Agree, this has to be done.

See also https://fe.nix.cz/en/  in Czech republic some ISP realized this
idea about 3 year ago. 

And see also some IP-Transit-Providers already have regional restricted
route propagation in their BGP community. 
https://www.gtt.net/services/internet-services/ip-transit/bgp-communities/ 

So in case of DDOS it need only to add this community to the propagated
network instead of black holing one address. 

Best regards 

Milan

TRENKA INFORMATIK AG 
_______________________
Seefeldstrasse 108
8008 Zürich
Tel: +41 44 383 63 07
mailto:[email protected]



-----Ursprüngliche Nachricht-----
Von: [email protected] [mailto:[email protected]]
Im Auftrag von Jeroen Massar
Gesendet: Samstag, 1. Oktober 2016 18:04
An: Fredy Kuenzler <[email protected]>; [email protected]
Betreff: Re: [swinog] DDOS >1Tbps - Swiss-wide (regional) BGP propagation?!

On 2016-10-01 16:51, Fredy Kuenzler wrote:
[..]
> To achieve this I think we need a collaborative community effort 
> setting up a common procedure and define a BGP communitiy with the 
> effect "do not announce beyond Switzerland".

Great initiative! If you need extra hands, don't hesitate to yell...

Did you btw see:
 http://www.trustednetworksinitiative.nl/
 https://www.nl-ix.net/solutions/security-solutions/trusted-routing
 https://ams-ix.net/technical/trusted-networks-initiative

We should have a Swiss equivalent:
 - trusted and direct contacts
 - require BCP38 where possible
 - proper statistics/monitoring
 - proper & standardized "You are DDoS'ing" notifications
   providing Flow info as "proof".
 - proper & standardized "We put customer in walled garden"

The problem with the latter: VoIP... thus the walled garden needs to not
block that due to "emergency services". Thus a throttle and a call to the
customer might be needed to inform them...


As for the BGP thing... I thought folks had a deal like that per default for
all their prefixes :)

It is after all the reason why quite a few IRC servers live(d) in PI
/24....:
 - always the prefix to local peers
 - when 'normal' also announce to transit providers

When DDoS comes:
 - stop announcing to transits
 - check monitoring/stats tools which local peers are sending crap
   traffic and kick them hard

Now, the more important part is actually that:
 - You have good relationship with your transit
 - You have amazing relationship with your local peers:
   so that you can call them and notify them of the problem
 - Have proper instrumentation

Of course, when you have that, you might also want to peek at:
 - RPF / BCP38 kinda stuff and 'force' or 'require' that from your peers
   thus avoiding any spoofed traffic from them.

Not that BCP38 actually solves anything for these DDoS's as there are just
thousands of botted devices involved...

Proper flows everywhere, proper notification and shutdowns at the source are
the only way to go there.

And that will involve people calling helpdesks because:
 - their botted host is sending too much traffic
   making "The Internet Slow" and them complaining
 - they are disconnected, as you caught them participating.

Which might not fly with management in many places as helpdesk == money.

Hence, maybe to cover that at least, having a admin.ch rule, BAKOM maybe,
that allows an ISP to "restrict access", eg wall-garden an endpoint that is
causing DDOS attack would be a good thing.

Though, does not have to go that high actually, having a general consensus
between ISPs that this is the case and putting it in the end-user agreement
could be good enough to cover their ass a bit.

Greets,
 Jeroen



_______________________________________________
swinog mailing list
[email protected]
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
swinog mailing list
[email protected]
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog

Antwort per Email an