SlideShare a Scribd company logo
1 of 28
Copyright © 2014 Juniper Networks, Inc.1
DDoS Mitigation
Using BGP Flowspec
Justin Ryburn
Consulting Engineer
jryburn@juniper.net
Copyright © 2014 Juniper Networks, Inc.2
Background
•  Who is this guy?
•  http://www.linkedin.com/in/justinryburn
•  Why this topic?
•  Experience tracking DDoS “back in the day”
Copyright © 2014 Juniper Networks, Inc.3
Agenda
•  Problem Statement
•  Legacy DDoS Mitigation Methods
•  BGP Flowspec Overview
•  Use Case Examples
•  State of the Union
Copyright © 2014 Juniper Networks, Inc.4
Problem Statement
Copyright © 2014 Juniper Networks, Inc.5 Copyright © 2014 Juniper Networks, Inc.5
Is DDoS Really an Issue?
“…taking down a site or preventing transactions is only the tip of the iceberg. A DDoS
attack can lead to reputational losses or legal claims over undelivered services.”
Kaspersky Lab [1]
Verisign [2]
“Attacks in the 10 Gbps and
above category grew by 38%
from Q2 … Q3.”
NBC News [3]
“…more than 40 percent
estimated DDoS losses at more
than $1 million per day.”
Tech Times [4]
“DDoS attack cripples Sony
PSN while Microsoft deals with
Xbox Live woes”
Copyright © 2014 Juniper Networks, Inc.6
Legacy DDoS Mitigation
Methods
Copyright © 2014 Juniper Networks, Inc.7
Blocking DDoS in the “Old” Days
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
203.0.113.0/24	
  
203.0.113.0/24	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  might	
  connect	
  to	
  each	
  
router	
  and	
  add	
  filter	
  
x
SP NOC
•  Easy to implement and uses well understood constructs
•  Requires high degree of co-ordination between customer and provider
•  Cumbersome to scale in a large network perimeter
•  Mis-configuration possible and expensive
203.0.113.0/24	
  
Copyright © 2014 Juniper Networks, Inc.8
Destination Remotely Triggered Black Hole
(D/RTBH)
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
203.0.113.1/32	
  
203.0.113.1/32	
  
VicAm	
  iniAates	
  RTBH	
  
announcement	
  
BGP	
  Prefix	
  with	
  next-­‐hop	
  
set	
  to	
  discard	
  route.	
  
x
•  RFC 3882 circa 2004
•  Requires pre-configuration of discard route on all edge routers
•  Victim’s destination address is completely unreachable but attack (and collateral damage) is
stopped.
203.0.113.1/32	
  
Copyright © 2014 Juniper Networks, Inc.9
Source Remotely Triggered Black Hole
(S/RTBH)
•  RFC 5635 circa 2009
•  Requires pre-configuration of discard route and uRPF on all edge routers
•  Victim’s destination address is still useable
•  Only works for single (or small number) source.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  S/RTBH	
  on	
  
route	
  server	
  
x
SP NOC
BGP	
  prefix	
  with	
  next-­‐hop	
  
pointed	
  at	
  discard	
  and	
  
uRPF	
  enabled.	
  
Copyright © 2014 Juniper Networks, Inc.10
BGP FlowSpec Overview
Copyright © 2014 Juniper Networks, Inc.11
BGP Flow Specification
•  Specific information about a flow can now be distributed using a BGP
NLRI defined in RFC 5575 [5] circa 2009
•  AFI/SAFI = 1/133: Unicast Traffic Filtering Applications
•  AFI/SAFI = 1/134: VPN Traffic Filtering Applications
•  Flow routes are automatically validated against unicast routing
information or via routing policy framework.
•  Must belong to the longest match unicast prefix.
•  Once validated, firewall filter is created based on match and action
criteria.
Copyright © 2014 Juniper Networks, Inc.12
BGP Flow Specification
•  BGP Flowspec can include the following information:
•  Type 1 - Destination Prefix
•  Type 2 - Source Prefix
•  Type 3 - IP Protocol
•  Type 4 – Source or Destination Port
•  Type 5 – Destination Port
•  Type 6 - Source Port
•  Type 7 – ICMP Type
•  Type 8 – ICMP Code
•  Type 9 - TCP flags
•  Type 10 - Packet length
•  Type 11 – DSCP
•  Type 12 - Fragment Encoding
Copyright © 2014 Juniper Networks, Inc.13
BGP Flow Specification
•  Actions are defined using BGP Extended Communities:
•  0x8006 – traffic-rate (set to 0 to drop all traffic)
•  0x8007 – traffic-action (sampling)
•  0x8008 – redirect to VRF (route target)
•  0x8009 – traffic-marking (DSCP value)
Copyright © 2014 Juniper Networks, Inc.14
Vendor Support
•  DDoS Detection Vendors:
•  Arbor Peakflow SP 3.5
•  Accumuli DDoS Secure
•  Router Vendors:
•  Alcatel-Lucent SR OS 9.0R1
•  Juniper JUNOS 7.3
•  Cisco 5.2.0 for ASR and CRS [6]
•  OpenSource BGP Software:
•  ExaBGP
Copyright © 2014 Juniper Networks, Inc.15
What Makes BGP Flowspec Better?
•  Same granularity as ACLs
•  Based on n-tuple matching
•  Same automation as RTBH
•  Much easier to propagate filters to all edge routers in large networks
•  Leverages BGP best practices and policy controls
•  Same filtering and best practices used for RTBH can be applied to BGP
Flowspec
Copyright © 2014 Juniper Networks, Inc.16
Caveats
•  Forwarding Plane resources
•  Creating dynamic firewall filters that use these resources
•  More complex FS routes/filters will use more resources
•  Need to test your vendors limits and what happens when it is hit
•  Usually ways to limit the number and complexity of filters to avoid issues
•  Not a replacement technology
•  Should be ADDED to existing mitigation methods and not replace them
•  When it goes wrong (bugs) it goes wrong fast
•  Cloudflare outage:
https://blog.cloudflare.com/todays-outage-post-mortem-82515/
Copyright © 2014 Juniper Networks, Inc.17
Use Case Examples
Copyright © 2014 Juniper Networks, Inc.18
Inter-domain DDoS Mitigation Using Flowspec
Service Provider
203.0.113.1/32,*,17,53	
  
Internet Enterprise or DC
203.0.113.1	
  
VicAm	
  iniAates	
  Flowspec	
  
announcement	
  for	
  53/UDP	
  
only	
  
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  rate	
  0.	
  
x
•  Allows ISP customer to initiate the filter.
•  Requires sane filtering at customer edge.
Copyright © 2014 Juniper Networks, Inc.19
Intra-domain DDoS Mitigation Using Flowspec
•  Could be initiated by phone call, detection in SP network, or a web portal for the customer.
•  Requires co-ordination between customer and provider.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  Flowpec	
  
route	
  on	
  route	
  server	
  
x
SP NOC
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  rate	
  0.	
  
Copyright © 2014 Juniper Networks, Inc.20
DDoS Mitigation Using Scrubbing Center
•  Could be initiated by phone call, detection in SP network, or a web portal for the customer.
•  Allows for mitigating application layer attacks without completing the attack.
Service Provider
Internet Enterprise or DC
203.0.113.1	
  
“HELP”	
  I’m	
  being	
  a1acked.	
  
NOC	
  configures	
  Flowpec	
  
route	
  on	
  route	
  server	
  
x
SP NOC
BGP	
  Prefix	
  installed	
  with	
  
acAon	
  set	
  to	
  redirect.	
  
Scrubbing
Center
A1ack	
  traffic	
  is	
  scrubbed	
  
by	
  DPI	
  appliance.	
  
LegiAmate	
  traffic	
  sent	
  to	
  
customer	
  via	
  GRE	
  or	
  VRF	
  
tunnel.	
  
Copyright © 2014 Juniper Networks, Inc.21
Real World Example (TDC)
"Where I think FlowSpec excels, is for protection of our mobile platform.
2 /24s are shared among a million mobile devices with NAT in a firewall.
The link capacity (and in part the firewall itself) is overloaded by a simple DDoS attack
against just one of these adresses.
The system detects a DoS attack against an address on the firewall.
It will identify total traffic, UDP, fragments, TCP SYN, ICMP, whatever, and depending on what
kind of attack it is, a policer is added for the specific protocol/attack on individual
peering routers. Protocols are policed with individual policers, so that for instance
UDP and TCP SYN can be policed to different throughputs.
Basically, an attack against a single IP on UDP will not affect other customers being NAT'ed
to the same address, using anything but UDP - and link capacity is protected."
Copyright © 2014 Juniper Networks, Inc.22
Real World Example
•  Attack on 1/13/16
Copyright © 2014 Juniper Networks, Inc.23
Where Are We Going?
•  IPv6 Support
•  http://tools.ietf.org/html/draft-ietf-idr-flow-spec-v6-06
•  Relaxing Validation
•  http://tools.ietf.org/html/draft-ietf-idr-bgp-flowspec-oid-02
•  Redirect to IP Action
•  https://tools.ietf.org/html/draft-ietf-idr-flowspec-redirect-ip-02
Copyright © 2014 Juniper Networks, Inc.24
State of the Union
Copyright © 2014 Juniper Networks, Inc.25
Summary of Survey
•  Great idea and would love to see it take off but…
•  Enterprises and Content Providers are waiting for ISPs to accept their
Flowspec routes.
•  Some would even be willing to switch to an ISP that did this.
•  ISPs are waiting for vendors to support it.
•  More vendors supporting it
•  Specific features they need for their environment
•  Better scale or stability
Copyright © 2014 Juniper Networks, Inc.26
References
•  [1] Kaspersky Lab – Every Third Public Facing Company Encounters DDoS
Attacks http://tinyurl.com/neu4zzr
•  [2] Verisign – 2014 DDoS Attack Trends http://tinyurl.com/oujgx94
•  [3] NBC News – Internet Speeds are Rising Sharply, But So Are Hack Attacks
http://tinyurl.com/q4u2b7m
•  [4] Tech Times – DDoS Attack Cripples Sony PSN While Microsoft Deals with
Xbox Live Woes http://tinyurl.com/kkdczjx
•  [5] RFC 5575 - Dissemination of Flow Specification Rules
http://www.ietf.org/rfc/rfc5575.txt
•  [6] Cisco - Implementing BGP Flowspec http://tinyurl.com/mm5w7mo
•  [7] Cisco – Understanding BGP Flowspec http://tinyurl.com/l4kwb3b
Copyright © 2014 Juniper Networks, Inc.27
More Information
•  NANOG PDF
•  NANOG YouTube Video
•  Day One Guide
Thank You!

More Related Content

What's hot

Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
P1Security
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
Febrian ‎
 

What's hot (20)

Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
Migrating from OSPF to IS-IS by Philip Smith
Migrating from OSPF to IS-IS by Philip SmithMigrating from OSPF to IS-IS by Philip Smith
Migrating from OSPF to IS-IS by Philip Smith
 
Bgp
BgpBgp
Bgp
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
BIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To AdvancedBIND DNS IPWorks Introduction To Advanced
BIND DNS IPWorks Introduction To Advanced
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 

Viewers also liked

Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
MyNOG
 

Viewers also liked (17)

Misused top ASNs
Misused top ASNsMisused top ASNs
Misused top ASNs
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)Flowspec @ Bay Area Juniper User Group (BAJUG)
Flowspec @ Bay Area Juniper User Group (BAJUG)
 
2015-ShowNet -DDoS/IX/BGPFlowspec/External
2015-ShowNet -DDoS/IX/BGPFlowspec/External2015-ShowNet -DDoS/IX/BGPFlowspec/External
2015-ShowNet -DDoS/IX/BGPFlowspec/External
 
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed RawiManaging Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
Managing Traffic Flows via BGP Flowspec by Mohd Izni Zuhdi Mohamed Rawi
 
Bgpcep odl summit 2015
Bgpcep odl summit 2015Bgpcep odl summit 2015
Bgpcep odl summit 2015
 
Deep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection SystemDeep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection System
 
BGP Monitoring Protocol
BGP Monitoring ProtocolBGP Monitoring Protocol
BGP Monitoring Protocol
 
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
2015.7.17 JANOG36 BGP Flowspec Interoperability Test @ Interop Tokyo 2015 Sho...
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS ShieldDNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS AttacksAnnouncing AWS Shield - Protect Web Applications from DDoS Attacks
Announcing AWS Shield - Protect Web Applications from DDoS Attacks
 
BGP persistence
BGP persistenceBGP persistence
BGP persistence
 
LISP and NSH in Open vSwitch
LISP and NSH in Open vSwitchLISP and NSH in Open vSwitch
LISP and NSH in Open vSwitch
 

Similar to DDoS Mitigation using BGP Flowspec

Similar to DDoS Mitigation using BGP Flowspec (20)

IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
DDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and TechniquesDDoS Mitigation Tools and Techniques
DDoS Mitigation Tools and Techniques
 
Kubernetes OpenContrail Meetup
Kubernetes OpenContrail MeetupKubernetes OpenContrail Meetup
Kubernetes OpenContrail Meetup
 
MTCTCE.pdf
MTCTCE.pdfMTCTCE.pdf
MTCTCE.pdf
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?
 
2017 01-31-cgns
2017 01-31-cgns2017 01-31-cgns
2017 01-31-cgns
 
How Does SDN Fit into the Data Centre?
How Does SDN Fit into the Data Centre?How Does SDN Fit into the Data Centre?
How Does SDN Fit into the Data Centre?
 
The State of 3G/GPRS IPv6 Deployment
The State of 3G/GPRS IPv6 DeploymentThe State of 3G/GPRS IPv6 Deployment
The State of 3G/GPRS IPv6 Deployment
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment Routing
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
 

More from APNIC

More from APNIC (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 

DDoS Mitigation using BGP Flowspec

  • 1. Copyright © 2014 Juniper Networks, Inc.1 DDoS Mitigation Using BGP Flowspec Justin Ryburn Consulting Engineer jryburn@juniper.net
  • 2. Copyright © 2014 Juniper Networks, Inc.2 Background •  Who is this guy? •  http://www.linkedin.com/in/justinryburn •  Why this topic? •  Experience tracking DDoS “back in the day”
  • 3. Copyright © 2014 Juniper Networks, Inc.3 Agenda •  Problem Statement •  Legacy DDoS Mitigation Methods •  BGP Flowspec Overview •  Use Case Examples •  State of the Union
  • 4. Copyright © 2014 Juniper Networks, Inc.4 Problem Statement
  • 5. Copyright © 2014 Juniper Networks, Inc.5 Copyright © 2014 Juniper Networks, Inc.5 Is DDoS Really an Issue? “…taking down a site or preventing transactions is only the tip of the iceberg. A DDoS attack can lead to reputational losses or legal claims over undelivered services.” Kaspersky Lab [1] Verisign [2] “Attacks in the 10 Gbps and above category grew by 38% from Q2 … Q3.” NBC News [3] “…more than 40 percent estimated DDoS losses at more than $1 million per day.” Tech Times [4] “DDoS attack cripples Sony PSN while Microsoft deals with Xbox Live woes”
  • 6. Copyright © 2014 Juniper Networks, Inc.6 Legacy DDoS Mitigation Methods
  • 7. Copyright © 2014 Juniper Networks, Inc.7 Blocking DDoS in the “Old” Days Service Provider Internet Enterprise or DC 203.0.113.1   203.0.113.0/24   203.0.113.0/24   “HELP”  I’m  being  a1acked.   NOC  might  connect  to  each   router  and  add  filter   x SP NOC •  Easy to implement and uses well understood constructs •  Requires high degree of co-ordination between customer and provider •  Cumbersome to scale in a large network perimeter •  Mis-configuration possible and expensive 203.0.113.0/24  
  • 8. Copyright © 2014 Juniper Networks, Inc.8 Destination Remotely Triggered Black Hole (D/RTBH) Service Provider Internet Enterprise or DC 203.0.113.1   203.0.113.1/32   203.0.113.1/32   VicAm  iniAates  RTBH   announcement   BGP  Prefix  with  next-­‐hop   set  to  discard  route.   x •  RFC 3882 circa 2004 •  Requires pre-configuration of discard route on all edge routers •  Victim’s destination address is completely unreachable but attack (and collateral damage) is stopped. 203.0.113.1/32  
  • 9. Copyright © 2014 Juniper Networks, Inc.9 Source Remotely Triggered Black Hole (S/RTBH) •  RFC 5635 circa 2009 •  Requires pre-configuration of discard route and uRPF on all edge routers •  Victim’s destination address is still useable •  Only works for single (or small number) source. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  S/RTBH  on   route  server   x SP NOC BGP  prefix  with  next-­‐hop   pointed  at  discard  and   uRPF  enabled.  
  • 10. Copyright © 2014 Juniper Networks, Inc.10 BGP FlowSpec Overview
  • 11. Copyright © 2014 Juniper Networks, Inc.11 BGP Flow Specification •  Specific information about a flow can now be distributed using a BGP NLRI defined in RFC 5575 [5] circa 2009 •  AFI/SAFI = 1/133: Unicast Traffic Filtering Applications •  AFI/SAFI = 1/134: VPN Traffic Filtering Applications •  Flow routes are automatically validated against unicast routing information or via routing policy framework. •  Must belong to the longest match unicast prefix. •  Once validated, firewall filter is created based on match and action criteria.
  • 12. Copyright © 2014 Juniper Networks, Inc.12 BGP Flow Specification •  BGP Flowspec can include the following information: •  Type 1 - Destination Prefix •  Type 2 - Source Prefix •  Type 3 - IP Protocol •  Type 4 – Source or Destination Port •  Type 5 – Destination Port •  Type 6 - Source Port •  Type 7 – ICMP Type •  Type 8 – ICMP Code •  Type 9 - TCP flags •  Type 10 - Packet length •  Type 11 – DSCP •  Type 12 - Fragment Encoding
  • 13. Copyright © 2014 Juniper Networks, Inc.13 BGP Flow Specification •  Actions are defined using BGP Extended Communities: •  0x8006 – traffic-rate (set to 0 to drop all traffic) •  0x8007 – traffic-action (sampling) •  0x8008 – redirect to VRF (route target) •  0x8009 – traffic-marking (DSCP value)
  • 14. Copyright © 2014 Juniper Networks, Inc.14 Vendor Support •  DDoS Detection Vendors: •  Arbor Peakflow SP 3.5 •  Accumuli DDoS Secure •  Router Vendors: •  Alcatel-Lucent SR OS 9.0R1 •  Juniper JUNOS 7.3 •  Cisco 5.2.0 for ASR and CRS [6] •  OpenSource BGP Software: •  ExaBGP
  • 15. Copyright © 2014 Juniper Networks, Inc.15 What Makes BGP Flowspec Better? •  Same granularity as ACLs •  Based on n-tuple matching •  Same automation as RTBH •  Much easier to propagate filters to all edge routers in large networks •  Leverages BGP best practices and policy controls •  Same filtering and best practices used for RTBH can be applied to BGP Flowspec
  • 16. Copyright © 2014 Juniper Networks, Inc.16 Caveats •  Forwarding Plane resources •  Creating dynamic firewall filters that use these resources •  More complex FS routes/filters will use more resources •  Need to test your vendors limits and what happens when it is hit •  Usually ways to limit the number and complexity of filters to avoid issues •  Not a replacement technology •  Should be ADDED to existing mitigation methods and not replace them •  When it goes wrong (bugs) it goes wrong fast •  Cloudflare outage: https://blog.cloudflare.com/todays-outage-post-mortem-82515/
  • 17. Copyright © 2014 Juniper Networks, Inc.17 Use Case Examples
  • 18. Copyright © 2014 Juniper Networks, Inc.18 Inter-domain DDoS Mitigation Using Flowspec Service Provider 203.0.113.1/32,*,17,53   Internet Enterprise or DC 203.0.113.1   VicAm  iniAates  Flowspec   announcement  for  53/UDP   only   BGP  Prefix  installed  with   acAon  set  to  rate  0.   x •  Allows ISP customer to initiate the filter. •  Requires sane filtering at customer edge.
  • 19. Copyright © 2014 Juniper Networks, Inc.19 Intra-domain DDoS Mitigation Using Flowspec •  Could be initiated by phone call, detection in SP network, or a web portal for the customer. •  Requires co-ordination between customer and provider. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  Flowpec   route  on  route  server   x SP NOC BGP  Prefix  installed  with   acAon  set  to  rate  0.  
  • 20. Copyright © 2014 Juniper Networks, Inc.20 DDoS Mitigation Using Scrubbing Center •  Could be initiated by phone call, detection in SP network, or a web portal for the customer. •  Allows for mitigating application layer attacks without completing the attack. Service Provider Internet Enterprise or DC 203.0.113.1   “HELP”  I’m  being  a1acked.   NOC  configures  Flowpec   route  on  route  server   x SP NOC BGP  Prefix  installed  with   acAon  set  to  redirect.   Scrubbing Center A1ack  traffic  is  scrubbed   by  DPI  appliance.   LegiAmate  traffic  sent  to   customer  via  GRE  or  VRF   tunnel.  
  • 21. Copyright © 2014 Juniper Networks, Inc.21 Real World Example (TDC) "Where I think FlowSpec excels, is for protection of our mobile platform. 2 /24s are shared among a million mobile devices with NAT in a firewall. The link capacity (and in part the firewall itself) is overloaded by a simple DDoS attack against just one of these adresses. The system detects a DoS attack against an address on the firewall. It will identify total traffic, UDP, fragments, TCP SYN, ICMP, whatever, and depending on what kind of attack it is, a policer is added for the specific protocol/attack on individual peering routers. Protocols are policed with individual policers, so that for instance UDP and TCP SYN can be policed to different throughputs. Basically, an attack against a single IP on UDP will not affect other customers being NAT'ed to the same address, using anything but UDP - and link capacity is protected."
  • 22. Copyright © 2014 Juniper Networks, Inc.22 Real World Example •  Attack on 1/13/16
  • 23. Copyright © 2014 Juniper Networks, Inc.23 Where Are We Going? •  IPv6 Support •  http://tools.ietf.org/html/draft-ietf-idr-flow-spec-v6-06 •  Relaxing Validation •  http://tools.ietf.org/html/draft-ietf-idr-bgp-flowspec-oid-02 •  Redirect to IP Action •  https://tools.ietf.org/html/draft-ietf-idr-flowspec-redirect-ip-02
  • 24. Copyright © 2014 Juniper Networks, Inc.24 State of the Union
  • 25. Copyright © 2014 Juniper Networks, Inc.25 Summary of Survey •  Great idea and would love to see it take off but… •  Enterprises and Content Providers are waiting for ISPs to accept their Flowspec routes. •  Some would even be willing to switch to an ISP that did this. •  ISPs are waiting for vendors to support it. •  More vendors supporting it •  Specific features they need for their environment •  Better scale or stability
  • 26. Copyright © 2014 Juniper Networks, Inc.26 References •  [1] Kaspersky Lab – Every Third Public Facing Company Encounters DDoS Attacks http://tinyurl.com/neu4zzr •  [2] Verisign – 2014 DDoS Attack Trends http://tinyurl.com/oujgx94 •  [3] NBC News – Internet Speeds are Rising Sharply, But So Are Hack Attacks http://tinyurl.com/q4u2b7m •  [4] Tech Times – DDoS Attack Cripples Sony PSN While Microsoft Deals with Xbox Live Woes http://tinyurl.com/kkdczjx •  [5] RFC 5575 - Dissemination of Flow Specification Rules http://www.ietf.org/rfc/rfc5575.txt •  [6] Cisco - Implementing BGP Flowspec http://tinyurl.com/mm5w7mo •  [7] Cisco – Understanding BGP Flowspec http://tinyurl.com/l4kwb3b
  • 27. Copyright © 2014 Juniper Networks, Inc.27 More Information •  NANOG PDF •  NANOG YouTube Video •  Day One Guide