Re: [j-nsp] DDoS to core interface - mitigation

2018-03-10 Thread Saku Ytti
Hey, We've always advertised externally all our PAs. But the links were not carried internally, so attack would be discarded at the edge. However if customer demanded that their link can reach internet, we would add /32 route for the CE end of the link. This would still not add attack surface to

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread Mark Tees
Do you mean the prefix that those PTP subnets were in was not advertised globally? So, those customers couldn’t use their side of the PTP link for internet’s? My problem is I can easily iACL stuff for core interfaces and loopbacks because I have moved that all to specific blocks but for PE-CE

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread Pierre Emeriaud
2018-03-09 15:48 GMT+01:00 : > > But I was actually referring to the very appealing idea you proposed in b) to > not to even advertise the range -so the DDoS traffic would not even end up at > your doorstep as simply the Internet would not have route for any of

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread adamv0025
> From: Saku Ytti [mailto:s...@ytti.fi] > Sent: Friday, March 09, 2018 2:39 PM > > On 9 March 2018 at 16:35, wrote: > > > > Regarding point b) > > That one might be cumbersome as IP for CE-PE links in the Internet VRF > > are usually allocated from either your

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread Saku Ytti
On 9 March 2018 at 16:35, wrote: > Regarding point b) > That one might be cumbersome as IP for CE-PE links in the Internet VRF are > usually allocated from either your own public address space (so you'd have > to fragment it and not advertising block used for

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread adamv0025
> Of Roland Dobbins > Sent: Friday, March 09, 2018 3:20 AM > > > On 9 Mar 2018, at 3:35, Saku Ytti wrote: > > > a) have edgeACL which polices ICMP and UDP high ports to your links > > and drops rest > > b) don't advertise your links in IGP or iBGP > > This. iACL plus no link advertisement

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread Gert Doering
Hi, On Fri, Mar 09, 2018 at 10:52:51AM +, James Bensley wrote: > In addition to the above, try to avoid use public IPs on internal > links if you can, they don't need to be reachable from the Internet > and it saves on IPv4 address space :) If you do so, ensure that ICMPs sent from these

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread James Bensley
On 8 March 2018 at 20:35, Saku Ytti wrote: > Hey Daniel, > > Apologies for not answering your question, but generally this is not a > problem, because: > > a) have edgeACL which polices ICMP and UDP high ports to your links > and drops rest > b) don't advertise your links in IGP or

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-09 Thread Daniel Suchy
Hi, yes - there's "advertise-inactive" option in BGP, which might help in such case (in combination with FIB filters): "The advertise-inactive statement causes Junos OS to advertise the best BGP route that is inactive because of IGP preference." You cannot modify preference of directly-connected

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-08 Thread Roland Dobbins
On 9 Mar 2018, at 3:35, Saku Ytti wrote: a) have edgeACL which polices ICMP and UDP high ports to your links and drops rest b) don't advertise your links in IGP or iBGP This. iACL plus no link advertisement (need a sound addressing plan to make both practical at scale). Here's a link to

Re: [j-nsp] DDoS to core interface - mitigation

2018-03-08 Thread Saku Ytti
Hey Daniel, Apologies for not answering your question, but generally this is not a problem, because: a) have edgeACL which polices ICMP and UDP high ports to your links and drops rest b) don't advertise your links in IGP or iBGP On 8 March 2018 at 22:17, Dan Římal wrote: >