North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Effective ways to deal with DDoS attacks?

  • From: LeBlanc, Jason
  • Date: Thu May 02 13:28:32 2002

It (rpf) can't stop a DoS, but it does cut down on some of the spoofed
packets, any reduction in the number of packets hitting whatever has to
filter or deal with the attack packets helps.  I don't have the stats in
front of me, but our findings were than urpf would cut enough out to be
worthwhile.

-----Original Message-----
From: Iljitsch van Beijnum [mailto:[email protected]]
Sent: Thursday, May 02, 2002 9:58 AM
To: LeBlanc, Jason
Cc: [email protected]
Subject: RE: Effective ways to deal with DDoS attacks?



If you just filter out anything that's not in the routing table, that's
about half the address space and it only works if the spoofers are stupid.
When you're looking at pure bandwidth that's still helpful, but it doesn't
really solve anything.

However, You can use unicast RPF as a very efficient source address
filter, by routing addresses to the null interface. This way you can get
rid of huge amounts of unwanted sources in a very clean way.

As long as we're asking for features: what I would like is a unicast RPF
check that allows everything that isn't routed to the null interface. And
of course unicast RPF period for all vendors who aren't Cisco.