North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Source address validation (was Re: UUNet Offer New ProtectionAgainst DDoS)

  • From: Christopher L. Morrow
  • Date: Sun Mar 07 15:42:04 2004

On Sun, 7 Mar 2004, Laurence F. Sheldon, Jr. wrote:

>
> fingers wrote:
>
> > just a question
> >
> > why is DDoS the only issue mentioned wrt source address validation?
> >
> > i'm sure there's other reasons to make sure your customers can't send
> > spoofed packets. they might not always be as news-worthy, but i feel it's
> > a provider's duty to do this. it shouldn't be optional (talking
> > specifically about urpf on customer interfaces, loose where needed)
>
> Because _Distributed_ is the hot buzzword of the day.

and people offten seperate 'ddos' from 'dos', even though the end is the
same as far as your customer is concerned... it's kinda funny really :)

>
> At least one of us thinks clean traffic is a Good Thing all the time.
>
> Packets that can't possibley be used for anything ought to be dumped at
> the earliest possible opportunity as soon as it is apparent (or could
> be if anybody looked) that they are "from" addresses that can't be
> reached or have any other obviously fatal defect.

Here is a sticky point... There are reasons to allow 10.x.x.x sources to
transit a network. Mostly the reasons come back to 'broken' configurations
or 'broken' hardware. The reasons still equate to customer calls and
'broken' networking fromm their perspective. I think the thing you are
actually driving at is the 'intent' of the packet, which is quite tough
for the router to determine.



--Chris
(formerly [email protected])
#######################################################
## UUNET Technologies, Inc.                          ##
## Manager                                           ##
## Customer Router Security Engineering Team         ##
## (W)703-886-3823 (C)703-338-7319                   ##
#######################################################