[FCIX] DDoS mitigation for peers

Mike mike at yourtownonline.com
Mon Jan 23 16:15:02 PST 2023


Hi,

     We are an ISP and have a certain amount of DDoS mitigation on our 
ip transit (RTBH advertised to iptransit, and BGP flowspec internal to 
us). This works to squelch ddos flows in most cases, even at the expense 
of that one end user that is the unfortunate target. However, this 
arrangement really only works because our ip transit honors a community 
that triggers RTBH so our transit links don't get smashed. In the case 
of a peer, such as you fine folks on fcix, however, we have no such 
luxury. The route-servers are just playing matchmaker so we know the l2 
nexthop for any route, but there is no direct BGP and thus no way to 
advertise an RTBH even assuming we knew which peer was sending to us in 
a hypothetical flood. In theory then, while ip transit can be mitigated, 
a peer sending a flood cannot (except by locally dropping the bad flows, 
which allows the peering port to be flooded).

     Surely, this situation has been thought about and someone has a 
well engineered solution to this problem? I think we likely could 
establish BGP peering across fcix and only allow peers that support 
RTBH, but that would exclude some who likely we may want peering with 
anyways because they have cool rainbow striped packets we also want in 
our network anyways, even if they might not support RTBH (I'm looking at 
you, AS399306!). I think the likelihood of a ddos being delivered over 
the peering connections is far less than the likelihood of being 
received over iptransit, still, it seems like this would be an issue to 
consider. And if we were to go thru the trouble of establishing BGP with 
everyone who says they can support RTBH, it seems like a huge 
administrative burden. Is there any other best practice solution or are 
we just on our own?


Mike Ireton

Your Town Online, Inc

AS11472








More information about the Members mailing list