large BCP38 compliance testing

Nick Hilliard nick at foobar.org
Thu Oct 2 10:28:30 UTC 2014


On 02/10/2014 11:10, Mikael Abrahamsson wrote:
> Why isn't this being done? Why are we complaining about 300 gigabit/s DDOS
> attacks, asking people to fix their open resolvers, NTP servers etc, when
> the actual culprit is that some networks in the world don't implement BCP38?

ntp monlist / dnssec abuse can provide ~30x amplification.  So if you can 
find ten 1G links anywhere in the world which aren't protected with BGP38 
filtering, you can initiate a mostly untraceable 300G DDoS.

This shouldn't stop us from finding, then naming and shaming operators who 
don't use bcp38, but we also need to maintain realistic expectations about 
how successful it's going to be.

It would probably be more productive to pressurise transit providers to 
enforce bcp38 on their customer links.

Nick



More information about the NANOG mailing list