nanog mailing list archives

Re: D/DoS mitigation hardware/software needed.


From: Rick Ernst <nanog () shreddedmail com>
Date: Mon, 4 Jan 2010 21:39:37 -0800

I think you, Roland, and I are all agreeing on the same argument.

The (my) confusion entered with the statement of, "The key is to not be
inline all the time, but only inline *when needed*.
I inferred a topological or physical path change from that.

Redirecting traffic (which is really just an extension of RTBH; a scrubber
destination rather than Null0) is an understandable state.

Rick

On Mon, Jan 4, 2010 at 9:34 PM, Stefan Fouant <sfouant () shortestpathfirst net
wrote:

-----Original Message-----
From: Rick Ernst [mailto:nanog () shreddedmail com]
Sent: Tuesday, January 05, 2010 12:19 AM

I'd argue just the opposite.  If your monitoring/mitigation system
changes
dependent on the situation (normal vs under attack), you are adding
complexity to the system.  "What mode is the system in right now? Is
this
customer having connectivity issues because of a state change in the
network? etc."

Almost all of the scalable DDoS mitigation architectures deployed in
carriers or other large enterprises employ the use of an offramp method.
These devices perform a lot better when you can forward just the subset of
the traffic through as opposed to all.  It just a simple matter of using
static routing / RTBH techniques / etc. to automate the offramp.

Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D




Current thread: