Source address validation (was Re: UUNet Offer New Protection Against DDoS)

Christopher L. Morrow christopher.morrow at mci.com
Sun Mar 7 20:35:54 UTC 2004



On Sun, 7 Mar 2004, Laurence F. Sheldon, Jr. wrote:

>
> fingers wrote:
>
> > just a question
> >
> > why is DDoS the only issue mentioned wrt source address validation?
> >
> > i'm sure there's other reasons to make sure your customers can't send
> > spoofed packets. they might not always be as news-worthy, but i feel it's
> > a provider's duty to do this. it shouldn't be optional (talking
> > specifically about urpf on customer interfaces, loose where needed)
>
> Because _Distributed_ is the hot buzzword of the day.

and people offten seperate 'ddos' from 'dos', even though the end is the
same as far as your customer is concerned... it's kinda funny really :)

>
> At least one of us thinks clean traffic is a Good Thing all the time.
>
> Packets that can't possibley be used for anything ought to be dumped at
> the earliest possible opportunity as soon as it is apparent (or could
> be if anybody looked) that they are "from" addresses that can't be
> reached or have any other obviously fatal defect.

Here is a sticky point... There are reasons to allow 10.x.x.x sources to
transit a network. Mostly the reasons come back to 'broken' configurations
or 'broken' hardware. The reasons still equate to customer calls and
'broken' networking fromm their perspective. I think the thing you are
actually driving at is the 'intent' of the packet, which is quite tough
for the router to determine.



--Chris
(formerly chris at uu.net)
#######################################################
## UUNET Technologies, Inc.                          ##
## Manager                                           ##
## Customer Router Security Engineering Team         ##
## (W)703-886-3823 (C)703-338-7319                   ##
#######################################################



More information about the NANOG mailing list