UDP port 80 DDoS attack
Steve Bertrand
steve.bertrand at gmail.com
Mon Feb 6 03:40:19 UTC 2012
On 2012.02.05 22:30, Keegan Holley wrote:
> 2012/2/5 Steve Bertrand <steve.bertrand at gmail.com
> On 2012.02.05 20 <tel:2012.02.05%2020>:37, Keegan Holley wrote:
> Source RTBH often falls victim to rapidly changing or spoofed
> source IP"s.
> It also isn't as widely supported as it should be. I never said
> DDOS was
> hopeless, there just aren't a wealth of defenses against it.
>
>
> This is so very easily automated. Even if you don't actually want to
> trigger the routes automatically, finding the sources you want to
> blackhole is as simple as a monitor port, tcpdump and some basic Perl.
>
>
> This is still vulnerable to spoofing which could cause you to filter
> legitimate traffic and make the problem worse. Not saying that S/RTBH
> is a bad idea. RTBH is effective and a great idea just not very elegant.
Agreed. Diligence does play a role. However, the times I have
implemented and used (s/)RTBH, I thought it was most elegant. I love its
simplicity and effectiveness.
> ...and as far as this not having been deployed in many ISPs (per
> your next message)... their mitigation strategies should be asked up
> front, and if they don't have any (or don't know what you speak of),
> find a new ISP.
>
>
> You sometimes have to weigh the pro's and cons. You can't always pick
> the guys with the coolest knobs.
Agreed. But to me, DDOS mitigation is not just a cool knob. If my ISP
can help mitigate a 1Gb onslaught so my 100Mb pipe isn't overwhelmed,
that's more functional than cool. Ranks right up there with IPv6 ;)
Steve
More information about the NANOG
mailing list