SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
BCP38	
  and	
  BCP140	
Matsuzaki	
  ‘maz’	
  Yoshinobu	
  
<maz@iij.ad.jp>	
2014/5/24	
 maz@iij.ad.jp	
 1
2014/5/24	
   maz@iij.ad.jp	
   2	
  
IP	
  reflecIon	
  aJack	
  
IP	
  spoofed	
  queries	
  
replies	
  
vicIm	
  
AJacker	
  
2014/5/24	
   maz@iij.ad.jp	
   3	
  
DNS	
  amplificaIon	
  aJack	
  
DNS	
  DNS	
   DNS	
  
vicIm	
  
Command&Control	
  
DNS	
  
DNS	
  
stub-­‐resolvers	
   full-­‐resolvers	
  
root-­‐servers	
  
tld-­‐servers	
  
example-­‐servers	
  
botnet	
  
IP	
  spoofed	
  
DNS	
  queries	
  
ISP	
  Cache	
  DNS	
CPE/Routers
2014/5/24	
   maz@iij.ad.jp	
   4	
  
NTP	
  amplificaIon	
  aJack	
  
NTP	
   NTP	
  
vicIm	
  
Command&Control	
  
botnet	
  
IP	
  spoofed	
  
NTP	
  queries	
  
weakness	
•  AJackers	
  love	
  weakness,	
  as	
  it’s	
  useful	
  
– ‘weaker’	
  means	
  ‘easier’	
  for	
  them	
  
•  AJackers	
  will	
  waste	
  your	
  resources	
  if	
  you	
  
don’t	
  improve	
  your	
  security	
  
– internaIonal	
  bandwidth	
  
– cpu	
  power	
  
– etc.	
  
2014/5/24	
 maz@iij.ad.jp	
 5
2014/5/24	
   maz@iij.ad.jp	
   6	
  
aJacker	
  
soluIons	
  against	
  IP	
  reflecIon	
  aJacks	
  
IP	
  spoofed	
  packets	
  
vicIm	
  
open	
  
amplifier	
  
prevenIng	
  
IP	
  spoofing	
  
client	
  
authorizaIon	
  
BCP38	
 BCP140
2014/5/24	
   maz@iij.ad.jp	
   7	
  
Source	
  Address	
  ValidaIon/BCP38	
  
•  ValidaIng	
  source	
  IP	
  address	
  of	
  incoming	
  packets	
  
–  BCP38/RFC2827	
  
•  All	
  providers	
  of	
  Internet	
  connecIvity	
  are	
  urged	
  to	
  implement	
  
filtering	
  described	
  in	
  this	
  document	
  to	
  prohibit	
  aJackers	
  from	
  
using	
  forged	
  source	
  addresses...	
  
–  BCP84/RFC3704	
  	
  
•  It	
  is	
  important	
  for	
  ISPs	
  to	
  implement	
  ingress	
  filtering	
  to	
  prevent	
  
spoofed	
  addresses	
  being	
  used,	
  both	
  to	
  curtail	
  DoS	
  aJacks	
  and	
  to	
  
make	
  them	
  more	
  traceable,	
  and	
  to	
  protect	
  their	
  own	
  
infrastructure.	
  	
  
BCP38	
  should	
  be	
  deployed	
  as	
  close	
  to	
  
the	
  edge	
  as	
  possible	
•  It’s	
  reasonable	
  to	
  deploy	
  BCP38	
  at	
  provider	
  edge	
  routers	
  
precise	
  rule	
  can	
  be	
  
applied	
  for	
  the	
  
packet.	
  J	
  	
  
not	
  enough	
  informaIon	
  to	
  
apply	
  strict	
  rule,	
  
just	
  able	
  to	
  check	
  if	
  its	
  
source	
  IP	
  is	
  routable	
  or	
  not	
  
2014/5/24	
 maz@iij.ad.jp	
 8	
packet
2014/5/24	
   maz@iij.ad.jp	
   9	
  
enforcing	
  the	
  verificaIon	
  by:	
  
•  ACL	
  
– packet	
  filter	
  
– permit	
  valid-­‐source,	
  then	
  drop	
  any	
  
•  uRPF	
  check	
  
– using	
  ‘rouIng	
  table’	
  
– look-­‐up	
  the	
  return	
  path	
  for	
  the	
  source	
  IP	
  address	
  
– use	
  strict	
  mode	
  for	
  your	
  customers	
  
•  you	
  can’t	
  stop	
  IP	
  reflecIon	
  aJacks	
  by	
  loose	
  mode	
  
10	
  
cisco	
  ACL	
  example	
  
customer	
  network	
  
	
  192.168.0.0/24	
  
2001:db8:ff::/48	
  
ip	
  access-­‐list	
  extended	
  fromCUSTMER4	
  
	
  permit	
  ip	
  192.168.0.0	
  0.0.255.255	
  any	
  
	
  permit	
  ip	
  10.0.0.0	
  0.0.0.3	
  any	
  
	
  deny	
  	
  	
  ip	
  	
  any	
  any	
  
!	
  
IPv6	
  access-­‐list	
  fromCUSTMER6	
  
	
  permit	
  ipv6	
  2001:db8::/64	
  any	
  
	
  permit	
  ipv6	
  any	
  2001:db8::/64	
  any	
  
	
  permit	
  ipv6	
  2001:db8:ff::/48	
  any	
  
	
  permit	
  ipv6	
  fe80::/10	
  fe80::/10	
  
	
  permit	
  ipv6	
  fe80::/10	
  ff02::/16	
  
	
  deny	
  ipv6	
  any	
  any	
  
!	
  
interface	
  Gigabitethernet0/0	
  
	
  ip	
  access-­‐group	
  fromCUSTOMER4	
  in	
  
	
  ipv6	
  traffic-­‐filter	
  fromCUSTOMER6	
  in	
  
point-­‐to-­‐point	
  
10.0.0.0/30	
  
2001:db8::/64	
  
ISP	
  Edge	
  Router	
  
2014/5/24	
 maz@iij.ad.jp
11	
  
juniper	
  IPv4	
  ACL	
  example	
  
firewall	
  family	
  inet	
  {	
  
	
  filter	
  fromCUSTOMER4	
  {	
  
	
  	
  term	
  CUSTOMER4	
  {	
  from	
  
	
  	
  	
  source-­‐address	
  {	
  
	
  	
  	
  	
  192.168.0.0/16;	
  
	
  	
  	
  	
  10.0.0.0/30;	
  
	
  	
  	
  }	
  
	
  	
  	
  then	
  accept;	
  
	
  	
  }	
  
	
  	
  term	
  Default	
  {	
  
	
  	
  	
  then	
  discard;	
  
}}}	
  
[edit	
  interface	
  ge-­‐0/0/0	
  unit	
  0	
  family	
  inet]	
  
filter	
  {	
  
	
  input	
  fromCUSTOMER;	
  
}	
  	
  
customer	
  network	
  
	
  192.168.0.0/24	
  
2001:db8:ff::/48	
  
point-­‐to-­‐point	
  
10.0.0.0/30	
  
2001:db8::/64	
  
ISP	
  Edge	
  Router	
  
2014/5/24	
 maz@iij.ad.jp
12	
  
juniper	
  IPv6	
  ACL	
  example	
  
firewall	
  family	
  inet6	
  {	
  
	
  filter	
  fromCUSTOMER6	
  {	
  
	
  	
  term	
  CUSTOMER6	
  {	
  from	
  
	
  	
  	
  source-­‐address	
  {	
  
	
  	
  	
  	
  2001:db8::/64;	
  
	
  	
  	
  	
  2001:db8:ff::/48;	
  
	
  	
  	
  }	
  
	
  	
  	
  then	
  accept;	
  
	
  	
  }	
  
	
  	
  term	
  LINKLOCAL	
  {	
  from	
  
	
  	
  	
  	
  source-­‐address	
  {	
  
	
  	
  	
  	
  	
  	
  fe80::/10;	
  
	
  	
  	
  	
  }	
  desInaIon-­‐address	
  {	
  
	
  	
  	
  	
  	
  	
  fe80::/10;	
  
	
  	
  	
  	
  	
  	
  ff02::/16;	
  
	
  	
  	
  	
  }	
  
	
  	
  	
  	
  then	
  accept;	
  
	
  	
  }	
  
	
  	
  term	
  Default	
  {	
  
	
  	
  	
  then	
  discard;	
  
}}}	
  
[edit	
  interface	
  ge-­‐0/0/0	
  unit	
  0	
  family	
  inet6]	
  
filter	
  {	
  
	
  input	
  fromCUSTOMER6;	
  
}	
  	
  
customer	
  network	
  
	
  192.168.0.0/24	
  
2001:db8:ff::/48	
  
point-­‐to-­‐point	
  
10.0.0.0/30	
  
2001:db8::/64	
  
ISP	
  Edge	
  Router	
  
2014/5/24	
 maz@iij.ad.jp
13	
  
cisco	
  uRPF	
  example	
  
	
  
interface	
  Gigabitethernet0/0	
  
	
  	
  ip	
  verify	
  unicast	
  source	
  reachable-­‐via	
  rx	
  
	
  	
  ipv6	
  verify	
  unicast	
  source	
  reachable-­‐via	
  rx	
  
	
  
uRPF	
  
customer	
  network	
  
	
  192.168.0.0/24	
  
2001:db8:ff::/48	
  
point-­‐to-­‐point	
  
10.0.0.0/30	
  
2001:db8::/64	
  
ISP	
  Edge	
  Router	
  
2014/5/24	
 maz@iij.ad.jp
14	
  
juniper	
  uRPF	
  example	
  
[edit	
  interface	
  ge-­‐0/0/0	
  unit	
  0]	
  
	
  family	
  inet	
  {	
  rpf-­‐check;	
  }	
  
	
  family	
  inet6	
  {	
  rpf-­‐check;	
  }	
  
uRPF	
  
customer	
  network	
  
	
  192.168.0.0/24	
  
2001:db8:ff::/48	
  
point-­‐to-­‐point	
  
10.0.0.0/30	
  
2001:db8::/64	
  
ISP	
  Edge	
  Router	
  
2014/5/24	
 maz@iij.ad.jp
2014/5/24	
   maz@iij.ad.jp	
   15	
  
BCP38	
  deployment	
  at	
  IIJ/AS2497	
peering	
  ASes	
   Upstream	
  ASes	
  
IIJ/AS2497	
  
uRPF	
  strict	
  mode	
uRPF	
  loose	
  mode	
mulI	
  homed	
  
AS/ISP	
  customers	
  
consumer	
   Enterprise	
  
Customers	
  
consumer	
  
uRPF	
•  lookup	
  a	
  reverse	
  path	
  by	
  source	
  IP	
  address	
  	
  
•  strict	
  mode	
  
– the	
  incoming	
  interface	
  should	
  match	
  with	
  the	
  
rouIng	
  table	
  
•  loose	
  mode	
  
– there	
  should	
  be	
  a	
  valid	
  rouIng	
  entry	
  for	
  the	
  
source	
  IP	
  address	
  
2014/5/24	
 maz@iij.ad.jp	
 16
packet	
  forwarding	
  –	
  dst-­‐ip	
  based	
•  rouIng_table(dst-­‐ip)	
  =>	
  outgoing	
  interface	
  
– lookup	
  by	
  10.0.0.1	
  =>	
  if.i	
  
– then	
  router	
  forwards	
  the	
  packet	
IP	
  packet	
dst-­‐ip	
 src-­‐ip	
data	
src	
ip:	
  192.0.2.1	
dst-­‐ip	
ip:	
  10.0.0.1	
dst	
2014/5/24	
 17	
maz@iij.ad.jp	
if.o	
if.i	
192.0.2.0/28	
10.0.0.0/8	
if.o	
if.i	
rouIng	
  table
uRPF	
  –	
  lookup	
  by	
  the	
  src-­‐ip	
•  rouIng_table(src-­‐ip)	
  =>	
  interface	
  
– lookup	
  by	
  192.0.2.1	
  =>	
  if.o	
  
– The	
  result	
  MUST	
  match	
  the	
  incoming	
  interface	
IP	
  packet	
dst-­‐ip	
 src-­‐ip	
data	
src	
ip:	
  192.0.2.1	
dst-­‐ip	
ip:	
  10.0.0.1	
dst	
2014/5/24	
 18	
maz@iij.ad.jp	
if.o	
if.i	
192.0.2.0/28	
10.0.0.0/8	
if.o	
if.i	
rouIng	
  table
aJack	
  against	
  a	
  web	
  site	
•  110Kpps	
  of	
  TCP	
  SYN	
  flood	
  was	
  observed	
  
2014/5/24	
 maz@iij.ad.jp	
 19
uRPF	
  loose	
  did	
  reduce	
  the	
  aJack	
•  The	
  aJack	
  was	
  prevented	
  if	
  the	
  admin	
  at	
  the	
  
aJack	
  source	
  has	
  deployed	
  BCP38	
about	
  30%	
  of	
  the	
  aJack	
  packets	
  were	
  reduced	
  by	
  uRPF	
  loose	
  mode	
2014/5/24	
 maz@iij.ad.jp	
 20
spoofing	
2014/5/24	
 maz@iij.ad.jp	
 21	
0.0.0.0	
255.255.255.255	
IPv4	
  range	
Ime
BCP38	
  is	
  useful	
  to	
  protect	
  yourself	
•  many	
  access	
  controls	
  are	
  depending	
  on	
  
validity	
  of	
  source	
  IP	
  address	
  
– source	
  IP	
  address	
  based	
  filtering	
  
– ACL	
  on	
  vty,	
  snmp	
  and	
  etc	
  
•  If	
  your	
  users	
  can	
  spoof	
  source	
  IP	
  address,	
  sIll	
  
it’s	
  reliable	
  
2014/5/24	
 maz@iij.ad.jp	
 22
BCP140	
  (RFC5358)	
•  PrevenIng	
  Use	
  of	
  Recursive	
  Nameservers	
  in	
  
Reflector	
  AJacks	
  
– Best	
  Current	
  PracIce	
  
– hJps://tools.iex.org/html/bcp140	
  
•  RecommendaIons:	
  
1.  Disabling	
  recursive	
  service	
  where	
  it’s	
  not	
  
necessary	
  
2.  ImplemenIng	
  client	
  authorizaIon	
  
maz@iij.ad.jp	
 23	
2014/5/24
implemenIng	
  BCP140	
•  Several	
  ISPs	
  in	
  Japan	
  have	
  operated	
  ‘open’	
  
recursive	
  nameservers	
  for	
  many	
  years.	
  	
  As	
  
these	
  servers	
  tend	
  to	
  be	
  used	
  in	
  dns	
  amp	
  
aJacks,	
  ISPs	
  decided	
  to	
  put	
  ACL	
  to	
  accept	
  
queries	
  from	
  its	
  customers	
  only	
  -­‐	
  BCP140.	
  
	
maz@iij.ad.jp	
 24	
2014/5/24
Client	
  AuthorizaIon	
•  BCP140	
  describes	
  several	
  ways:	
  
1.  source	
  IP	
  address	
  based	
  
2.  Incoming	
  interface	
  based	
  
3.  TSIG/SIG(0)	
  signed	
  queries	
  
4.  using	
  a	
  local	
  caching	
  nameserver	
  
•  The	
  1st	
  one	
  is	
  the	
  opIon	
  for	
  ISPs	
  
– no	
  other	
  choice	
  at	
  this	
  moment	
  
•  source	
  IP	
  address	
  based	
  authorizaIon	
  
– in	
  other	
  words,	
  ACL	
  J	
  
maz@iij.ad.jp	
 25	
2014/5/24
Technically	
  it’s	
  quite	
  easy	
//	
  BIND9	
  recursive	
  service	
  example	
  
acl	
  my-­‐net	
  {	
  192.0.2.0/24;	
  2001:db8::/32;	
  };	
  
opIons	
  {	
  
	
  	
  	
  recursion	
  yes;	
  
	
  	
  	
  allow-­‐query	
  {	
  my-­‐net;	
  };	
  
};	
maz@iij.ad.jp	
 26	
2014/5/24
There	
  should	
  not	
  be	
  issues	
•  Usually	
  users	
  automaIcally	
  get	
  DNS	
  seyng	
  
– PPPoE	
  
– DHCP	
  
•  System	
  integrators	
  who	
  are	
  responsible	
  for	
  
enterprise	
  network	
  keep	
  its	
  seyng	
  up-­‐to-­‐date	
  
maz@iij.ad.jp	
 27	
2014/5/24
real	
  situaIons	
  L	
•  Some	
  users	
  staIcally	
  setup	
  DNS	
  seyng	
  on	
  
their	
  devices,	
  and	
  don’t	
  change	
  it	
  forever	
  even	
  
a{er	
  switching	
  ISPs	
  
•  Lazy	
  system	
  integrators	
  use	
  nameservers	
  
which	
  they	
  just	
  know	
  and	
  leave	
  them	
  forever	
  
•  Some	
  users	
  change	
  DNS	
  seyng	
  based	
  on	
  a	
  
rumor	
  like	
  ‘you	
  can	
  get	
  more	
  internet	
  speed	
  
by	
  changing	
  DNS	
  seyng’	
maz@iij.ad.jp	
 28	
2014/5/24
IIJ	
  case	
•  public	
  announcement	
  on	
  Sept	
  2013	
  
– “for	
  those	
  who	
  used	
  IIJ	
  services	
  before”	
  
– corporate	
  web	
  site	
  
•  hJp://www.iij.ad.jp/company/development/tech/
acIviIes/open_resolver/	
  
– technical	
  blog	
  
•  hJp://techlog.iij.ad.jp/archives/718	
  
– news	
  site	
  
•  about	
  3months	
  before	
  implemenIng	
  
maz@iij.ad.jp	
 29	
2014/5/24
2st	
  Dec	
  2013	
  12:00JST	
•  IIJ’s	
  cache	
  nameservers	
  started	
  to	
  serve	
  its	
  
customers	
  only	
  
•  For	
  queries	
  from	
  outside,	
  the	
  nameservers	
  are	
  
answering	
  staIc	
  A	
  to	
  lead	
  users	
  to	
  a	
  warning	
  
web	
  page.	
  
– saying	
  “your	
  dns	
  seyng	
  is	
  not	
  valid	
  anymore,	
  so	
  
you	
  need	
  change	
  your	
  seyng	
  to	
  access	
  the	
  
internet.	
  	
  please	
  contact	
  your	
  ISP	
  or	
  network	
  
administrator	
  for	
  further	
  assistance.”	
  
maz@iij.ad.jp	
 30	
2014/5/24
the	
  warning	
  page	
•  Simple	
  text	
  only	
  
– no	
  javascript	
  
– no	
  image	
  
– no	
  link	
  
•  At	
  first	
  we	
  put	
  the	
  name	
  of	
  IIJ	
  at	
  the	
  boJom,	
  
then	
  users	
  called	
  IIJ	
  by	
  searching	
  telephone	
  
number	
  somehow	
  
•  So	
  IIJ	
  deleted	
  its	
  name,	
  and	
  emphasized	
  
“contact	
  your	
  ISP	
  or	
  network	
  administrator”	
  
maz@iij.ad.jp	
 31	
2014/5/24
Users	
•  Some	
  users	
  sIll	
  could	
  post	
  messages	
  on	
  social	
  
medias	
  -­‐	
  probably	
  by	
  using	
  their	
  smartphone	
  
•  Some	
  of	
  them	
  were	
  suggesIng	
  to	
  use	
  other	
  
publically	
  available	
  nameservers	
  
– google’s	
  
– just	
  usable	
  ones	
  L	
  
maz@iij.ad.jp	
 32	
2014/5/24
collaboraIon	
  with	
  other	
  ISPs	
•  ImplemenIng	
  BCP140	
  might	
  increase	
  #	
  of	
  
customer	
  calls	
  at	
  other	
  ISPs’	
  helpdesk	
  
•  ISPs	
  shared	
  their	
  implemenIng	
  schedule	
  in	
  
advance	
  each	
  other	
  so	
  that	
  ISPs	
  can	
  expect	
  
customer	
  calls	
  
•  ISP	
  community	
  could	
  develop	
  a	
  shared	
  
warning	
  page	
  that	
  shows	
  the	
  beJer	
  contact	
  
based	
  on	
  the	
  source	
  IP	
  address	
  of	
  the	
  client	
  
maz@iij.ad.jp	
 33	
2014/5/24
lesson	
  learned	
•  effecIve	
  announcement	
  
– public	
  and	
  also	
  targeted	
  based	
  on	
  query	
  log	
  
•  collaboraIng	
  with	
  other	
  ISPs	
  
– for	
  beJer	
  customer	
  support	
  
•  phased	
  implementaIon	
  could	
  be	
  your	
  choice	
  
•  start	
  early	
  before	
  the	
  issue	
  is	
  geyng	
  bigger	
  
– more	
  unexpected	
  users	
  will	
  use	
  your	
  nameserver	
  
maz@iij.ad.jp	
 34	
2014/5/24
many	
  other	
  ‘misuseable’	
  services	
•  ntp	
  
•  snmp	
  
•  games	
  
•  useful	
  talk	
  at	
  RIPE68	
  last	
  week	
  
–  hJps://ripe68.ripe.net/presentaIons/227-­‐RIPE68_2014_CRossow_AmplificaIon_stripped.pdf	
  
2014/5/24	
 maz@iij.ad.jp	
 35
conclusion	
•  implement	
  BCP38	
  
– enforce	
  source	
  IP	
  address	
  in	
  your	
  network	
  
•  implement	
  access	
  control	
  for	
  your	
  services	
  
– source	
  IP	
  address	
  based	
  filtering	
  
2014/5/24	
 maz@iij.ad.jp	
 36

Contenu connexe

Tendances

Scaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway
 
66 pfsense tutorial
66 pfsense tutorial66 pfsense tutorial
66 pfsense tutorialequinonesr
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking ExplainedThomas Graf
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
 
A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsGunter Van de Velde
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentationSimon Vass
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based Architecture3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based ArchitectureSridhar Bhaskaran
 
Kamailio, FreeSWITCH, and the Half-Blood Prince
Kamailio, FreeSWITCH, and the Half-Blood PrinceKamailio, FreeSWITCH, and the Half-Blood Prince
Kamailio, FreeSWITCH, and the Half-Blood PrinceFred Posner
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Mohamed Al-Natour
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)NetProtocol Xpert
 
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail AliSP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail AliMyNOG
 

Tendances (20)

Scaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN Fabric
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
66 pfsense tutorial
66 pfsense tutorial66 pfsense tutorial
66 pfsense tutorial
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
 
A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodings
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based Architecture3GPP 5G Control Plane Service Based Architecture
3GPP 5G Control Plane Service Based Architecture
 
Kamailio, FreeSWITCH, and the Half-Blood Prince
Kamailio, FreeSWITCH, and the Half-Blood PrinceKamailio, FreeSWITCH, and the Half-Blood Prince
Kamailio, FreeSWITCH, and the Half-Blood Prince
 
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guideAruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail AliSP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
 

En vedette

Policy SIG (3) Agenda
Policy SIG (3) AgendaPolicy SIG (3) Agenda
Policy SIG (3) AgendaAPNIC
 
IPv6 Deployment in Bangladesh
IPv6 Deployment in BangladeshIPv6 Deployment in Bangladesh
IPv6 Deployment in BangladeshAPNIC
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveFakrul Alam
 
DDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationDDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationFakrul Alam
 

En vedette (20)

Introductory Presentation of bdNOG
Introductory Presentation of bdNOGIntroductory Presentation of bdNOG
Introductory Presentation of bdNOG
 
Driver Distraction Management Using Sensor Data Cloud
Driver Distraction Management Using Sensor Data Cloud Driver Distraction Management Using Sensor Data Cloud
Driver Distraction Management Using Sensor Data Cloud
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
 
ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework ICANN Security, Stability and Resiliency Plans & Framework
ICANN Security, Stability and Resiliency Plans & Framework
 
Engaging with Internet Society
Engaging with Internet SocietyEngaging with Internet Society
Engaging with Internet Society
 
Information Society Innovation Fund (ISIF) Showcase
Information Society Innovation Fund (ISIF) Showcase Information Society Innovation Fund (ISIF) Showcase
Information Society Innovation Fund (ISIF) Showcase
 
Internet Measurement Network
Internet Measurement Network Internet Measurement Network
Internet Measurement Network
 
IPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in Bangladesh IPv6 Deployment Status in Bangladesh
IPv6 Deployment Status in Bangladesh
 
Discovering and Participating at ICANN
Discovering and Participating at ICANNDiscovering and Participating at ICANN
Discovering and Participating at ICANN
 
IRR Toolset, RPSL
IRR Toolset, RPSL IRR Toolset, RPSL
IRR Toolset, RPSL
 
Configuration Management in Ansible
Configuration Management in Ansible Configuration Management in Ansible
Configuration Management in Ansible
 
Application of local Internet content
Application of local Internet content Application of local Internet content
Application of local Internet content
 
Fast Convergence in IP Network
Fast Convergence in IP Network Fast Convergence in IP Network
Fast Convergence in IP Network
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
 
Policy SIG (3) Agenda
Policy SIG (3) AgendaPolicy SIG (3) Agenda
Policy SIG (3) Agenda
 
IPv6 Deployment in Bangladesh
IPv6 Deployment in BangladeshIPv6 Deployment in Bangladesh
IPv6 Deployment in Bangladesh
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
 
DDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationDDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection Mitigation
 

Similaire à Network Security Best Practice (BCP38 & 140)

Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6Private
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesterscamsec
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
보안위협 관리통제
보안위협 관리통제보안위협 관리통제
보안위협 관리통제Munkyeonggu
 
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and RealitySwiss IPv6 Council
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIben Rodriguez
 
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...APNIC
 
True stories on the analysis of network activity using Python
True stories on the analysis of network activity using PythonTrue stories on the analysis of network activity using Python
True stories on the analysis of network activity using Pythondelimitry
 
OpenStack Havana over IPv6
OpenStack Havana over IPv6OpenStack Havana over IPv6
OpenStack Havana over IPv6Shixiong Shang
 
ACI MultiPod Config Guide
ACI MultiPod Config GuideACI MultiPod Config Guide
ACI MultiPod Config GuideWoo Hyung Choi
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsShannon McFarland
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecCisco Russia
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Jhoni Guerrero
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponlaonap166
 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThe Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThomas Graf
 

Similaire à Network Security Best Practice (BCP38 & 140) (20)

Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
보안위협 관리통제
보안위협 관리통제보안위협 관리통제
보안위협 관리통제
 
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
 
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...
AutoIP -A mechanism for IPv6 migration and IPv4 sunsetting by Shishio Tsuchiy...
 
True stories on the analysis of network activity using Python
True stories on the analysis of network activity using PythonTrue stories on the analysis of network activity using Python
True stories on the analysis of network activity using Python
 
OpenStack Havana over IPv6
OpenStack Havana over IPv6OpenStack Havana over IPv6
OpenStack Havana over IPv6
 
ACI MultiPod Config Guide
ACI MultiPod Config GuideACI MultiPod Config Guide
ACI MultiPod Config Guide
 
ACI MultiPod 구성
ACI MultiPod 구성ACI MultiPod 구성
ACI MultiPod 구성
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack Environments
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThe Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
 

Plus de Bangladesh Network Operators Group

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephBangladesh Network Operators Group
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaBangladesh Network Operators Group
 

Plus de Bangladesh Network Operators Group (20)

Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
 
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
 
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptxBdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with GrafanaRe-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
 
RPKI ROA updates
RPKI ROA updatesRPKI ROA updates
RPKI ROA updates
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 

Dernier

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Dernier (20)

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Network Security Best Practice (BCP38 & 140)

  • 1. BCP38  and  BCP140 Matsuzaki  ‘maz’  Yoshinobu   <maz@iij.ad.jp> 2014/5/24 maz@iij.ad.jp 1
  • 2. 2014/5/24   maz@iij.ad.jp   2   IP  reflecIon  aJack   IP  spoofed  queries   replies   vicIm   AJacker  
  • 3. 2014/5/24   maz@iij.ad.jp   3   DNS  amplificaIon  aJack   DNS  DNS   DNS   vicIm   Command&Control   DNS   DNS   stub-­‐resolvers   full-­‐resolvers   root-­‐servers   tld-­‐servers   example-­‐servers   botnet   IP  spoofed   DNS  queries   ISP  Cache  DNS CPE/Routers
  • 4. 2014/5/24   maz@iij.ad.jp   4   NTP  amplificaIon  aJack   NTP   NTP   vicIm   Command&Control   botnet   IP  spoofed   NTP  queries  
  • 5. weakness •  AJackers  love  weakness,  as  it’s  useful   – ‘weaker’  means  ‘easier’  for  them   •  AJackers  will  waste  your  resources  if  you   don’t  improve  your  security   – internaIonal  bandwidth   – cpu  power   – etc.   2014/5/24 maz@iij.ad.jp 5
  • 6. 2014/5/24   maz@iij.ad.jp   6   aJacker   soluIons  against  IP  reflecIon  aJacks   IP  spoofed  packets   vicIm   open   amplifier   prevenIng   IP  spoofing   client   authorizaIon   BCP38 BCP140
  • 7. 2014/5/24   maz@iij.ad.jp   7   Source  Address  ValidaIon/BCP38   •  ValidaIng  source  IP  address  of  incoming  packets   –  BCP38/RFC2827   •  All  providers  of  Internet  connecIvity  are  urged  to  implement   filtering  described  in  this  document  to  prohibit  aJackers  from   using  forged  source  addresses...   –  BCP84/RFC3704     •  It  is  important  for  ISPs  to  implement  ingress  filtering  to  prevent   spoofed  addresses  being  used,  both  to  curtail  DoS  aJacks  and  to   make  them  more  traceable,  and  to  protect  their  own   infrastructure.    
  • 8. BCP38  should  be  deployed  as  close  to   the  edge  as  possible •  It’s  reasonable  to  deploy  BCP38  at  provider  edge  routers   precise  rule  can  be   applied  for  the   packet.  J     not  enough  informaIon  to   apply  strict  rule,   just  able  to  check  if  its   source  IP  is  routable  or  not   2014/5/24 maz@iij.ad.jp 8 packet
  • 9. 2014/5/24   maz@iij.ad.jp   9   enforcing  the  verificaIon  by:   •  ACL   – packet  filter   – permit  valid-­‐source,  then  drop  any   •  uRPF  check   – using  ‘rouIng  table’   – look-­‐up  the  return  path  for  the  source  IP  address   – use  strict  mode  for  your  customers   •  you  can’t  stop  IP  reflecIon  aJacks  by  loose  mode  
  • 10. 10   cisco  ACL  example   customer  network    192.168.0.0/24   2001:db8:ff::/48   ip  access-­‐list  extended  fromCUSTMER4    permit  ip  192.168.0.0  0.0.255.255  any    permit  ip  10.0.0.0  0.0.0.3  any    deny      ip    any  any   !   IPv6  access-­‐list  fromCUSTMER6    permit  ipv6  2001:db8::/64  any    permit  ipv6  any  2001:db8::/64  any    permit  ipv6  2001:db8:ff::/48  any    permit  ipv6  fe80::/10  fe80::/10    permit  ipv6  fe80::/10  ff02::/16    deny  ipv6  any  any   !   interface  Gigabitethernet0/0    ip  access-­‐group  fromCUSTOMER4  in    ipv6  traffic-­‐filter  fromCUSTOMER6  in   point-­‐to-­‐point   10.0.0.0/30   2001:db8::/64   ISP  Edge  Router   2014/5/24 maz@iij.ad.jp
  • 11. 11   juniper  IPv4  ACL  example   firewall  family  inet  {    filter  fromCUSTOMER4  {      term  CUSTOMER4  {  from        source-­‐address  {          192.168.0.0/16;          10.0.0.0/30;        }        then  accept;      }      term  Default  {        then  discard;   }}}   [edit  interface  ge-­‐0/0/0  unit  0  family  inet]   filter  {    input  fromCUSTOMER;   }     customer  network    192.168.0.0/24   2001:db8:ff::/48   point-­‐to-­‐point   10.0.0.0/30   2001:db8::/64   ISP  Edge  Router   2014/5/24 maz@iij.ad.jp
  • 12. 12   juniper  IPv6  ACL  example   firewall  family  inet6  {    filter  fromCUSTOMER6  {      term  CUSTOMER6  {  from        source-­‐address  {          2001:db8::/64;          2001:db8:ff::/48;        }        then  accept;      }      term  LINKLOCAL  {  from          source-­‐address  {              fe80::/10;          }  desInaIon-­‐address  {              fe80::/10;              ff02::/16;          }          then  accept;      }      term  Default  {        then  discard;   }}}   [edit  interface  ge-­‐0/0/0  unit  0  family  inet6]   filter  {    input  fromCUSTOMER6;   }     customer  network    192.168.0.0/24   2001:db8:ff::/48   point-­‐to-­‐point   10.0.0.0/30   2001:db8::/64   ISP  Edge  Router   2014/5/24 maz@iij.ad.jp
  • 13. 13   cisco  uRPF  example     interface  Gigabitethernet0/0      ip  verify  unicast  source  reachable-­‐via  rx      ipv6  verify  unicast  source  reachable-­‐via  rx     uRPF   customer  network    192.168.0.0/24   2001:db8:ff::/48   point-­‐to-­‐point   10.0.0.0/30   2001:db8::/64   ISP  Edge  Router   2014/5/24 maz@iij.ad.jp
  • 14. 14   juniper  uRPF  example   [edit  interface  ge-­‐0/0/0  unit  0]    family  inet  {  rpf-­‐check;  }    family  inet6  {  rpf-­‐check;  }   uRPF   customer  network    192.168.0.0/24   2001:db8:ff::/48   point-­‐to-­‐point   10.0.0.0/30   2001:db8::/64   ISP  Edge  Router   2014/5/24 maz@iij.ad.jp
  • 15. 2014/5/24   maz@iij.ad.jp   15   BCP38  deployment  at  IIJ/AS2497 peering  ASes   Upstream  ASes   IIJ/AS2497   uRPF  strict  mode uRPF  loose  mode mulI  homed   AS/ISP  customers   consumer   Enterprise   Customers   consumer  
  • 16. uRPF •  lookup  a  reverse  path  by  source  IP  address     •  strict  mode   – the  incoming  interface  should  match  with  the   rouIng  table   •  loose  mode   – there  should  be  a  valid  rouIng  entry  for  the   source  IP  address   2014/5/24 maz@iij.ad.jp 16
  • 17. packet  forwarding  –  dst-­‐ip  based •  rouIng_table(dst-­‐ip)  =>  outgoing  interface   – lookup  by  10.0.0.1  =>  if.i   – then  router  forwards  the  packet IP  packet dst-­‐ip src-­‐ip data src ip:  192.0.2.1 dst-­‐ip ip:  10.0.0.1 dst 2014/5/24 17 maz@iij.ad.jp if.o if.i 192.0.2.0/28 10.0.0.0/8 if.o if.i rouIng  table
  • 18. uRPF  –  lookup  by  the  src-­‐ip •  rouIng_table(src-­‐ip)  =>  interface   – lookup  by  192.0.2.1  =>  if.o   – The  result  MUST  match  the  incoming  interface IP  packet dst-­‐ip src-­‐ip data src ip:  192.0.2.1 dst-­‐ip ip:  10.0.0.1 dst 2014/5/24 18 maz@iij.ad.jp if.o if.i 192.0.2.0/28 10.0.0.0/8 if.o if.i rouIng  table
  • 19. aJack  against  a  web  site •  110Kpps  of  TCP  SYN  flood  was  observed   2014/5/24 maz@iij.ad.jp 19
  • 20. uRPF  loose  did  reduce  the  aJack •  The  aJack  was  prevented  if  the  admin  at  the   aJack  source  has  deployed  BCP38 about  30%  of  the  aJack  packets  were  reduced  by  uRPF  loose  mode 2014/5/24 maz@iij.ad.jp 20
  • 22. BCP38  is  useful  to  protect  yourself •  many  access  controls  are  depending  on   validity  of  source  IP  address   – source  IP  address  based  filtering   – ACL  on  vty,  snmp  and  etc   •  If  your  users  can  spoof  source  IP  address,  sIll   it’s  reliable   2014/5/24 maz@iij.ad.jp 22
  • 23. BCP140  (RFC5358) •  PrevenIng  Use  of  Recursive  Nameservers  in   Reflector  AJacks   – Best  Current  PracIce   – hJps://tools.iex.org/html/bcp140   •  RecommendaIons:   1.  Disabling  recursive  service  where  it’s  not   necessary   2.  ImplemenIng  client  authorizaIon   maz@iij.ad.jp 23 2014/5/24
  • 24. implemenIng  BCP140 •  Several  ISPs  in  Japan  have  operated  ‘open’   recursive  nameservers  for  many  years.    As   these  servers  tend  to  be  used  in  dns  amp   aJacks,  ISPs  decided  to  put  ACL  to  accept   queries  from  its  customers  only  -­‐  BCP140.   maz@iij.ad.jp 24 2014/5/24
  • 25. Client  AuthorizaIon •  BCP140  describes  several  ways:   1.  source  IP  address  based   2.  Incoming  interface  based   3.  TSIG/SIG(0)  signed  queries   4.  using  a  local  caching  nameserver   •  The  1st  one  is  the  opIon  for  ISPs   – no  other  choice  at  this  moment   •  source  IP  address  based  authorizaIon   – in  other  words,  ACL  J   maz@iij.ad.jp 25 2014/5/24
  • 26. Technically  it’s  quite  easy //  BIND9  recursive  service  example   acl  my-­‐net  {  192.0.2.0/24;  2001:db8::/32;  };   opIons  {        recursion  yes;        allow-­‐query  {  my-­‐net;  };   }; maz@iij.ad.jp 26 2014/5/24
  • 27. There  should  not  be  issues •  Usually  users  automaIcally  get  DNS  seyng   – PPPoE   – DHCP   •  System  integrators  who  are  responsible  for   enterprise  network  keep  its  seyng  up-­‐to-­‐date   maz@iij.ad.jp 27 2014/5/24
  • 28. real  situaIons  L •  Some  users  staIcally  setup  DNS  seyng  on   their  devices,  and  don’t  change  it  forever  even   a{er  switching  ISPs   •  Lazy  system  integrators  use  nameservers   which  they  just  know  and  leave  them  forever   •  Some  users  change  DNS  seyng  based  on  a   rumor  like  ‘you  can  get  more  internet  speed   by  changing  DNS  seyng’ maz@iij.ad.jp 28 2014/5/24
  • 29. IIJ  case •  public  announcement  on  Sept  2013   – “for  those  who  used  IIJ  services  before”   – corporate  web  site   •  hJp://www.iij.ad.jp/company/development/tech/ acIviIes/open_resolver/   – technical  blog   •  hJp://techlog.iij.ad.jp/archives/718   – news  site   •  about  3months  before  implemenIng   maz@iij.ad.jp 29 2014/5/24
  • 30. 2st  Dec  2013  12:00JST •  IIJ’s  cache  nameservers  started  to  serve  its   customers  only   •  For  queries  from  outside,  the  nameservers  are   answering  staIc  A  to  lead  users  to  a  warning   web  page.   – saying  “your  dns  seyng  is  not  valid  anymore,  so   you  need  change  your  seyng  to  access  the   internet.    please  contact  your  ISP  or  network   administrator  for  further  assistance.”   maz@iij.ad.jp 30 2014/5/24
  • 31. the  warning  page •  Simple  text  only   – no  javascript   – no  image   – no  link   •  At  first  we  put  the  name  of  IIJ  at  the  boJom,   then  users  called  IIJ  by  searching  telephone   number  somehow   •  So  IIJ  deleted  its  name,  and  emphasized   “contact  your  ISP  or  network  administrator”   maz@iij.ad.jp 31 2014/5/24
  • 32. Users •  Some  users  sIll  could  post  messages  on  social   medias  -­‐  probably  by  using  their  smartphone   •  Some  of  them  were  suggesIng  to  use  other   publically  available  nameservers   – google’s   – just  usable  ones  L   maz@iij.ad.jp 32 2014/5/24
  • 33. collaboraIon  with  other  ISPs •  ImplemenIng  BCP140  might  increase  #  of   customer  calls  at  other  ISPs’  helpdesk   •  ISPs  shared  their  implemenIng  schedule  in   advance  each  other  so  that  ISPs  can  expect   customer  calls   •  ISP  community  could  develop  a  shared   warning  page  that  shows  the  beJer  contact   based  on  the  source  IP  address  of  the  client   maz@iij.ad.jp 33 2014/5/24
  • 34. lesson  learned •  effecIve  announcement   – public  and  also  targeted  based  on  query  log   •  collaboraIng  with  other  ISPs   – for  beJer  customer  support   •  phased  implementaIon  could  be  your  choice   •  start  early  before  the  issue  is  geyng  bigger   – more  unexpected  users  will  use  your  nameserver   maz@iij.ad.jp 34 2014/5/24
  • 35. many  other  ‘misuseable’  services •  ntp   •  snmp   •  games   •  useful  talk  at  RIPE68  last  week   –  hJps://ripe68.ripe.net/presentaIons/227-­‐RIPE68_2014_CRossow_AmplificaIon_stripped.pdf   2014/5/24 maz@iij.ad.jp 35
  • 36. conclusion •  implement  BCP38   – enforce  source  IP  address  in  your  network   •  implement  access  control  for  your  services   – source  IP  address  based  filtering   2014/5/24 maz@iij.ad.jp 36