Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 13:30, Ammar Zuberi wrote: I've done a lot of research into how these attacks actually work and most of them are done by kids who don't really know what they're doing. The really sad part is that in a huge of the cases we see, the attacks are hugely disproportionate - so

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
Is anyone maintaining a list of good, bad and ugly providers in terms of how seriously they take things they should like BCP38 and community support and whatever else that's quantifiable? - Mike Hammett Intelligent Computing Solutions http://www.ics-il.com - Original Message

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 20:50, Patrick W. Gilmore wrote: Push on your providers. Stop paying for transit from networks that do not filter ingress, put it in your RFPs, and reward those who do with contracts. Make it economically advantageous to fix the problem, and people will. Concur 100%.

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 20:07, Mike Hammett wrote: but I'd think that if their network's abuse department was notified, either they'd contact the customer about it issue or at least have on file that they were notified. Just because we think something, that doesn't make it true. ; The way to

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
Well there's going to be two sources of the attack... infested clients or machines setup for this purpose (usually in a datacenter somewhere). Enough people blackhole the attacking IPs, those IPs are eventually going to have a very limited view of the Internet. They may not care of it's a

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 20:46, Mike Hammett wrote: Enough people blackhole the attacking IPs, those IPs are eventually going to have a very limited view of the Internet. TCAMs have limits. Not all networks practice anti-spoofing. Not all networks have any visibility whatsoever into their

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
Why does it seem like everyone is trying to solve this the wrong way? Do other networks' abuse departments just not give a shit? Blackhole all of the zombie attackers and notify their abuse departments. Sure, most of the owners of the PCs being used in these scenarios have no idea they're

Re: DDOS solution recommendation

2015-01-11 Thread Patrick W. Gilmore
I agree with lots said here. But I've said for years (despite some people saying I am confused) that BCP38 is the single most important thing we can do to cut DDoS. No spoofed source means no amplification. It also stops things like Kaminsky DNS attacks. There is no silver bullet. Security is

Re: DDOS solution recommendation

2015-01-11 Thread Ca By
On Sun, Jan 11, 2015 at 5:07 AM, Mike Hammett na...@ics-il.net wrote: Why does it seem like everyone is trying to solve this the wrong way? Do other networks' abuse departments just not give a shit? Blackhole all of the zombie attackers and notify their abuse departments. Sure, most of the

Re: DDOS solution recommendation

2015-01-11 Thread Job Snijders
On Sun, Jan 11, 2015 at 08:46:40AM -0600, Mike Hammett wrote: Is anyone maintaining a list of good, bad and ugly providers in terms of how seriously they take things they should like BCP38 and community support and whatever else that's quantifiable? This list sheds some light on antispoofing

Re: DDOS solution recommendation

2015-01-11 Thread Ammar Zuberi
I’m stuck trying to find a virtual router environment that I can play with flowspec on. We do have some Juniper routers, but they are in production and I don’t think I want to touch flowspec on them just yet. Does anyone have any experience or any ideas here? Even openbgpd? On Jan 11, 2015,

Re: DDOS solution recommendation

2015-01-11 Thread Job Snijders
On Sun, Jan 11, 2015 at 09:58:12PM +0700, Roland Dobbins wrote: 2. Protect yourself by having your upstream police Police UDP to some baseline you are comfortable with. This will come back to haunt you, when the programmatically-generated attack traffic 'crowds out' the legitimate traffic

Re: DDOS solution recommendation

2015-01-11 Thread Dave Bell
Maybe try the Cisco CSR1000v. In the trial mode it won't give you a decent throughput, but should have all features enabled. On 11 January 2015 at 15:02, Ammar Zuberi am...@fastreturn.net wrote: I’m stuck trying to find a virtual router environment that I can play with flowspec on. We do have

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
To quote a presentation I heard at a conference regarding small routers, Buy bigger rooters, bitches. (Yes, I know it isn't that simple, but most of the audience at that conference had purchasing authority.) Not all networks are doing what they're supposed to be (I'm on that list), but if no

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 22:21, Mike Hammett wrote: I'm not saying what you're doing is wrong, I'm saying whatever the industry as a whole is doing obviously isn't working and perhaps a different approach is required. You haven't recommended anything new, and you really need to do some reading

Re: DDOS solution recommendation

2015-01-11 Thread Michael Hallgren
Le 11/01/2015 14:50, Patrick W. Gilmore a écrit : I agree with lots said here. But I've said for years (despite some people saying I am confused) that BCP38 is the single most important thing we can do to cut DDoS. No spoofed source means no amplification. It also stops things like Kaminsky

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 22:07, Job Snijders wrote: You can also consider adding CHARGEN and SSDP. People run all sorts of strange things on arbitrary ports - like VPNs, for example. It isn't that simple. --- Roland Dobbins rdobb...@arbor.net

Re: DDOS solution recommendation

2015-01-11 Thread Michael Hallgren
Le 11/01/2015 14:50, Patrick W. Gilmore a écrit : I agree with lots said here. But I've said for years (despite some people saying I am confused) that BCP38 is the single most important thing we can do to cut DDoS. No spoofed source means no amplification. It also stops things like Kaminsky

Re: DDOS solution recommendation

2015-01-11 Thread Pavel Odintsov
Hello! If you speaking about ISP filtering you should check your subnets and ASN here: https://radar.qrator.net I was really amazed amount of DDoS bots/amplificators in my network. On Sun, Jan 11, 2015 at 6:47 PM, Michael Hallgren m.hallg...@free.fr wrote: Le 11/01/2015 14:50, Patrick W.

Re: DDOS solution recommendation

2015-01-11 Thread Valdis . Kletnieks
On Sun, 11 Jan 2015 22:29:33 +0700, Roland Dobbins said: On 11 Jan 2015, at 22:21, Mike Hammett wrote: I'm not saying what you're doing is wrong, I'm saying whatever the industry as a whole is doing obviously isn't working and perhaps a different approach is required. You haven't

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
I didn't necessarily think I was shattering minds with my ideas. I don't have the time to read a dozen presentations. Blackhole them and move on. I don't care whose feelings I hurt. This isn't kindergarten. Maybe you should have tried a little harder to not get a virus in the first place.

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 20:52, Ca By wrote: 1. BCP38 protects your neighbor, do it. It's to protect yourself, as well. You should do it all the way down to the transit customer aggregation edge, all the way down to the IDC access layer, etc. 2. Protect yourself by having your upstream

Re: DDOS solution recommendation

2015-01-11 Thread Paul S.
There's the Cisco xRV too, should be decent for playing around with. On 1/12/2015 午前 12:08, Dave Bell wrote: Maybe try the Cisco CSR1000v. In the trial mode it won't give you a decent throughput, but should have all features enabled. On 11 January 2015 at 15:02, Ammar Zuberi

Re: DDOS solution recommendation

2015-01-11 Thread Phil Bedard
Many attacks can use spoofed source IPs, so who are you really blocking? That's why BCP38 as mentioned many times already is a necessary tool in fighting the attacks overall. Phil On 1/11/15, 4:33 PM, Mike Hammett na...@ics-il.net wrote: I didn't necessarily think I was shattering

Re: DDOS solution recommendation

2015-01-11 Thread Patrick W. Gilmore
I do love solutions which open larger attack surfaces than they are supposed to close. In the US, we call that a cure worse than the disease. Send packet from random bot with source of Google, Comcast, Akamai, etc. to Mr. Hammett's not-DNS / honeypot / whatever, and watch him close himself off

Re: Anyone from EPOCH Internet/MegaPath?

2015-01-11 Thread Courtney Smith
I'm seeing what appear to be old route objects with origin AS14558 on several other registries. I would recommend you review those and reach out to those registries while you are trying to find a Megapath contact. Maybe theres should be a world 'clean up IRR' day. Getting ARIN to wipe the

Anyone from EPOCH Internet/MegaPath?

2015-01-11 Thread Ammar Zuberi
Hi, The AS number we were assigned by ARIN (AS14558) was previously owned by DANDY and was in the EPOCH routing registry. We get conflicting route generations from IRR due to this, is there anyone that can contact me off-list and get this done or does anyone have any suggestions on how I can

Re: DDOS solution recommendation

2015-01-11 Thread Joel Maslak
On Sun, Jan 11, 2015 at 6:46 AM, Mike Hammett na...@ics-il.net wrote: You hit my honeypot IPs, blackholed for 30 days. You do a DNS request to my non-DNS servers, blackholed for 30 days. Same goes for NTP, mail, web, etc. You have more than say 5 bad login attempts to my mail server in 5

Re: DDOS solution recommendation

2015-01-11 Thread Patrick W. Gilmore
On Jan 11, 2015, at 15:28 , Colin Johnston col...@gt86car.org.uk wrote: unfortunately chinanet antispam/abuse email box is always full, after a while people block . always check arin/ripe for known good provider blocks and actively exclude from rules They aren't the only ones who never

Re: DDOS solution recommendation

2015-01-11 Thread Owen DeLong
On Jan 11, 2015, at 05:07 , Mike Hammett na...@ics-il.net wrote: Why does it seem like everyone is trying to solve this the wrong way? Because it’s what we CAN do. Do other networks' abuse departments just not give a shit? Blackhole all of the zombie attackers and notify their abuse

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
If that were to happen, it'd be for 30 days and it'd be whatever random residential account or APNIC address that was doing it. Not really a big loss. - Mike Hammett Intelligent Computing Solutions http://www.ics-il.com - Original Message - From: Patrick W. Gilmore

Re: DDOS solution recommendation

2015-01-11 Thread Pavel Odintsov
Hello! But abuse@ contacts is very-very-very hard way to contacting with ASN administrator in case of attack. Big amount of requests to #Nanog about please contact ASN noc with me offlist confirms this. I'm got multiple attacks from well known ISP and I spend about 10-20 hours to contacting

Re: DDOS solution recommendation

2015-01-11 Thread Patrick W. Gilmore
You are very confused about how the Internet works. Or did you not understand the words with source of? Wait, maybe you have some magic to tell the actual source of a packet than the 32/128 bits in the source field? Because if you do, you stand to make a few billion dollars, and I'll be one of

Re: DDOS solution recommendation

2015-01-11 Thread Stephen Fulton
peeringdb.com is usually quite accurate. -- Stephen On 2015-01-11 4:11 PM, Pavel Odintsov wrote: Hello! But abuse@ contacts is very-very-very hard way to contacting with ASN administrator in case of attack. Big amount of requests to #Nanog about please contact ASN noc with me offlist

Re: DDOS solution recommendation

2015-01-11 Thread Mike Hammett
I know that UDP can be spoofed, but it's not likely that the SSH, mail, etc. login attempts, web page hits, etc. would be spoofed as they'd have to know the response to be of any good. There's more going on than UDP spoofing\amplification. Frankly the most damaging thing to me has been SMTP

Re: DDOS solution recommendation

2015-01-11 Thread Grant Taylor
On 01/11/2015 03:22 PM, Mike Hammett wrote: I know that UDP can be spoofed, but it's not likely that the SSH, mail, etc. login attempts, web page hits, etc. would be spoofed as they'd have to know the response to be of any good. I encourage you to investigate Triangular Spamming.

Re: DDOS solution recommendation

2015-01-11 Thread Grant Taylor
On 01/11/2015 07:42 PM, Mark Andrews wrote: Just because you can only identify one of the two remotes doesn't mean that you can't report the addresses. It is involved in the communication stream. It is very difficult to make a case that the host with the spoofed IP address is attacking you

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 23:09, valdis.kletni...@vt.edu wrote: Sounds like RFC1925, section 4 should be top of the list? Indeed - as well as section 8. ; --- Roland Dobbins rdobb...@arbor.net

Re: DDOS solution recommendation

2015-01-11 Thread Mark Andrews
In message 54b31bbe.3000...@tnetconsulting.net, Grant Taylor writes: On 01/11/2015 03:22 PM, Mike Hammett wrote: I know that UDP can be spoofed, but it's not likely that the SSH, mail, etc. login attempts, web page hits, etc. would be spoofed as they'd have to know the response to be of

Re: DDOS solution recommendation

2015-01-11 Thread Damian Menscher
On Sun, Jan 11, 2015 at 5:07 AM, Mike Hammett na...@ics-il.net wrote: Blackhole all of the zombie attackers and notify their abuse departments. Sure, most of the owners of the PCs being used in these scenarios have no idea they're being used to attack people, but I'd think that if their

Re: DDOS solution recommendation

2015-01-11 Thread Roland Dobbins
On 11 Jan 2015, at 23:33, Mike Hammett wrote: I don't have the time to read a dozen presentations. Then just read one: https://app.box.com/s/r7an1moswtc7ce58f8gg Skip the screenshots entirely, if you want, and just read the textual slides at the beginning and the end.

Re: DDOS solution recommendation

2015-01-11 Thread Mark Andrews
In message 54b34a12.4000...@tnetconsulting.net, Grant Taylor writes: On 01/11/2015 07:42 PM, Mark Andrews wrote: Just because you can only identify one of the two remotes doesn't mean that you can't report the addresses. It is involved in the communication stream. It is very difficult

Recommended L2 switches for a new IXP

2015-01-11 Thread Manuel Marín
Dear Nanog community We are trying to build a new IXP in some US Metro areas where we have multiple POPs and I was wondering what do you recommend for L2 switches. I know that some IXPs use Nexus, Brocade, Force10 but I don't personally have experience with these switches. It would be great if