Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Hank Nussbacher
On Mon, 11 Jan 2010, jul wrote: Known leader of the clean-pipe solution is Prolexic http://www.prolexic.com/ Akamai and Verisign also tries to go on this market http://www.akamai.com/security (through CDN) http://www.verisign.com/internet-defense-network/index.html Indeed, these 3 also ended

RE: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Stefan Fouant
-Original Message- From: Hank Nussbacher [mailto:h...@efes.iucc.ac.il] Sent: Monday, January 11, 2010 4:40 AM To: jul Cc: NANOG Subject: Re: D/DoS mitigation hardware/software needed. On Mon, 11 Jan 2010, jul wrote: Known leader of the clean-pipe solution is Prolexic http

RE: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Stefan Fouant
-Original Message- From: Christopher Morrow [mailto:morrowc.li...@gmail.com] Sent: Monday, January 11, 2010 2:05 AM On Mon, Jan 11, 2010 at 12:26 AM, jul jul_...@yahoo.fr wrote: Martin Hannigan wrote on 05/01/10 16:50: Outsourced services have higher cost than Arbor but can

Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Rick Ernst
I thought I had mentioned outsourcing earlier, but I don't see it in the thread... The two mechanisms I've seen for outsources D/DoS are DNS manipulation, or essentially remote BGP peering with an tunnel back to the local presence. Even if we are purely hosting, DNS manipulation doesn't do

RE: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Stefan Fouant
-Original Message- From: Rick Ernst [mailto:na...@shreddedmail.com] Sent: Monday, January 11, 2010 10:39 AM To: NANOG Subject: Re: D/DoS mitigation hardware/software needed. As a service-provider/data-center, it seems like outsourcing would be either ineffective and/or removes

Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Christopher Morrow
On Mon, Jan 11, 2010 at 9:33 AM, Stefan Fouant sfou...@shortestpathfirst.net wrote: -Original Message- From: Christopher Morrow [mailto:morrowc.li...@gmail.com] Sent: Monday, January 11, 2010 2:05 AM On Mon, Jan 11, 2010 at 12:26 AM, jul jul_...@yahoo.fr wrote: Martin Hannigan wrote

RE: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Stefan Fouant
] On Behalf Of Christopher Morrow Sent: Monday, January 11, 2010 12:49 PM To: Stefan Fouant Cc: jul; NANOG Subject: Re: D/DoS mitigation hardware/software needed. On Mon, Jan 11, 2010 at 9:33 AM, Stefan Fouant sfou...@shortestpathfirst.net wrote: -Original Message- From: Christopher

Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Christopher Morrow
On Mon, Jan 11, 2010 at 1:12 PM, Stefan Fouant sfou...@shortestpathfirst.net wrote: Precisely - I was saying that in order to add more point to your argument. I wasn't disagreeing with you :) i need more coffee :( thanks! -Chris

Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Rick Ernst
[mailto:na...@shreddedmail.com] Sent: Monday, January 11, 2010 10:39 AM To: NANOG Subject: Re: D/DoS mitigation hardware/software needed. As a service-provider/data-center, it seems like outsourcing would be either ineffective and/or removes the big red button in case of trouble. Am

Re: D/DoS mitigation hardware/software needed.

2010-01-11 Thread jul
Stefan Fouant wrote on 11/01/10 14:45: If anyone is interested, I did pretty exhaustive research into the Service Provider marketplace last summer (before Verisign came out with their VIDN). I've got some slides which outline the costs, mitigation capacity, etc. of many different providers.

RE: D/DoS mitigation hardware/software needed.

2010-01-11 Thread Stefan Fouant
[mailto:jul_...@yahoo.fr] Sent: Monday, January 11, 2010 4:58 PM To: Stefan Fouant Cc: 'Hank Nussbacher'; 'NANOG' Subject: Re: D/DoS mitigation hardware/software needed. Stefan Fouant wrote on 11/01/10 14:45: If anyone is interested, I did pretty exhaustive research into the Service

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
Firewalls do a good job of protecting servers, when properly configured, because they are designed exclusively for the task. Their CAM tables, realtime ASICs and low latencies are very much unlike the CPU-driven, interrupt-bound hardware and kernel-locking, multi-tasking software on a

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are designed to mitigate things like DDoS attacks. Modern

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Roger Marquis
Dobbins, Roland wrote: My employer's products don't compete with firewalls, they *protect* them; if anything, it's in my pecuniary interest to *encourage* firewall deployments, so said firewalls will fall down and need protection, heh. Nobody's disputing that Roland, or the fact that different

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Joe Greco
Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are designed to mitigate things like DDoS attacks.

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Manolo Hernandez
2010 08:55:13 To: nanog@nanog.org Subject: Re: D/DoS mitigation hardware/software needed. Dobbins, Roland wrote: My employer's products don't compete with firewalls, they *protect* them; if anything, it's in my pecuniary interest to *encourage* firewall deployments, so said firewalls will fall

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Valdis . Kletnieks
On Sun, 10 Jan 2010 08:19:27 PST, Roger Marquis said: Then you need to get rid of that '90's antique web server and get something modern. When you say interrupt-bound hardware, all you are doing is showing that you're not familiar with modern servers and quality operating systems that are

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Dobbins, Roland
On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: The only thing you've said that is being disputed is the the claim that a firewall under a DDoS type of attack will fail before a server under the same type of attack. It's so obvious that well-crafted programmatically-generated attack

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Kevin Oberman
From: Dobbins, Roland rdobb...@arbor.net Date: Sun, 10 Jan 2010 21:56:38 + On Jan 10, 2010, at 11:55 PM, Roger Marquis wrote: The only thing you've said that is being disputed is the the claim that a firewall under a DDoS type of attack will fail before a server under the same

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread jul
Martin Hannigan wrote on 05/01/10 16:50: I see two possible solutions: - Netflow/sFlow/***Flow feeding a BGP RTBH - Inline device - Outsource to service provider I want to add some stuff on this as I didn't see them with a quick check on the thread. Local solution always have a

Re: D/DoS mitigation hardware/software needed.

2010-01-10 Thread Christopher Morrow
On Mon, Jan 11, 2010 at 12:26 AM, jul jul_...@yahoo.fr wrote: Martin Hannigan wrote on 05/01/10 16:50: I see two possible solutions: - Netflow/sFlow/***Flow  feeding a BGP RTBH - Inline device      - Outsource to service provider I want to add some stuff on this as I didn't see them with

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Łukasz Bromirski
On 2010-01-05 03:17, Tim Eberhard wrote: Kinda funny you state that Roland. I know of at least two very large carriers that uses Netscreens (and soon SRX's) for their DoS/DDoS mitigation. You mean Juniper SRX? The biggest box is a 5800, and it can handle up to 350k new sessions each second, up

RE: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Stefan Fouant
-Original Message- From: Łukasz Bromirski [mailto:luk...@bromirski.net] Sent: Saturday, January 09, 2010 6:11 AM You mean Juniper SRX? The biggest box is a 5800, and it can handle up to 350k new sessions each second, up to maximum of 10 million (let's skip the fact that it's not

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 9, 2010, at 9:57 PM, Stefan Fouant wrote: Firewalls do have their place in DDoS mitigation scenarios, but if used as the ultimate solution you're asking for trouble. In my experience, their role is to fall over and die, without exception. I can't imagine what possible use a stateful

RE: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Stefan Fouant
-Original Message- From: Dobbins, Roland [mailto:rdobb...@arbor.net] Sent: Saturday, January 09, 2010 10:03 AM On Jan 9, 2010, at 9:57 PM, Stefan Fouant wrote: Firewalls do have their place in DDoS mitigation scenarios, but if used as the ultimate solution you're asking for

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Jeffrey Lyon
We should circle up one day, I would love to provide you with some new experiences. There is no sense in chalk talking it, too often I also disagree with new ideas until I see them in action. Best regards, Jeff On Sat, Jan 9, 2010 at 10:03 AM, Dobbins, Roland rdobb...@arbor.net wrote: In my

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 10, 2010, at 12:57 AM, Jeffrey Lyon wrote: I would love to provide you with some new experiences. I get new experiences of this type and plenty of new ideas every day, thanks. ; --- Roland Dobbins rdobb...@arbor.net

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Roger Marquis
Dobbins, Roland wrote: Firewalls do have their place in DDoS mitigation scenarios, but if used as the ultimate solution you're asking for trouble. In my experience, their role is to fall over and die, without exception. That hasn't been my experience but then I'm not selling anything that

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 10, 2010, at 9:03 AM, Roger Marquis wrote: That hasn't been my experience but then I'm not selling anything that might have a lower ROI than firewalls, in small to mid-sized installations. I loudly evinced this position when I worked for the world's largest firewall vendor, so that

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Roger Marquis
Dobbins, Roland wrote: Firewalls are not designed to mitigate large scale DDoS, unlike Arbors, but they do a damn good job of mitigating small scale attacks of all kinds including DDoS. Not been my experience at all - quite the opposite. Ok, I'll bite. What firewalls are you referring to?

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 10, 2010, at 10:05 AM, Roger Marquis wrote: Ok, I'll bite. What firewalls are you referring to? Hardware-based commercial firewalls from the major vendors, open-source/DIY, and anything in between. All stateful firewalls ever made, period (as discussed previously in the thread).

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Christopher Morrow
On Sat, Jan 9, 2010 at 10:21 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 10, 2010, at 10:05 AM, Roger Marquis wrote: Have you noticed how easily Drupal servers go down with corrupt MyISAM tables?  How would S/RTBH and/or flow-spec protect against that? We're talking about DDoS

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 10, 2010, at 10:33 AM, Christopher Morrow wrote: separate the portions of the pie... only let the attack break the minimal portion of your deployment. Use the right tool in the right place. An excellent point. A Web front-end server should be that - merely the front-end.

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Roger Marquis
Dobbins, Roland wrote: See here for a high-profile example: http://files.me.com/roland.dobbins/k54qkv Reads like a sales pitch to me. No apples to apples comparisons, nothing like an ANOVA of PPS, payload sizes, and other vectors across different types of border defenses. Your presentation

RE: D/DoS mitigation hardware/software needed.

2010-01-09 Thread George Bonser
Firewalls are not designed to mitigate large scale DDoS, Generally speaking, if it didn't being the firewall to its knees, it wasn't a DoS. It was just sort of an annoying attempt at a DoS. I think that more or less the definition of a DoS is one that exploits the resource limitations of

Re: D/DoS mitigation hardware/software needed.

2010-01-09 Thread Dobbins, Roland
On Jan 10, 2010, at 1:27 PM, Roger Marquis wrote: Reads like a sales pitch to me. My employer's products don't compete with firewalls, they *protect* them; if anything, it's in my pecuniary interest to *encourage* firewall deployments, so said firewalls will fall down and need protection,

Re: D/DoS mitigation hardware/software needed.

2010-01-06 Thread Hank Nussbacher
At 13:19 05/01/2010 +, Rob Shakir wrote: If you're an SP who has some existing NetFlow solution, and don't really justify a spend for traffic intelligence within your network (or have something home-grown), is there an alternative scrubber that one might be able to use in a more

Re: D/DoS mitigation hardware/software needed.

2010-01-06 Thread Graeme Fowler
On Wed, 2010-01-06 at 17:00 +0200, Hank Nussbacher wrote: In that case, how do you run your current service: http://www.vialtus.com/en/Solutions/Hosting-and-Datacentre-Services/Security-Solutions/Distributed-Denial-of-Service-Protection.aspx It says how, right on that page. Not Arbor. Graeme

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Florian Weimer
* Adrian Chadd: Has anyone deployed a DDoS distributed enough to inject ETOOMANY routes into the hardware forwarding tables of routers? I think this is called injecting the BGP table into your IGP, and quite a few folks have done it. Nobody claimed that it was an act of sabotage, though. --

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Darren Bolding
I know of several companies, with large websites, that used code reviews as at least one way they met this DSS requirement. So, erm, empirically denied. The PCI DSS does not require code review of the software running in COTS equipment, nor of underlying OS's or applications. It requires a code

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Steve Bertrand
Adrian Chadd wrote: On Tue, Jan 05, 2010, Dobbins, Roland wrote: None of the large, well-known Web properties on the Internet today - at least, the ones which stay up and running, heh - have stateful firewalls in front of them. Including prominent vendors of said stateful firewall

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Darren Bolding
Comments inline. To reiterate- my entire point is that stateful firewalls are at least sometimes useful in front of large websites. Something of a veer off of the original topic, but not an at all useless exercise IMHO. On Mon, Jan 4, 2010 at 11:47 PM, Dobbins, Roland rdobb...@arbor.net wrote:

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Darren Bolding
My basis for this is discussions with PCI assessors from multiple firms that perform large numbers of assessments per year. Next time I run into some, I'll ask to see if the usage has increased, its been a few months since I asked this of any of them. --D On Tue, Jan 5, 2010 at 1:02 AM,

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Dobbins, Roland
On Jan 5, 2010, at 5:04 PM, Darren Bolding wrote: To reiterate- my entire point is that stateful firewalls are at least sometimes useful in front of large websites. I understand completely; I simply disagree, stating my reasons for doing so in detail inline. It's my contention that under

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Rob Shakir
(Resent, sorry for multiple copies -- I messed up from From: address) On 5 Jan 2010, at 06:16, Stefan Fouant wrote: That said, what are all those ISPs doing now that Cisco has stopped developing the Guard? Well of course, moving to Arbor haha... eased in part by a little Cisco initiative

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Jeffrey Lyon
My somewhat educated opinion on the matter is that appliance developers want to sit on the edge and see all your traffic merely to protect their own interests and market share. NS-5000s have been good to us for bulk filtering and we rely on appliances for more intelligent inspection. Dollar for

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Dobbins, Roland
On Jan 5, 2010, at 9:59 PM, Jeffrey Lyon wrote: My somewhat educated opinion on the matter is that appliance developers want to sit on the edge and see all your traffic merely to protect their own interests and market share. This isn't generally a smart approach; the value of providing

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Martin Hannigan
On Mon, Jan 4, 2010 at 4:19 PM, Rick Ernst na...@shreddedmail.com wrote: Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned several times but they haven't been responsive to literature requests (hint, if anybody from Arbor is looking...). Our current upstream is 3x

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Rick Ernst
I looked at one of the suggested out-sourced providers. Based on a sample size of 1, the mitigating mechanisms are DNS redirection and BGP/tunneling. While both of these solutions may be useful for an end-user (even large ones), I don't see them fitting in an SP environment. If something goes

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread Dobbins, Roland
On Jan 5, 2010, at 9:44 PM, Rob Shakir wrote: If you're an SP who has some existing NetFlow solution, and don't really justify a spend for traffic intelligence within your network (or have something home-grown), is there an alternative scrubber that one might be able to use in a more

Re: D/DoS mitigation hardware/software needed.

2010-01-05 Thread John Kristoff
On Tue, 5 Jan 2010 04:20:51 + Dobbins, Roland rdobb...@arbor.net wrote: S/RTBH and/or flow-spec are great DDoS mitigation tools which don't require any further investment beyond the network infrastructure an operator has already purchased and deployed. These should be the first

D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned several times but they haven't been responsive to literature requests (hint, if anybody from Arbor is looking...). Our current upstream is 3x GigE from 3 different providers, each landing on their own BGP endpoint feeding

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
We have substantial direct experience with both RioRey and IntruGuard. RR is more plug and play while IG is more robust but both are great. Use a robust firewall such as a Netscreen in front of your mitigation tool. Best regards, Jeff On Mon, Jan 4, 2010 at 4:19 PM, Rick Ernst

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Raj Singh
To: NANOG Subject: D/DoS mitigation hardware/software needed. Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned several times but they haven't been responsive to literature requests (hint, if anybody from Arbor is looking...). Our current upstream is 3x GigE from 3 different

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
Several responses already, and Arbor has poked their head up. I'm going to start there and keep the other suggestions at-hand. Thanks, On Mon, Jan 4, 2010 at 1:19 PM, Rick Ernst na...@shreddedmail.com wrote: Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
Ask them if they'd come down to $10 - 20k for a full featured model and they might make two sales, although I doubt it unfortunately. Best regards, Jeff On Mon, Jan 4, 2010 at 4:59 PM, Rick Ernst na...@shreddedmail.com wrote: Several responses already, and Arbor has poked their head up. I'm

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a Netscreen in front of your mitigation tool. Absolutely not - the firewall will fall over due to state-table exhaustion before the mitigation system will. Firewalls (which have no place in front of servers in

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Tim Eberhard
Kinda funny you state that Roland. I know of at least two very large carriers that uses Netscreens (and soon SRX's) for their DoS/DDoS mitigation. State table exhaustion on the netscreen platform is something that is very easy to protect against with some protections and hasn't been a problem for

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread jim deleskie
What Roland said, I've seen people do this, no rules in place, still was able to kill the box (firewall) with a single CPU server. -jim On Mon, Jan 4, 2010 at 10:04 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread kowsik
If you want to recreate D/DoS from captures (for testing purposes) you might want to check out: http://www.pcapr.net/dos This lets you validate how your mitigation solutions are holding up. K. On Mon, Jan 4, 2010 at 1:19 PM, Rick Ernst na...@shreddedmail.com wrote: Looking for D/DoS

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 9:17 AM, Tim Eberhard wrote: I would argue that firewalls place is in fact directly infront of servers and load balancers to protect them. The very idea of placing a stateful firewall in front of a Web/DNS/email/etc. server, in which *every single incoming packet is

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Adrian Chadd
On Tue, Jan 05, 2010, Dobbins, Roland wrote: None of the large, well-known Web properties on the Internet today - at least, the ones which stay up and running, heh - have stateful firewalls in front of them. Including prominent vendors of said stateful firewall solutions. But as you

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
We have such a configuration in progress, it works great without any of the issues you're proposing. Jeff On Jan 4, 2010 9:09 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a Netscreen in fro... Absolutely not - the

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 8:36 AM, Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: We have such a configuration in progress, it works great without any of the issues you're proposing. So .. this is interesting. The firewall would have to frontend your mail / web / whatever application .. and if

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:14 AM, Dobbins, Roland wrote: If it's a stateful firewall, and state-tracking is turned on, it's quite possible to craft sufficient pathological traffic which conforms to the firewall policies and yet which leads to state-table inspection. That should read

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:06 AM, Jeffrey Lyon wrote: We have such a configuration in progress, it works great without any of the issues you're proposing. Then you aren't testing it to destruction, heh. ; If it's a stateful firewall, and state-tracking is turned on, it's quite possible to

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
Two more options. And for Netflow device - read that to mean Arbor or its competitors. 5 Ditch the stateful firewall and exclusively use a netflow device 6. Outsource to a hosted DDoS mitigation service (Prolexic etc) On Tue, Jan 5, 2010 at 8:43 AM, Suresh Ramasubramanian ops.li...@gmail.com

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:18 AM, Suresh Ramasubramanian wrote: 5 Ditch the stateful firewall and exclusively use a netflow device NetFlow analysis is very useful for network visibility, and detection/classification/traceback. There are both open-source and commercial NetFlow collection and

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Christopher Morrow
On Mon, Jan 4, 2010 at 9:18 PM, jim deleskie deles...@gmail.com wrote: What Roland said, I've seen people do this, no rules in place, still was able to kill the box (firewall) with a single CPU server. not to pile on, but... +1 to roland here as well. I've seen more than enough folks put in a

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
1. We have multiple nodes conducting DDoS scrubbing, one failing would not be catastrophic. 2. Indeed. 3. Sort of, such devices are downstream for extremely valid reasons I won't get into now. 4. Indeed, were equipped to handle substantially higher than 150kpps. I'm sure Arbor is really neat

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Bill Blackford
A lot of this has to do with scaling the environment. I've had plenty of asa's and even netscreens fall over from state-table and session limitations. I've also seen a hosts fill up the connection table prior to a firewall being affected. I'm not familiar with the specs and anyone can chime in,

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
With these safeguards in place - and with flow devices being part of the mix somewhere .. what you propose is quite reasonable. There's still the question of whether an application that receives a lot of new / untrusted traffic - a mail or web server - would benefit from having a stateful

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:05 AM, Jeffrey Lyon wrote: I'm sure Arbor is really neat but I disagree that any DDoS appliance is a standalone solution. I disagree with this proposition, too. S/RTBH and/or flow-spec are great DDoS mitigation tools which don't require any further investment beyond

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Christopher Morrow
On Mon, Jan 4, 2010 at 11:20 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 11:05 AM, Jeffrey Lyon wrote: I'm sure Arbor is really neat but I disagree that any DDoS appliance is a standalone solution. I disagree with this proposition, too. S/RTBH and/or flow-spec are

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:41 AM, Christopher Morrow wrote: (note I think Roland may have been party to some of the presenations I linked in this... Yes, sir, and thanks for posting those links! You and Barry and Tim Battles and Sean Donelan and Danny McPherson and Don Smith and Steve Bellovin

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:35 AM, Rick Ernst na...@shreddedmail.com wrote: I'm interested in seeing products (including software) that already have the development (anomaly detection, trends/reports, etc.)  work done so I can spend my cycles elsewhere. This might fit the bill -

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:05 PM, Rick Ernst wrote: A solution preferably that integrates with NetFlow and RTBH. An in-line solution obviously requires an appliance, or at least special/additional hardware. The key is to not be inline all the time, but only inline *when needed*. This

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
On Mon, Jan 4, 2010 at 9:08 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 12:05 PM, Rick Ernst wrote: A solution preferably that integrates with NetFlow and RTBH. An in-line solution obviously requires an appliance, or at least special/additional hardware. The key

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:38 AM, Dobbins, Roland rdobb...@arbor.net wrote: Additional mitigation would be  via manual or automatic RTBH or security/abuse@ involvement with upstreams. Automagic is generally bad, as it can be gamed. ... and manual wont scale in ddos -- Suresh

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Christopher Morrow [mailto:morrowc.li...@gmail.com] Sent: Monday, January 04, 2010 11:41 PM The original poster seemed to be asking about appliance based solutions, so your pointed remarks about Roland aside he was actually answering the question. I wonder

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:19 PM, Suresh Ramasubramanian wrote: ... and manual wont scale in ddos Actually, it can and does. ; I'm referring to the employment and selection of situationally-appropriate tools, mind. The tools themselves must of necessity perform their work in a largely

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:19 PM, Rick Ernst wrote: I'd argue just the opposite. If your monitoring/mitigation system changes dependent on the situation (normal vs under attack), you are adding complexity to the system. What mode is the system in right now? Is this customer having

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Rick Ernst [mailto:na...@shreddedmail.com] Sent: Tuesday, January 05, 2010 12:19 AM I'd argue just the opposite. If your monitoring/mitigation system changes dependent on the situation (normal vs under attack), you are adding complexity to the system.

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:52 AM, Dobbins, Roland rdobb...@arbor.net wrote: I'm referring to the employment and selection of situationally-appropriate tools, mind.  The tools themselves must of necessity perform their work in a largely automated fashion once they're employed, which is what I

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Adrian Chadd
On Tue, Jan 05, 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an offramp method. These devices perform a lot better when you can forward just the subset of the traffic through as opposed to

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
I think you, Roland, and I are all agreeing on the same argument. The (my) confusion entered with the statement of, The key is to not be inline all the time, but only inline *when needed*. I inferred a topological or physical path change from that. Redirecting traffic (which is really just an

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Suresh Ramasubramanian [mailto:ops.li...@gmail.com] Sent: Tuesday, January 05, 2010 12:19 AM On Tue, Jan 5, 2010 at 10:38 AM, Dobbins, Roland rdobb...@arbor.net wrote: Additional mitigation would be via manual or automatic RTBH or security/abuse@

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Adrian Chadd wrote: I mean, I assume that there's checks and balances in place to limit then number of routes being injected into the network so one doesn't overload the tables, but what's the behaviour if/when this limit is reached? Does mitigation cease being

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Stefan Fouant wrote: The trick is to try to automate as much around the process as possible - I've worked in environments where just making little changes to incident handling response methods reduced the time to mitigate an attack from hours to minutes, all

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Rick Ernst wrote: I think you, Roland, and I are all agreeing on the same argument. GMTA. ; --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com Injustice is relatively easy

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:57 AM, Dobbins, Roland wrote: You and Barry and Tim Battles and Sean Donelan and Danny McPherson and Don Smith and Steve Bellovin and Jared Mauch and John Kristoff and a lot of other folks too numerous to mention . . . including Paul Vixie, Darrel Lewis, Ryan

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Hank Nussbacher
On Tue, 5 Jan 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an offramp method. These devices perform a lot better when you can forward just the subset of the traffic through as opposed to

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Hank Nussbacher [mailto:h...@efes.iucc.ac.il] Sent: Tuesday, January 05, 2010 1:02 AM On Tue, 5 Jan 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Darren Bolding
I actually agree with most of this, but want to correct a clearly inadvertent error below, and make a couple of points. PCI DSS does not require a Web application firewall. It requires that OR an independent audit of all code within PCI scope by a third party. If a WAF is used, it only need be

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 2:38 PM, Darren Bolding wrote: * Defense in depth. You've never had a host that received external traffic ever accidentally have iptables or windows firewall turned off? Even when debugging a production outage or on accident? Again, policy should be enforced via

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 2:38 PM, Darren Bolding wrote: PCI DSS does not require a Web application firewall. http://searchsoftwarequality.techtarget.com/news/article/0,289142,sid92_gci1313797,00.html Since no business is going to allow an external 'code review' (if it's even possible, given that