Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> As a result, I'm going to add recurring testing for this capability and burn a couple IPs to make sure upstreams are listening to our rtbh announcements.

Could you or someone else expand on this? How do you coordinate rtbh with your ISP? And how do you check for whether it's working? I'd love to learn more on this topic. Thanks!



Many ISPs (better called transit providers in this context) offer a service whereby you announce to them a route (over BGP) with a specific BGP community, sometimes over a special session, sometimes inband with your normal transit sessions and they will blackhole (route to discard, null0, /dev/null) all traffic to that IP. Unlike normal internet announcements these are generally (exclusively with the providers i've worked with) available down to the smallest IP unit (v4/32, v6/64) so you can blackhole an IP which is being attacked without impacting other IPs inside the same subnet.

How do you test it? Very simple. Announce an IP (or a few) as blackhole and test to make sure things don't work (from that IP).

Very simply could setup something to ping something on that provider's infrastructure from that IP and... if it starts to work, alert!


To my knowledge there's also ways to integrate network observability tools (like kentik) to automate this to a degree, for those that are big enough or DDOS events are common enough that is useful to do so.

I imagine getting paged because of a DDOS is slightly easier when it's telling you it already null routed a few IPs so the rest of your network isn't screwed and you just have to identify how problematic those specific IPs being out of service is and whether you need to take action or wait for them to get bored.


That sort of encourages the attackers, because from their point of view, the attack is succeeding while the IP is being blackholed.


I think it’s more about mitigating collateral damage for cases where only one customer of the ISP is being targeted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: