SlideShare une entreprise Scribd logo
1  sur  28
Copyright © 2014 Juniper Networks, Inc.1
DDoS Mitigation
Using BGP Flowspec
Justin Ryburn
Consulting Engineer
jryburn@juniper.net
Copyright © 2014 Juniper Networks, Inc.2
Background
•  Who is this guy?
•  http://www.linkedin.com/in/justinryburn
•  Why this topic?
•  Experience tracking DDoS “back in the day”
Copyright © 2014 Juniper Networks, Inc.3
Agenda
•  Problem Statement
•  Legacy DDoS Mitigation Methods
•  BGP Flowspec Overview
•  Use Case Examples
•  State of the Union
Copyright © 2014 Juniper Networks, Inc.4
Problem Statement
Copyright © 2014 Juniper Networks, Inc.5 Copyright © 2014 Juniper Networks, Inc.5
Is DDoS Really an Issue?
“…taking down a site or preventing transactions is only the tip of the iceberg. A DDoS
attack can lead to reputational losses or legal claims over undelivered services.”
Kaspersky Lab [1]
Verisign [2]
“Attacks in the 10 Gbps and
above category grew by 38%
from Q2 … Q3.”
NBC News [3]
“…more than 40 percent
estimated DDoS losses at more
than $1 million per day.”
Tech Times [4]
“DDoS attack cripples Sony
PSN while Microsoft deals with
Xbox Live woes”
Copyright © 2014 Juniper Networks, Inc.6
Legacy DDoS Mitigation
Methods
Copyright © 2014 Juniper Networks, Inc.7
Blocking DDoS in the “Old” Days
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
203.0.113.0/24	
  
203.0.113.0/24	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  might	
  connect	
  to	
  each	
  
router	
  and	
  add	
  filter	
  
x
SP NOC
•  Easy to implement and uses well understood constructs
•  Requires high degree of co-ordination between customer and provider
•  Cumbersome to scale in a large network perimeter
•  Mis-configuration possible and expensive
203.0.113.0/24	
  
Copyright © 2014 Juniper Networks, Inc.8
Destination Remotely Triggered Black Hole
(D/RTBH)
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
203.0.113.1/32	
  
203.0.113.1/32	
  
VicAm	
  iniAates	
  RTBH	
  
announcement	
  
BGP	
  Prefix	
  with	
  next-­‐hop	
  
set	
  to	
  discard	
  route.	
  
x
•  RFC 3882 circa 2004
•  Requires pre-configuration of discard route on all edge routers
•  Victim’s destination address is completely unreachable but attack (and collateral damage) is
stopped.
203.0.113.1/32	
  
Copyright © 2014 Juniper Networks, Inc.9
Source Remotely Triggered Black Hole
(S/RTBH)
•  RFC 5635 circa 2009
•  Requires pre-configuration of discard route and uRPF on all edge routers
•  Victim’s destination address is still useable
•  Only works for single (or small number) source.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  S/RTBH	
  on	
  
route	
  server	
  
x
SP NOC
BGP	
  prefix	
  with	
  next-­‐hop	
  
pointed	
  at	
  discard	
  and	
  
uRPF	
  enabled.	
  
Copyright © 2014 Juniper Networks, Inc.10
BGP FlowSpec Overview
Copyright © 2014 Juniper Networks, Inc.11
BGP Flow Specification
•  Specific information about a flow can now be distributed using a BGP
NLRI defined in RFC 5575 [5] circa 2009
•  AFI/SAFI = 1/133: Unicast Traffic Filtering Applications
•  AFI/SAFI = 1/134: VPN Traffic Filtering Applications
•  Flow routes are automatically validated against unicast routing
information or via routing policy framework.
•  Must belong to the longest match unicast prefix.
•  Once validated, firewall filter is created based on match and action
criteria.
Copyright © 2014 Juniper Networks, Inc.12
BGP Flow Specification
•  BGP Flowspec can include the following information:
•  Type 1 - Destination Prefix
•  Type 2 - Source Prefix
•  Type 3 - IP Protocol
•  Type 4 – Source or Destination Port
•  Type 5 – Destination Port
•  Type 6 - Source Port
•  Type 7 – ICMP Type
•  Type 8 – ICMP Code
•  Type 9 - TCP flags
•  Type 10 - Packet length
•  Type 11 – DSCP
•  Type 12 - Fragment Encoding
Copyright © 2014 Juniper Networks, Inc.13
BGP Flow Specification
•  Actions are defined using BGP Extended Communities:
•  0x8006 – traffic-rate (set to 0 to drop all traffic)
•  0x8007 – traffic-action (sampling)
•  0x8008 – redirect to VRF (route target)
•  0x8009 – traffic-marking (DSCP value)
Copyright © 2014 Juniper Networks, Inc.14
Vendor Support
•  DDoS Detection Vendors:
•  Arbor Peakflow SP 3.5
•  Accumuli DDoS Secure
•  Router Vendors:
•  Alcatel-Lucent SR OS 9.0R1
•  Juniper JUNOS 7.3
•  Cisco 5.2.0 for ASR and CRS [6]
•  OpenSource BGP Software:
•  ExaBGP
Copyright © 2014 Juniper Networks, Inc.15
What Makes BGP Flowspec Better?
•  Same granularity as ACLs
•  Based on n-tuple matching
•  Same automation as RTBH
•  Much easier to propagate filters to all edge routers in large networks
•  Leverages BGP best practices and policy controls
•  Same filtering and best practices used for RTBH can be applied to BGP
Flowspec
Copyright © 2014 Juniper Networks, Inc.16
Caveats
•  Forwarding Plane resources
•  Creating dynamic firewall filters that use these resources
•  More complex FS routes/filters will use more resources
•  Need to test your vendors limits and what happens when it is hit
•  Usually ways to limit the number and complexity of filters to avoid issues
•  Not a replacement technology
•  Should be ADDED to existing mitigation methods and not replace them
•  When it goes wrong (bugs) it goes wrong fast
•  Cloudflare outage:
https://blog.cloudflare.com/todays-outage-post-mortem-82515/
Copyright © 2014 Juniper Networks, Inc.17
Use Case Examples
Copyright © 2014 Juniper Networks, Inc.18
Inter-domain DDoS Mitigation Using Flowspec
Service Provider
203.0.113.1/32,*,17,53	
  
Internet Enterprise or DC
203.0.113.1	
  
VicAm	
  iniAates	
  Flowspec	
  
announcement	
  for	
  53/UDP	
  
only	
  
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  rate	
  0.	
  
x
•  Allows ISP customer to initiate the filter.
•  Requires sane filtering at customer edge.
Copyright © 2014 Juniper Networks, Inc.19
Intra-domain DDoS Mitigation Using Flowspec
•  Could be initiated by phone call, detection in SP network, or a web portal for the customer.
•  Requires co-ordination between customer and provider.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  Flowpec	
  
route	
  on	
  route	
  server	
  
x
SP NOC
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  rate	
  0.	
  
Copyright © 2014 Juniper Networks, Inc.20
DDoS Mitigation Using Scrubbing Center
•  Could be initiated by phone call, detection in SP network, or a web portal for the customer.
•  Allows for mitigating application layer attacks without completing the attack.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  Flowpec	
  
route	
  on	
  route	
  server	
  
x
SP NOC
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  redirect.	
  
Scrubbing
Center
A1ack	
  traffic	
  is	
  scrubbed	
  
by	
  DPI	
  appliance.	
  
LegiAmate	
  traffic	
  sent	
  to	
  
customer	
  via	
  GRE	
  or	
  VRF	
  
tunnel.	
  
Copyright © 2014 Juniper Networks, Inc.21
Real World Example (TDC)
"Where I think FlowSpec excels, is for protection of our mobile platform.
2 /24s are shared among a million mobile devices with NAT in a firewall.
The link capacity (and in part the firewall itself) is overloaded by a simple DDoS attack
against just one of these adresses.
The system detects a DoS attack against an address on the firewall.
It will identify total traffic, UDP, fragments, TCP SYN, ICMP, whatever, and depending on what
kind of attack it is, a policer is added for the specific protocol/attack on individual
peering routers. Protocols are policed with individual policers, so that for instance
UDP and TCP SYN can be policed to different throughputs.
Basically, an attack against a single IP on UDP will not affect other customers being NAT'ed
to the same address, using anything but UDP - and link capacity is protected."
Copyright © 2014 Juniper Networks, Inc.22
Real World Example
•  Attack on 1/13/16
Copyright © 2014 Juniper Networks, Inc.23
Where Are We Going?
•  IPv6 Support
•  http://tools.ietf.org/html/draft-ietf-idr-flow-spec-v6-06
•  Relaxing Validation
•  http://tools.ietf.org/html/draft-ietf-idr-bgp-flowspec-oid-02
•  Redirect to IP Action
•  https://tools.ietf.org/html/draft-ietf-idr-flowspec-redirect-ip-02
Copyright © 2014 Juniper Networks, Inc.24
State of the Union
Copyright © 2014 Juniper Networks, Inc.25
Summary of Survey
•  Great idea and would love to see it take off but…
•  Enterprises and Content Providers are waiting for ISPs to accept their
Flowspec routes.
•  Some would even be willing to switch to an ISP that did this.
•  ISPs are waiting for vendors to support it.
•  More vendors supporting it
•  Specific features they need for their environment
•  Better scale or stability
Copyright © 2014 Juniper Networks, Inc.26
References
•  [1] Kaspersky Lab – Every Third Public Facing Company Encounters DDoS
Attacks http://tinyurl.com/neu4zzr
•  [2] Verisign – 2014 DDoS Attack Trends http://tinyurl.com/oujgx94
•  [3] NBC News – Internet Speeds are Rising Sharply, But So Are Hack Attacks
http://tinyurl.com/q4u2b7m
•  [4] Tech Times – DDoS Attack Cripples Sony PSN While Microsoft Deals with
Xbox Live Woes http://tinyurl.com/kkdczjx
•  [5] RFC 5575 - Dissemination of Flow Specification Rules
http://www.ietf.org/rfc/rfc5575.txt
•  [6] Cisco - Implementing BGP Flowspec http://tinyurl.com/mm5w7mo
•  [7] Cisco – Understanding BGP Flowspec http://tinyurl.com/l4kwb3b
Copyright © 2014 Juniper Networks, Inc.27
More Information
•  NANOG PDF
•  NANOG YouTube Video
•  Day One Guide
Thank You!

Contenu connexe

Tendances

CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
Ameen Wayok
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
Cisco Service Provider
 

Tendances (20)

GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Large BGP Communities
Large BGP CommunitiesLarge BGP Communities
Large BGP Communities
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Segment Routing: A Tutorial
Segment Routing: A TutorialSegment Routing: A Tutorial
Segment Routing: A Tutorial
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 
Bgp
BgpBgp
Bgp
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
BGP Dynamic Routing and Neutron
BGP Dynamic Routing and NeutronBGP Dynamic Routing and Neutron
BGP Dynamic Routing and Neutron
 
Segment Routing Lab
Segment Routing Lab Segment Routing Lab
Segment Routing Lab
 
Bgp tutorial for ISP
Bgp tutorial for ISPBgp tutorial for ISP
Bgp tutorial for ISP
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 

En vedette

Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
MyNOG
 

En vedette (17)

Misused top ASNs
Misused top ASNsMisused top ASNs
Misused top ASNs
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)
 
2015-ShowNet -DDoS/IX/BGPFlowspec/External
2015-ShowNet -DDoS/IX/BGPFlowspec/External2015-ShowNet -DDoS/IX/BGPFlowspec/External
2015-ShowNet -DDoS/IX/BGPFlowspec/External
 
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
 
Bgpcep odl summit 2015
Bgpcep odl summit 2015Bgpcep odl summit 2015
Bgpcep odl summit 2015
 
Deep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection SystemDeep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection System
 
BGP Monitoring Protocol
BGP Monitoring ProtocolBGP Monitoring Protocol
BGP Monitoring Protocol
 
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS ShieldDNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
 
BGP persistence
BGP persistenceBGP persistence
BGP persistence
 
LISP and NSH in Open vSwitch
LISP and NSH in Open vSwitchLISP and NSH in Open vSwitch
LISP and NSH in Open vSwitch
 

Similaire à DDoS Mitigation using BGP Flowspec

Similaire à DDoS Mitigation using BGP Flowspec (20)

IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
Kubernetes OpenContrail Meetup
Kubernetes OpenContrail MeetupKubernetes OpenContrail Meetup
Kubernetes OpenContrail Meetup
 
MTCTCE.pdf
MTCTCE.pdfMTCTCE.pdf
MTCTCE.pdf
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?
 
2017 01-31-cgns
2017 01-31-cgns2017 01-31-cgns
2017 01-31-cgns
 
How Does SDN Fit into the Data Centre?
How Does SDN Fit into the Data Centre?How Does SDN Fit into the Data Centre?
How Does SDN Fit into the Data Centre?
 
The State of 3G/GPRS IPv6 Deployment
The State of 3G/GPRS IPv6 DeploymentThe State of 3G/GPRS IPv6 Deployment
The State of 3G/GPRS IPv6 Deployment
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment Routing
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
 

Plus de APNIC

Plus de APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Dernier

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Dernier (20)

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 

DDoS Mitigation using BGP Flowspec

  • 1. Copyright © 2014 Juniper Networks, Inc.1 DDoS Mitigation Using BGP Flowspec Justin Ryburn Consulting Engineer jryburn@juniper.net
  • 2. Copyright © 2014 Juniper Networks, Inc.2 Background •  Who is this guy? •  http://www.linkedin.com/in/justinryburn •  Why this topic? •  Experience tracking DDoS “back in the day”
  • 3. Copyright © 2014 Juniper Networks, Inc.3 Agenda •  Problem Statement •  Legacy DDoS Mitigation Methods •  BGP Flowspec Overview •  Use Case Examples •  State of the Union
  • 4. Copyright © 2014 Juniper Networks, Inc.4 Problem Statement
  • 5. Copyright © 2014 Juniper Networks, Inc.5 Copyright © 2014 Juniper Networks, Inc.5 Is DDoS Really an Issue? “…taking down a site or preventing transactions is only the tip of the iceberg. A DDoS attack can lead to reputational losses or legal claims over undelivered services.” Kaspersky Lab [1] Verisign [2] “Attacks in the 10 Gbps and above category grew by 38% from Q2 … Q3.” NBC News [3] “…more than 40 percent estimated DDoS losses at more than $1 million per day.” Tech Times [4] “DDoS attack cripples Sony PSN while Microsoft deals with Xbox Live woes”
  • 6. Copyright © 2014 Juniper Networks, Inc.6 Legacy DDoS Mitigation Methods
  • 7. Copyright © 2014 Juniper Networks, Inc.7 Blocking DDoS in the “Old” Days Service Provider Internet Enterprise or DC 203.0.113.1   203.0.113.0/24   203.0.113.0/24   “HELP”  I’m  being  a1acked.   NOC  might  connect  to  each   router  and  add  filter   x SP NOC •  Easy to implement and uses well understood constructs •  Requires high degree of co-ordination between customer and provider •  Cumbersome to scale in a large network perimeter •  Mis-configuration possible and expensive 203.0.113.0/24  
  • 8. Copyright © 2014 Juniper Networks, Inc.8 Destination Remotely Triggered Black Hole (D/RTBH) Service Provider Internet Enterprise or DC 203.0.113.1   203.0.113.1/32   203.0.113.1/32   VicAm  iniAates  RTBH   announcement   BGP  Prefix  with  next-­‐hop   set  to  discard  route.   x •  RFC 3882 circa 2004 •  Requires pre-configuration of discard route on all edge routers •  Victim’s destination address is completely unreachable but attack (and collateral damage) is stopped. 203.0.113.1/32  
  • 9. Copyright © 2014 Juniper Networks, Inc.9 Source Remotely Triggered Black Hole (S/RTBH) •  RFC 5635 circa 2009 •  Requires pre-configuration of discard route and uRPF on all edge routers •  Victim’s destination address is still useable •  Only works for single (or small number) source. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  S/RTBH  on   route  server   x SP NOC BGP  prefix  with  next-­‐hop   pointed  at  discard  and   uRPF  enabled.  
  • 10. Copyright © 2014 Juniper Networks, Inc.10 BGP FlowSpec Overview
  • 11. Copyright © 2014 Juniper Networks, Inc.11 BGP Flow Specification •  Specific information about a flow can now be distributed using a BGP NLRI defined in RFC 5575 [5] circa 2009 •  AFI/SAFI = 1/133: Unicast Traffic Filtering Applications •  AFI/SAFI = 1/134: VPN Traffic Filtering Applications •  Flow routes are automatically validated against unicast routing information or via routing policy framework. •  Must belong to the longest match unicast prefix. •  Once validated, firewall filter is created based on match and action criteria.
  • 12. Copyright © 2014 Juniper Networks, Inc.12 BGP Flow Specification •  BGP Flowspec can include the following information: •  Type 1 - Destination Prefix •  Type 2 - Source Prefix •  Type 3 - IP Protocol •  Type 4 – Source or Destination Port •  Type 5 – Destination Port •  Type 6 - Source Port •  Type 7 – ICMP Type •  Type 8 – ICMP Code •  Type 9 - TCP flags •  Type 10 - Packet length •  Type 11 – DSCP •  Type 12 - Fragment Encoding
  • 13. Copyright © 2014 Juniper Networks, Inc.13 BGP Flow Specification •  Actions are defined using BGP Extended Communities: •  0x8006 – traffic-rate (set to 0 to drop all traffic) •  0x8007 – traffic-action (sampling) •  0x8008 – redirect to VRF (route target) •  0x8009 – traffic-marking (DSCP value)
  • 14. Copyright © 2014 Juniper Networks, Inc.14 Vendor Support •  DDoS Detection Vendors: •  Arbor Peakflow SP 3.5 •  Accumuli DDoS Secure •  Router Vendors: •  Alcatel-Lucent SR OS 9.0R1 •  Juniper JUNOS 7.3 •  Cisco 5.2.0 for ASR and CRS [6] •  OpenSource BGP Software: •  ExaBGP
  • 15. Copyright © 2014 Juniper Networks, Inc.15 What Makes BGP Flowspec Better? •  Same granularity as ACLs •  Based on n-tuple matching •  Same automation as RTBH •  Much easier to propagate filters to all edge routers in large networks •  Leverages BGP best practices and policy controls •  Same filtering and best practices used for RTBH can be applied to BGP Flowspec
  • 16. Copyright © 2014 Juniper Networks, Inc.16 Caveats •  Forwarding Plane resources •  Creating dynamic firewall filters that use these resources •  More complex FS routes/filters will use more resources •  Need to test your vendors limits and what happens when it is hit •  Usually ways to limit the number and complexity of filters to avoid issues •  Not a replacement technology •  Should be ADDED to existing mitigation methods and not replace them •  When it goes wrong (bugs) it goes wrong fast •  Cloudflare outage: https://blog.cloudflare.com/todays-outage-post-mortem-82515/
  • 17. Copyright © 2014 Juniper Networks, Inc.17 Use Case Examples
  • 18. Copyright © 2014 Juniper Networks, Inc.18 Inter-domain DDoS Mitigation Using Flowspec Service Provider 203.0.113.1/32,*,17,53   Internet Enterprise or DC 203.0.113.1   VicAm  iniAates  Flowspec   announcement  for  53/UDP   only   BGP  Prefix  installed  with   acAon  set  to  rate  0.   x •  Allows ISP customer to initiate the filter. •  Requires sane filtering at customer edge.
  • 19. Copyright © 2014 Juniper Networks, Inc.19 Intra-domain DDoS Mitigation Using Flowspec •  Could be initiated by phone call, detection in SP network, or a web portal for the customer. •  Requires co-ordination between customer and provider. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  Flowpec   route  on  route  server   x SP NOC BGP  Prefix  installed  with   acAon  set  to  rate  0.  
  • 20. Copyright © 2014 Juniper Networks, Inc.20 DDoS Mitigation Using Scrubbing Center •  Could be initiated by phone call, detection in SP network, or a web portal for the customer. •  Allows for mitigating application layer attacks without completing the attack. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  Flowpec   route  on  route  server   x SP NOC BGP  Prefix  installed  with   acAon  set  to  redirect.   Scrubbing Center A1ack  traffic  is  scrubbed   by  DPI  appliance.   LegiAmate  traffic  sent  to   customer  via  GRE  or  VRF   tunnel.  
  • 21. Copyright © 2014 Juniper Networks, Inc.21 Real World Example (TDC) "Where I think FlowSpec excels, is for protection of our mobile platform. 2 /24s are shared among a million mobile devices with NAT in a firewall. The link capacity (and in part the firewall itself) is overloaded by a simple DDoS attack against just one of these adresses. The system detects a DoS attack against an address on the firewall. It will identify total traffic, UDP, fragments, TCP SYN, ICMP, whatever, and depending on what kind of attack it is, a policer is added for the specific protocol/attack on individual peering routers. Protocols are policed with individual policers, so that for instance UDP and TCP SYN can be policed to different throughputs. Basically, an attack against a single IP on UDP will not affect other customers being NAT'ed to the same address, using anything but UDP - and link capacity is protected."
  • 22. Copyright © 2014 Juniper Networks, Inc.22 Real World Example •  Attack on 1/13/16
  • 23. Copyright © 2014 Juniper Networks, Inc.23 Where Are We Going? •  IPv6 Support •  http://tools.ietf.org/html/draft-ietf-idr-flow-spec-v6-06 •  Relaxing Validation •  http://tools.ietf.org/html/draft-ietf-idr-bgp-flowspec-oid-02 •  Redirect to IP Action •  https://tools.ietf.org/html/draft-ietf-idr-flowspec-redirect-ip-02
  • 24. Copyright © 2014 Juniper Networks, Inc.24 State of the Union
  • 25. Copyright © 2014 Juniper Networks, Inc.25 Summary of Survey •  Great idea and would love to see it take off but… •  Enterprises and Content Providers are waiting for ISPs to accept their Flowspec routes. •  Some would even be willing to switch to an ISP that did this. •  ISPs are waiting for vendors to support it. •  More vendors supporting it •  Specific features they need for their environment •  Better scale or stability
  • 26. Copyright © 2014 Juniper Networks, Inc.26 References •  [1] Kaspersky Lab – Every Third Public Facing Company Encounters DDoS Attacks http://tinyurl.com/neu4zzr •  [2] Verisign – 2014 DDoS Attack Trends http://tinyurl.com/oujgx94 •  [3] NBC News – Internet Speeds are Rising Sharply, But So Are Hack Attacks http://tinyurl.com/q4u2b7m •  [4] Tech Times – DDoS Attack Cripples Sony PSN While Microsoft Deals with Xbox Live Woes http://tinyurl.com/kkdczjx •  [5] RFC 5575 - Dissemination of Flow Specification Rules http://www.ietf.org/rfc/rfc5575.txt •  [6] Cisco - Implementing BGP Flowspec http://tinyurl.com/mm5w7mo •  [7] Cisco – Understanding BGP Flowspec http://tinyurl.com/l4kwb3b
  • 27. Copyright © 2014 Juniper Networks, Inc.27 More Information •  NANOG PDF •  NANOG YouTube Video •  Day One Guide