph one on page four gives a false sense of optimism. Diving into technical for a second, even if the traffic could be confidently filtered by source IP
without collateral impact, I am highly suspicious that we can scale to 100k+ flowspec rules which might be required for a wide attack. OVH has seen nearly 1Tbps with over 145k sources, see
https://twitter.com/olesovhcom/status/778830571677978624
IMHO, destination based flowspec rules (with protocol, source port(s), fragment flags and possibly tcp flags) will keep the rule count more sane while not necessarily being the hammer that RTBH is. -Michael From: [mailto:]
On Behalf Of Steven Wallace There are benefits to using GRE, rather than a layer 2 solution. I would be to discus.
|
- [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Karl Newell, 09/24/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/24/2016
- RE: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Michael Hare, 09/25/2016
- <Possible follow-up(s)>
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Montgomery, Douglas (Fed), 09/24/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/24/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Montgomery, Douglas (Fed), 09/25/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/26/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/27/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Montgomery, Douglas (Fed), 09/25/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/24/2016
- Re: [Security-WG] Proposed Internet2 DDoS Mitigation Strategy, Steven Wallace, 09/24/2016
Archive powered by MHonArc 2.6.19.