nanog mailing list archives

Re: Proactive steps to prevent DDOS?


From: Dave Curado <davec () weezel net>
Date: Sun, 28 Jan 2001 12:26:12 -0500


Help me, what proactive steps can I take to protect my network from a DDOS?
 
There isn't a lot that can be done, but there are a few steps you can 
take to "get ready" for a DDOS attack.

   --Make sure you have monitoring of your routers or firewalls in place
     so you'll get an early alert of a possible DOS attack. This will at
     least allow you to start working on the problem (and drafting
     press releases :-).

I would add careful use of some rate-limiting functionality, 
(already mentioned in Richard Steenbergen's http://www.e-gerbil.net/ras/dos.txt)
so you can rate-limit things like icmp and acks numbered 0 and anything
else that show themselves to be obvious candidates over time.

As well, for us, part of "being ready" is knowing how to:
 - deploy rate-limiters (so you're not trying to learn it during an attack)
 - having ways to identify the target(s) of the attack -- predefined
   ACLs that are not applied but can be, to help determine the target(s),
   rmon probes, working knowledge of tcpdump or network sniffers, etc.

i.e. deploy ACLs on egress routers that can be enabled when an attack begins.  
A set of carefully defined filters can help determine information about the 
attack -- perhaps the src or dst or ports, or the fact that it's all random.  
Then ACLs to block or rate-limit can be built and applied, and/or if you're 
asking your upstream to take actions to help you, you can help them help you 
if you have information about the nature of the attack.

Granted it's a blunt instrument, but it has worked for me in the past
when an attack has rendered better tools useless.  

   --Talk to all of your up stream providers so you know how to contact and
     work with them if they are a source of a DOS attack against you. If your
     up stream provider isn't willing to work with you on this, start the
     process of getting a new up stream provider.

   --Look into the systems that are being developed and starting to become
     available that help automate the work to diagnose DDOS attacks.
     Encourage your up streams to do the same.

   --Make sure you have in place the filtering on your own networks that you
     wish everyone else had in place on their networks.  This won't protect
     you from being attacked, but it will prevent you and your users from
     attacking others (or at least using spoofed IP addresses to do so), and
     that in turn may prevent you from being the target of a retaliatory DOS
     attack. It can also prevent or limit the spread of a DOS attack that
     originates within your network or from someone down stream. From your
     customer's point of view there may not be much difference between
     you being the source of or the target of a DOS attack--either way
     performance is likely to be poor and customers are likely to be unhappy.

   -Jeff Ogden
    Merit


Current thread: