Re: I don't need no stinking firewall!

2010-01-10 Thread James Hess
On Fri, Jan 8, 2010 at 10:48 AM, Joe Greco jgr...@ns.sol.net wrote: Putting a stateful firewall in front of that would be dumb; the server is completely capable of coping with the superfluous SYN's in a much more competent manner than the firewall. The trouble with blanket statements about all

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 10, 2010, at 3:48 PM, James Hess wrote: Firewalls do not need to build a state entry for partial TCP sessions, there are a few different things that can be done, such as the firewall answering on behalf of the server (using SYN cookies) and negotiating connection with the server

Re: trying to analyze vispa isp outage

2010-01-10 Thread Raymond Dijkxhoorn
Hi! I have try to check BGP traffic behaviors related to recent VISPA ISP DDOS. For this task I have using BGplay and I need feedback about my analysis. If you are interested check http://extraexploit.blogspot.com/2010/01/trying-to-analyze-vispa-isp-outage_08.html Thank you for your attention.

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
Firewalls do a good job of protecting servers, when properly configured, because they are designed exclusively for the task. Their CAM tables, realtime ASICs and low latencies are very much unlike the CPU-driven, interrupt-bound hardware and kernel-locking, multi-tasking software on a

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
Spam filter your inbox on /CONFIDENTIALITY NOTICE.*intended recipient.*destroy.*copies/siand be done with it.The individual sender normally has no control over the matter, so their only two choices are: (a) Post with the notice, or (b) Don't post at all. Wow, are you implying

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
Actually that's not a great idea. A notice that the recipient is expected to handle information with unusual attention to confidentiality is required by law to stand out so that there isn't any ambiguity about the duties demanded of the recipient. Trade secret cases have been lost because a

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are designed to mitigate things like DDoS attacks. Modern

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Dobbins, Roland wrote: My employer's products don't compete with firewalls, they *protect* them; if anything, it's in my pecuniary interest to *encourage* firewall deployments, so said firewalls will fall down and need protection, heh. Nobody's disputing that Roland, or the fact that different

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are designed to mitigate things like DDoS attacks.

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Manolo Hernandez
From someone who mostly lerks but has been in network engineering operations biz for 17 years, the only OS that seems to always keel over under a ddos and need a firewall is windows. Linux in its current incarnation can handle a substantially larger attack before needing mitigation by firewall

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Valdis . Kletnieks
On Sun, 10 Jan 2010 08:19:27 PST, Roger Marquis said: Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are

Re: he.net down/slow?

2010-01-10 Thread Valdis . Kletnieks
On Sun, 10 Jan 2010 08:54:09 CST, Joe Greco said: The use of the words intended recipient are also extremely problematic; by definition, if it is addressed to me, I can be construed as being the intended recipient. If I then turn around and forward it to you, you are now also an intended

Re: I don't need no stinking firewall!

2010-01-10 Thread William Herrin
On Sun, Jan 10, 2010 at 3:48 AM, James Hess mysi...@gmail.com wrote:  there are a few different  things that can be done,  such as  the firewall answering on behalf of the server (using SYN cookies) and negotiating connection with the server after the final ACK. James, That's called a proxy

Re: I don't need no stinking firewall!

2010-01-10 Thread William Herrin
On Sun, Jan 10, 2010 at 12:47 PM, William Herrin b...@herrin.us wrote: Even if it does send an RST, most application developers aren't well enough versed in sockets programming to block on the shutdown and check the success status, Sorry, I got that wrong. shutdown() will succeed without

Re: he.net down/slow?

2010-01-10 Thread JC Dill
Joe Greco wrote: Spam filter your inbox on /CONFIDENTIALITY NOTICE.*intended recipient.*destroy.*copies/siand be done with it.The individual sender normally has no control over the matter, so their only two choices are: (a) Post with the notice, or (b) Don't post at all. Wow,

Re: I don't need no stinking firewall!

2010-01-10 Thread Joe Greco
On Fri, Jan 8, 2010 at 10:48 AM, Joe Greco jgr...@ns.sol.net wrote: Putting a stateful firewall in front of that would be dumb; the server is completely capable of coping with the superfluous SYN's in a much more competent manner than the firewall. The trouble with blanket statements

Re: he.net down/slow?

2010-01-10 Thread Joe Greco
On Sun, 10 Jan 2010 08:54:09 CST, Joe Greco said: The use of the words intended recipient are also extremely problematic; by definition, if it is addressed to me, I can be construed as being the intended recipient. If I then turn around and forward it to you, you are now also an intended

Re: I don't need no stinking firewall!

2010-01-10 Thread James Hess
On Sun, Jan 10, 2010 at 11:47 AM, William Herrin b...@herrin.us wrote: On Sun, Jan 10, 2010 at 3:48 AM, James Hess mysi...@gmail.com wrote:  there are a few different  things that can be done,  such as  the firewall answering on behalf of the server (using SYN cookies) and negotiating

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Dobbins, Roland
On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: The only thing you've said that is being disputed is the the claim that a firewall under a DDoS type of attack will fail before a server under the same type of attack. It's so obvious that well-crafted programmatically-generated attack

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 11, 2010, at 4:55 AM, James Hess wrote: I don't agree with You never need a proxy in front of a server, it's only there to fail. Again, reverse proxy *caches* are extremely useful in front of Web farms. Pure proxying makes no sense.

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Kevin Oberman
From: Dobbins, Roland rdobb...@arbor.net Date: Sun, 10 Jan 2010 21:56:38 + On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: The only thing you've said that is being disputed is the the claim that a firewall under a DDoS type of attack will fail before a server under the same

Re: I don't need no stinking firewall!

2010-01-10 Thread Michael K. Smith
On 1/9/10 10:32 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 10, 2010, at 1:22 PM, harbor235 wrote: Again, a firewall has it's place just like any other device in the network, defense in depth is a prudent philosophy to reduce the chances of compromise, it does not eliminate

RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
I certainly understand and agree with your position, in most cases, but there are some instances when a firewall serves an excellent purpose. As an example, we manage hundreds of heterogeneous servers where customers also have administrative access to the devices. As such, we can never be

Re: I don't need no stinking firewall!

2010-01-10 Thread Randy Bush
And I don't believe anyone is necessarily advocating exposing individual servers directly to the internet either. some of us do that takes all kinds :) randy

Re: I don't need no stinking firewall!

2010-01-10 Thread Brian Keefer
On Jan 10, 2010, at 5:40 PM, George Bonser wrote: And I don't believe anyone is necessarily advocating exposing individual servers directly to the internet either. Actually, some of us are. There are other devices that can handle isolation of the servers and protect them against such

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread jul
Martin Hannigan wrote on 05/01/10 16:50: I see two possible solutions: - Netflow/sFlow/***Flow feeding a BGP RTBH - Inline device - Outsource to service provider I want to add some stuff on this as I didn't see them with a quick check on the thread. Local solution always have a

RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
And I don't believe anyone is necessarily advocating exposing individual servers directly to the internet either. Actually, some of us are. That can be difficult to do when you have maybe 300 or 400 servers that handle one service. Let's say you have a site called www.foobar.com and you

Re: I don't need no stinking firewall!

2010-01-10 Thread Dobbins, Roland
On Jan 11, 2010, at 12:56 PM, George Bonser wrote: One would probably have a load balancer of some sort in front of those machines. That is the device that would be fielding any DoS. Yes, and as you've noted previously, it should be protected via stateless ACLs in hardware capable of

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Christopher Morrow
On Mon, Jan 11, 2010 at 12:26 AM, jul jul_...@yahoo.fr wrote: Martin Hannigan wrote on 05/01/10 16:50: I see two possible solutions: - Netflow/sFlow/***Flow  feeding a BGP RTBH - Inline device      - Outsource to service provider I want to add some stuff on this as I didn't see them with

RE: I don't need no stinking firewall!

2010-01-10 Thread George Bonser
I believe that these comments were more along the lines of 'servers can better handle this that stateful firewalls', not ruling out the use of load-balancers, reverse-proxy caches, etc. as appropriate. --- Roland Dobbins