> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of
> Claudio Jeker
> Sent: Wednesday, May 04, 2005 4:18 PM
> To: [email protected]
> Subject: Re: openbgpd nexthop blackhole
> 
> On Wed, May 04, 2005 at 02:55:56PM -0400, Will H. Backman wrote:
> > Anyone have an example bgpd.conf that uses the nexthop blackhole
option
> > for null routing ddos attacks?
> >
> > Looking for an openbsd version of:
> > http://www.secsup.org/Tracking/
> >
> 
> Depends on what you like to achive but a basic starting point is:
> 
> match from any community 65001:666 set nexthop blackhole
> 
> This will blackhole all prefixes with the community tag set to
65001:666.
> Normaly 65001 is your AS and it may be good to limit the match to a
group
> of neighbors (only customers should send you blackhole requests).
> Last but not least a peer remote-as == source-as check would be good.
> 
> match from $customer source-as $customer_as community $myas:666 \
>       set nexthop blackhole
> 
> --
> :wq Claudio

And this would be combined with the -label option in the route command
to get the 666?  Taking their example:
" Now, Black Hole Route the victim IP address:
ip route victimip 255.255.255.255 Null0 tag 666"

In openbsd:
route add victimip/32 -blackhole -label 666

Reply via email to