On 10/02/14 08:37, Roland Dobbins wrote:
> On Oct 2, 2014, at 7:16 PM, Alain Hebert <[email protected]> wrote:
>
>>    BCP38 compliance is the exception not the norm.
> I'm not sure that's actually the case, practically-speaking.
>
> NAT is an awful thing for many reasons, and it's negative in terms of its 
> overall impact on security, but there's one actual benefit from it; it is 
> effectively a form of anti-spoofing.
>
> The prevalence of NAT on consumer broadband access networks means that those 
> networks do not generally emit spoofed packets.  The same goes for many SME 
> networks, even though they oughtn't to be running NAT in front of their 
> servers.
    You are right on that point, I keep forgetting about the little man :(

    My mindset was set on DDoS and not C&C/SPAM/etc.
> My guess is that the majority, if not all, of the reflection/amplification 
> attacks we see are actually initiated from servers under the control of 
> attackers and residing on hosting/co-location IDC networks which don't 
> enforce anti-spoofing at the access, distribution, or peering/transit 
> portions of their topologies.  Some of these servers are tied into so-called 
> 'booter' systems, whereas others are linked into more conventional C&C under 
> the direct control of attackers, while still others are utilized to launch 
> attacks 'by hand', as it were.
   
    We had the same experience where you get a 1Mbps steam of DDoS
amplification start on the 15th and end abruptly on the 30th at 23h55m
(CC report cycle/reject is often around 15 days).  Then on the 5th and
end 15 days later... for a few month in a row.
   
> Those networks are unmanaged and are likely to remain so (or are so-called 
> 'bulletproof' networks catering to criminals).  Their peers/upstream transits 
> likewise are not enforcing anti-spoofing on ingress, nor are they monitoring 
> traffic originating from these networks as it ingresses their own networks 
> (and in any event, the traffic volume of the spoofed packets on the attack 
> source - reflector/amplifier leg is relatively small).
>
> So, the problem is that those networks which are likely to implement the 
> various topologically-appropriate at the various edges of their network are 
> likely to have done so.  And by definition, the endpoint networks where the 
> spoofed traffic originates aren't likely to do so, nor are their immediate 
> peers/upstream transits - or they would've done so long ago. 
>
> ----------------------------------------------------------------------
> Roland Dobbins <[email protected]> // <http://www.arbornetworks.com>
>
>                    Equo ne credite, Teucri.
>
>                         -- Laocoön

Reply via email to