netsec-sig - Re: [Security-WG] BGP Flowspec guidance
Subject: Internet2 Network Security SIG
List archive
- From: Andrew Gallo <>
- To:
- Subject: Re: [Security-WG] BGP Flowspec guidance
- Date: Wed, 23 May 2018 09:27:52 -0700
- Ironport-phdr: 9a23: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
As we make progress on our BGP flowspec testing and pilot, we’ll periodically ask this group for some guidance. Our first question is related to BGP session/family establishment.
Our preference is to add the flow family to our existing BGP sessions, so we can rely on flowspec validation (requires flowspec routes to align with best unicast routes). We would like to set a peer max-prefix limit on the flow family; there is a maximum number of flowspec routes supported on the Juniper MX960. If we use the existing BGP session, exceeding the flow max-prefix will tear down the session which tears down the unicast family as well.
One alternative is to use a separate session for flowspec. We’ll need to disable flowspec validation and rely on peer prefix lists.
Options:
- Use the existing BGP session, enable the flow family
- Use a max-prefix limit such that normal behavior shouldn’t trip the threshold (caveat: we don’t know what normal behavior is) – maybe 100 flowspec routes?
i. Clearly communicate max-prefix limit and its implications (possible unicast teardown)
ii. Configure a limit without a teardown but a peer could send an excessive amount of flowspec routes
- Set up a new BGP session and disable flowspec validation
- Use existing peer prefix lists for validation
Thoughts, comments, questions?
Cheers,
Karl
--
Karl Newell
Cyberinfrastructure Security Engineer
Internet2
520-344-0459
- [Security-WG] BGP Flowspec guidance, Karl Newell, 05/23/2018
- Re: [Security-WG] BGP Flowspec guidance, Andrew Gallo, 05/23/2018
- Re: [Security-WG] BGP Flowspec guidance, Garrett, Seth B, 05/23/2018
- Re: [Security-WG] BGP Flowspec guidance, Dale W. Carder, 05/24/2018
- Re: [Security-WG] BGP Flowspec guidance, Garrett, Seth B, 05/23/2018
- Re: [Security-WG] BGP Flowspec guidance, Brad Fleming, 05/23/2018
- RE: [Security-WG] BGP Flowspec guidance, Michael Hare, 05/23/2018
- Re: [Security-WG] BGP Flowspec guidance, Andrew Gallo, 05/23/2018
Archive powered by MHonArc 2.6.19.