Effective ways to deal with DDoS attacks?

LeBlanc, Jason Jml at ebay.com
Thu May 2 17:20:05 UTC 2002


It (rpf) can't stop a DoS, but it does cut down on some of the spoofed
packets, any reduction in the number of packets hitting whatever has to
filter or deal with the attack packets helps.  I don't have the stats in
front of me, but our findings were than urpf would cut enough out to be
worthwhile.

-----Original Message-----
From: Iljitsch van Beijnum [mailto:iljitsch at muada.com]
Sent: Thursday, May 02, 2002 9:58 AM
To: LeBlanc, Jason
Cc: nanog at merit.edu
Subject: RE: Effective ways to deal with DDoS attacks?



If you just filter out anything that's not in the routing table, that's
about half the address space and it only works if the spoofers are stupid.
When you're looking at pure bandwidth that's still helpful, but it doesn't
really solve anything.

However, You can use unicast RPF as a very efficient source address
filter, by routing addresses to the null interface. This way you can get
rid of huge amounts of unwanted sources in a very clean way.

As long as we're asking for features: what I would like is a unicast RPF
check that allows everything that isn't routed to the null interface. And
of course unicast RPF period for all vendors who aren't Cisco.



More information about the NANOG mailing list