North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Is there a line of defense against Distributed Reflective attacks?
- From: Christopher L. Morrow
- Date: Fri Jan 17 14:01:11 2003
On Fri, 17 Jan 2003, David G. Andersen wrote:
> On Fri, Jan 17, 2003 at 06:38:08PM +0000, Christopher L. Morrow mooed:
> > > has something called Source Path Isolation Engine (SPIE). There
> > This would be cool to see a design/whitepaper for.. Kelly?
> The long version of the SPIE paper is at:
> The two second summary that I'll probably botch: SPIE keeps a (very tiny)
> hash of each packet that the router sees. If you get an attack packet,
> you can hand it to the router and ask "From where did this come?"
> And then do so to the next router, and so on. The beauty of the scheme
> is that you can use it to trace single-packet DoS or security attacks
> as well as flooding attacks. The downside is that it's hardware.
This sounds like Steve Bellovin's thing called 'icmp traceback' where you
make up a new icmp type message and send that query through the system,
hop by hop... though I say that after only reading your blurb, not the
As I recall the icmp thing (that might NOT have been all steve, I just
heard him present it once) was a problem from a memory and processing
perspective, not to mention 'no router does this today' so its a 3 year
off feature addition... nevermind the protocol additions :)