0% found this document useful (0 votes)
121 views6 pages

RTBH-plus: or More Fun With BGP Communities

This document discusses ways to enhance remote triggered black hole (RTBH) routing using BGP communities. It describes options for trigger routers initiated by the provider or customer. It also discusses using RTBH internally, generally across networks, selectively for some sources or destinations, and source-based RTBH with limitations. The document recommends RTBH configurations for internal use, with providers, and selectively applying it to different geographic regions or network types. It cautions against giving customers access to source-based RTBH due to risks of misuse.

Uploaded by

Milan Lamsal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views6 pages

RTBH-plus: or More Fun With BGP Communities

This document discusses ways to enhance remote triggered black hole (RTBH) routing using BGP communities. It describes options for trigger routers initiated by the provider or customer. It also discusses using RTBH internally, generally across networks, selectively for some sources or destinations, and source-based RTBH with limitations. The document recommends RTBH configurations for internal use, with providers, and selectively applying it to different geographic regions or network types. It cautions against giving customers access to source-based RTBH due to risks of misuse.

Uploaded by

Milan Lamsal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

RTBH-plus

or more fun with BGP communities


Chris Chaundy
APNIC 36, 29-Aug-2013
RTBH REMOTE TRIGGERED BLACK HOLE
RTBH was documented in RFC 3882 and expanded on in RFC 5635.
Using these as foundations, RTBH can be further enhanced as shown
in this presentation:
Trigger router and customer initiated options
Minimum requirements
Other possibilities
Customer filters and limitations
RTBH scope of operation
Internal
General
Selective
Source-based RTBH
Limitations and associated risks
TRIGGER ROUTER AND CUSTOMER INITIATED OPTIONS
This can be a very small router - it just has to be part of your iBGP
mesh but it does not need to carry any BGP routes just the
capability to advertise a prefix with minimal routing for connectivity.
Alternatively, software should be able to be used such as quagga (not
tested) or other popular DDoS detection appliances.
Static customers are dependent on the provider-applied options
above, but BGP Customers may initiate destination-based RTBH with
restrictions:
Limited to prefixes which they are permitted to announce to the provider
Recommendation that only host routes (IPv4 /32 or IPv6 /128) be accepted with
the RTBH community set to prevent accidents
Depending on customer skill level, limit the range of RTBH options
Enforce commercial controls over RTBH such as duration, etc.
Do NOT give customers access to source-based RTBH
RTBH SCOPE OF OPERATION
Basic RTBH is only deployed within your network but if peers or
providers have RTBH capabilities, you can manage the impact of
RTBH on the target system(s). Here are some examples:
You can have one RTBH community for internal only but this may
not help you (or the target customer) with the size of attacks that are
now common if your links to peers or providers are melting!
Pick providers who support RTBH and choose a community that not
only applies RTBH within your network but at the borders is replaced
by the appropriate community for each provider (this is the best
default protection scenario).
Choose and group your providers (or peers) into categories such as
domestic and international. Often, the major attack volume is from
overseas sources. Have a community which will trigger a selection
of RTBH advertisements as above but specify the customers real
next-hop in the announcement instead of the 192.0.2.1 or IPv6
equivalent static route to null (see RFC 6666 !).
SOURCE-BASED RTBH
Do NOT give customers access to source-based RTBH. This could be
accidentally or maliciously be used against you or other customers!
Only applies where interfaces have uRPF configured - loose uRPF
should be sufficient and is a LOT safer, but check with your router
vendor documentation.
Again, use routing policy to restrict this to host routes.
Use source-based RTBH for external attack sources and only apply
loose uRPF to external interfaces on your border routers (if the
source is internal to your network, use a filter or pull the plug).
You must carry a full Internet routing table on your border routers as
the uRPF drop when the next-hop is invalid rule will not work with a
default route (again, check with router vendor documentation I can
only speak for the vendor that I have deployed this on).
Do not advertise the black hole route externally.
RTBH-PLUS
This talk does not prescribe what you must do, so use your imagination
to work with what you have available, but also to provide a framework
on which to base future decisions. See the RFCs for configurations.

RTBH is cannot be a total DDoS solution but it can provide a cheap
and easy approach to managing simple attacks limiting customer
impact.


Questions?

You might also like