On Aug 2, 2013, at 10:38 AM, "Patrick W. Gilmore" <[email protected]> wrote:

> On Aug 02, 2013, at 09:37 , [email protected] wrote:
> 
>> I’m curious to know what other service providers are doing to 
>> alleviate/prevent ddos attacks from happening in your network.  Are you 
>> completely reactive and block as many addresses as possible or null0 traffic 
>> to the effected host until it stops or do you block certain ports to prevent 
>> them.  What’s the best way people are dealing with them?
> 
> #1: Ensure your network is BCP38 compliant.
> 
> Hard to complain about others attacking you when you are not clear. And if 
> you do not block source-address spoofing, you are not clean.
> 
> As for the rest, I'll let others with more recent experience explain what 
> they do.

We have had challenges with deploying BCP38, even on simple connections.  We 
have outstanding defects in IOS-XR that prevent us from deploying it.

Wherever possible we have enabled source address validation (bcp38).  I do have 
a map of some networks that don't do this as a result of the 
OpenResolverProject.org data.

Here's some top ASNs that can send spoofed packets:

  Count ASN
---------------
   1006 18747 
   1004 262824 
    877 196753 
    522 29119 
    516 5617 
    514 34977 
    513 47570 
    513 12615 
    512 262336 
    512 12301 
    372 6739 


These ASNs spoof my machine I use to send queries out to 8.8.8.8 and goole 
responds back to me.

Likely some firewall/CPE/NAT that does this, but the provider lets those 
spoofed packets reach outside their network to google.

I have many more of these if folks want to see a broader list.

If you look at the ASN relationships involved here, it means either 3491 or 
3257 allows these spoofed packets from 18747.

- Jared

Reply via email to