SlideShare a Scribd company logo
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 1
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 2
BGP FlowSpec in 2019: operational
experience and future developments
a.k.a. “yet another FlowSpec talk”
Alessandro Bulletti
Kirill Kasavchenko
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 3
Volumetric DDoS attacks 2018-2019
Source: Netscout
Threat Report 2018
Source: Rapporto Clusit
2019 sulla Sicurezza ICT in
Italia - Tipologie di attacchi
DDoS (Dati Fastweb
relativi all’anno 2018)
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 4
The need for collaboration
• Ideally, large DDoS attacks should be
mitigated as close to the source as possible.
• Practically, the good first step would be:
– Customer asks upstream provider to mitigate
– Peer asks another peers
• As time goes by and trust is built, we might
expect mitigation to naturally propagate closer
to the source.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 5
Wait... This is not a new idea!
Some of initiatives in this area:
• Fingerprint Sharing Alliance (Arbor, 2005)
• BGP FlowSpec (IETF, 2009)
• M3AAWG DDoS Info Sharing (2017)
• I2NSF (IETF, 2017)
• Stellar: advanced blackholing (DE-CIX/TU
Berlin/Max Planck Institute, 2018)
• DOTS (IETF, work in progress)
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 6
Wait... This is not a new idea!
Some of initiatives in this area:
• Fingerprint Sharing Alliance (Arbor, 2005)
• BGP FlowSpec (IETF, 2009)
• M3AAWG DDoS Info Sharing (2017)
• I2NSF (IETF, 2017)
• Stellar: advanced blackholing (DE-CIX/TU
Berlin/Max Planck Institute, 2018)
• DOTS (IETF, work in progress)
• Vendor support
• Open-source tools
• Operational experience
• User groups
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 7
FlowSpec: vendors and open-source
Controllers and BGP FlowSpec speakers:
• Arbor (Netscout)
• ExaBGP
• FastNetMon
• Nokia
• Radware
Routers:
• Cisco IOS-XR (ASR9K, NCS5K) and IOS-XE
• Juniper MX/PTX
• Alcatel/Nokia 7x50
• Huawei NE routers
• 6WIND
• Arista
Telemetry FlowSpec
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 8
FlowSpec: operational experience & user groups
Deployments (based on public information):
• Cloudflare, Level3, Rostelecom, Orange Poland
DDoS Peering initiative:
• AT&T, Century Link, Charter
• See slides at NANOG 71 and 75 (links in the end of this presentation)
FlowSpec multi vendor tests by T-Mobile Austria and NextLayer :
• Cisco, Juniper, Huawei, Nokia
• Focus on Inter-AS applicability and operational needs
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 9
What works well
• FlowSpec is extensively used against DDoS Amplification attacks:
• We see operational community is automating FlowSpec generation to stop
attacks without human involvement:
– Not just hyperscalers
• We see adoption of FlowSpec as the way to redirect traffic on demand:
– Redirect to Route Target
– Redirect to Next-Hop
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 10
What could be improved
• Scale on router side:
– Number of concurrently supported FlowSpec rules
– Speed of FlowSpec rules import and processing
• Various „safety nets“:
– Prevent too many FlowSpec rules from impacting router forwarding performance
– Lack of granularity in import policies:
• It is impossible to allow/reject FlowSpec rules based on action
• Therefore, possible for customer to change DSCP of their traffic to „network-critical“
• These are implementation-specific improvements. They do not require industry
consensus in a form of IETF document or BCP.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 11
What is impossible to do with FlowSpec today
• Match traffic based on random L3-L4 field or based on payload
– Example: IP TTL, TCP Window Size
• Report traffic statistics across administrative boundaries
– ISP1 sends a FlowSpec rule to ISP2
– How ISP1 gets visibility into dropped traffic to estimate the efficacy of FlowSpec?
• There is a lack of common approach to these problems.
– We need standards (think RFC documents) or some well-defined Best Current Practices
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 12
Flexible Payload Matching: problem statement
• Majority of volumetric DDoS attacks are amplification attacks. They can be
successfully mitigated using „standard“ FlowSpec, matching source UDP port:
• However, there exist more complex cases:
– Bittorent amplification
– SSDP diffraction
• These attacks result in packets with random source UDP port, so it‘s not possible
to create a classifier using FlowSpec.
• At the same time, these attacks generate specific patterns in payload.
– And some routers are able to match packets based on payload.
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 13
Flexible Payload Matching: solution (1/2)
• Extend FlowSpec with „flexible match conditions“ component type:
draft-khare-idr-bgp-flowspec-payload-match
Type X – Flexible Match Conditions
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 14
Flexible Payload Matching: solution (2/2)
• Use new component type to match
anywhere in the packet:
– In any field
– Across fields regardless of field boundaries
– In payload
• Match using:
– Bit pattern with bitmask
– Numeric pattern
– Regular expressions
draft-khare-idr-bgp-flowspec-payload-match
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 15
FlowSpec and Reporting: problem statement
• How do you know if FlowSpec rule is effective?
• No standardized way to report traffic that matches FlowSpec policy:
– SNMP counters
– XML/Netconf
– draft-wu-idr-flowspec-yang-cfg-02
• Good news: most routers generate flow telemetry for traffic, dropped by
FlowSpec:
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 16
FlowSpec and Reporting: solution
• Corellate FlowSpec NLRI and Flow records:
• Vendor-independent approach
– No need to parse proprietary SNMP or XML data models
FlagsToS
Output Intf =
0
Input IntfProtoDst PortSrc PortDest IPSrc IP
Flow Record
Packet
length
TCP
flag
s
ICMP
type
Dst
Port
Por
t
IP
Protoc
ol
Source
Prefix
Dest
Prefix
FlowSpec NLRI
Src
Port
ICMP
code
Etc…
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 17
FlowSpec and Reporting: Inter-AS?
• Reporting based on Netflow and FlowSpec correlation won‘t work between ASNs
– No way for ISP1 to receive flow telemetry from ISP2
• Other approaches (SNMP, Netconf, streaming telemetry) won‘t work either
• We would need something totally new:
– Most likely some mediation tool that makes sure only relevant information is reported
between ASNs
– Or some concept of „administrative domains“ in flow / SNMP / streaming telemetry
• Whatever the solution would be, having visibility into FlowSpec rules propagated
between ASNs is going to be an essential factor for adoption
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 18
FlowSpec evolution: RFC5575bis
• Defines all traffic action extended communities as transitive extended
communities. RFC5575 defined the traffic- rate action to be non-transitive and did
not define the transitivity of the other action communities at all.
• Introduces a new traffic filtering action traffic-rate-packets:
– Instead of ”rate-limit to 100 bps” you can now “rate-limit to 100 pps”
• Introduces rules how updates of Flow Specifications shall be handled in case
they contain interfering actions
• A full list of changes can be found in the references section of this slide deck
Major changes
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 19
Other interesting FlowSpec developments
• FlowSpec interface set (draft-ietf-idr-flowspec-interfaceset)
– Use BGP communities to signal to which interfaces (interface-set) should a FlowSpec
action be applied
– Supported in Cisco IOS-XE
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 20
Summary
• FlowSpec is a mature DDoS mitigation technology
• No, it‘s not perfect and alone is not enough to stop all types of DDoS attacks
– it is not applicable against TCP SYN floods and application layer DDoS
– but it mitigates the most impacting DDoS types in ISP networks – amplification attacks
• Check with $your_router_vendor what the platform limits are:
– Scale
– Policies
• Don‘t be afraid to automate FlowSpec. If you don‘t know how – talk to us.
• Work with IETF and vendors to get new FlowSpec ideas implemented
A.k.a Last Slide
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 21
References
• Stellar, advanced blackholing: https://www.de-
cix.net/Files/2731074c857497be3827ac9537b6e486f27aa57c/Research-paper-Stellar-Network-Attack-Mitigation-
using-Advanced-Blackholing.pdf
• NANOG71 DDoS peering: https://www.youtube.com/watch?v=Aj8EKYVSTtk
• NANOG75 eBGP FlowSpec peering: https://www.youtube.com/watch?v=rKEz8mXcC7o
• Interop FlowSpec tests by T-Mobile and Next Layer: https://www.nextlayer.at/wp-content/uploads/2018/06/loibl-bacher-
bgp-flowspec-interop-012017.pdf
• FlowSpec payload matching: https://datatracker.ietf.org/doc/draft-khare-idr-bgp-flowspec-payload-match/
• SSDP Diffraction Attack: https://www.netscout.com/blog/asert/new-twist-ssdp-attacks
• FlowSpec at CloudFlare: https://meetings.ripe.net/see4/files/RIPE%20SEE4%20Belgrade%20Serbia%20-
%20CloudFlare%20-%20DDoS%20mitigation%20-%20Martin%20Levy.pdf
• FlowSpec at Level3: https://www.capacitymedia.com/articles/3585228/Level-3-launches-BGP-Flowspec-on-global-
backbone
• FlowSpec at Rostelecom: https://habr.com/ru/company/rostelecom/blog/325138/
• FlowSpec in Orange Poland: https://cert.orange.pl/aktualnosci/ddos-w-naszej-sieci-coraz-silniej-coraz-wiecej
• RFC5575bis changes compared to RFC5575: https://tools.ietf.org/html/draft-ietf-idr-rfc5575bis-14#appendix-A
The last slide, really
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 22
Thank You.
www.netscout.com
alessandro.bulletti@netscout.com
kirill.kasavchenko@netscout.com

More Related Content

PPT
PPTX
BGP Update Source
PDF
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
PPTX
BGP Flowspec (RFC5575) Case study and Discussion
PPT
VPN presentation - moeshesh
PDF
Advanced enterprise campus design. routed access (2015 milan)
PDF
Traffic Engineering Using Segment Routing
PPTX
Cisco Live Milan 2015 - BGP advance
BGP Update Source
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
BGP Flowspec (RFC5575) Case study and Discussion
VPN presentation - moeshesh
Advanced enterprise campus design. routed access (2015 milan)
Traffic Engineering Using Segment Routing
Cisco Live Milan 2015 - BGP advance

What's hot (20)

PDF
Implementing BGP Flowspec at IP transit network
PDF
VietTel AntiDDoS Volume Based
PDF
MPLS Traffic Engineering
PDF
Netmanias L2,L3 Training (3) L2, L3 QoS
PDF
01- intro to firewall concepts
PDF
SRv6 Network Programming: deployment use-cases
PPTX
HSRP ccna
PDF
How BGP Works
PPTX
CCNP Switching Chapter 2
PDF
20 palo alto site to site
PPTX
Juniper Srx quickstart-12.1r3
PDF
DDoS Mitigation Tools and Techniques
PDF
MPLS on Router OS V7 - Part 1
PDF
VXLAN BGP EVPN: Technology Building Blocks
PDF
Segment Routing
PDF
Formation gns3
PDF
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
PDF
13 palo alto url web filtering concept
PDF
12 palo alto app-id concept
PDF
9 palo alto virtual routers concept (routing on palo alto)
Implementing BGP Flowspec at IP transit network
VietTel AntiDDoS Volume Based
MPLS Traffic Engineering
Netmanias L2,L3 Training (3) L2, L3 QoS
01- intro to firewall concepts
SRv6 Network Programming: deployment use-cases
HSRP ccna
How BGP Works
CCNP Switching Chapter 2
20 palo alto site to site
Juniper Srx quickstart-12.1r3
DDoS Mitigation Tools and Techniques
MPLS on Router OS V7 - Part 1
VXLAN BGP EVPN: Technology Building Blocks
Segment Routing
Formation gns3
Ultra fast DDoS Detection with FastNetMon at Coloclue (AS 8283)
13 palo alto url web filtering concept
12 palo alto app-id concept
9 palo alto virtual routers concept (routing on palo alto)
Ad

Similar to BGP FlowSpec experience and future developments (20)

PDF
Next Generation DDoS Services – can we do this with NFV? - CF Chui
PDF
17 - Building small network.pdf
PPTX
M1-C17-Armando una red.pptx
PPTX
ITN_Module_17.pptx
PPTX
ONF & iSDX Webinar
PPTX
ITNCCNA_NATWORKCOMMUNICATION_Module_17.pptx
PDF
PDF of module number 4 of Internet of Things subject of Mumbai University
PDF
DDos, Peering, Automation and more
PDF
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
PDF
Networking - TCP/IP stack introduction and IPv6
PPTX
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
PPTX
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
PPTX
CCNA v6.0 ITN - Chapter 11
PDF
The Impact of Software-based Virtual Network in the Public Cloud
PPTX
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
PDF
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
PPTX
2. RINA overview - TF workshop
PPTX
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
PPTX
Basic Foundation For Cybersecurity
PPTX
INT_Ch17.pptx
Next Generation DDoS Services – can we do this with NFV? - CF Chui
17 - Building small network.pdf
M1-C17-Armando una red.pptx
ITN_Module_17.pptx
ONF & iSDX Webinar
ITNCCNA_NATWORKCOMMUNICATION_Module_17.pptx
PDF of module number 4 of Internet of Things subject of Mumbai University
DDos, Peering, Automation and more
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
Networking - TCP/IP stack introduction and IPv6
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
CCNA v6.0 ITN - Chapter 11
The Impact of Software-based Virtual Network in the Public Cloud
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
2. RINA overview - TF workshop
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
Basic Foundation For Cybersecurity
INT_Ch17.pptx
Ad

More from Pavel Odintsov (20)

PDF
BGP Flow Spec HKNOG 13
PDF
DDoS Challenges in IPv6 environment
PDF
Network telemetry for DDoS detection presentation
PDF
Using MikroTik routers for BGP transit and IX points
PDF
DDoS Defense Mechanisms for IXP Infrastructures
PPTX
FastNetMon Advanced DDoS detection tool
PPTX
Flowspec contre les attaques DDoS : l'expérience danoise
PDF
Detectando DDoS e intrusiones con RouterOS
PPTX
DeiC DDoS Prevention System - DDPS
PDF
Lekker weer nlnog_nlnog_ddos_fl
PDF
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
PDF
Janog 39: speech about FastNetMon by Yutaka Ishizaki
PDF
Protect your edge BGP security made simple
PDF
Keeping your rack cool
PDF
Jon Nield FastNetMon
PDF
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
PDF
Blackholing from a_providers_perspektive_theo_voss
PDF
SIG-NOC Tools Survey
PDF
DDoS detection at small ISP by Wardner Maia
PDF
Distributed Denial of Service Attack - Detection And Mitigation
BGP Flow Spec HKNOG 13
DDoS Challenges in IPv6 environment
Network telemetry for DDoS detection presentation
Using MikroTik routers for BGP transit and IX points
DDoS Defense Mechanisms for IXP Infrastructures
FastNetMon Advanced DDoS detection tool
Flowspec contre les attaques DDoS : l'expérience danoise
Detectando DDoS e intrusiones con RouterOS
DeiC DDoS Prevention System - DDPS
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Protect your edge BGP security made simple
Keeping your rack cool
Jon Nield FastNetMon
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Blackholing from a_providers_perspektive_theo_voss
SIG-NOC Tools Survey
DDoS detection at small ISP by Wardner Maia
Distributed Denial of Service Attack - Detection And Mitigation

Recently uploaded (20)

PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
artificial intelligence overview of it and more
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
DOCX
Unit-3 cyber security network security of internet system
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
WebRTC in SignalWire - troubleshooting media negotiation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introuction about ICD -10 and ICD-11 PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
artificial intelligence overview of it and more
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Job_Card_System_Styled_lorem_ipsum_.pptx
Digital Literacy And Online Safety on internet
introduction about ICD -10 & ICD-11 ppt.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Unit-3 cyber security network security of internet system
RPKI Status Update, presented by Makito Lay at IDNOG 10
Slides PPTX World Game (s) Eco Economic Epochs.pptx
presentation_pfe-universite-molay-seltan.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Sims 4 Historia para lo sims 4 para jugar
Introduction about ICD -10 and ICD11 on 5.8.25.pptx

BGP FlowSpec experience and future developments

  • 1. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 1
  • 2. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 2 BGP FlowSpec in 2019: operational experience and future developments a.k.a. “yet another FlowSpec talk” Alessandro Bulletti Kirill Kasavchenko
  • 3. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 3 Volumetric DDoS attacks 2018-2019 Source: Netscout Threat Report 2018 Source: Rapporto Clusit 2019 sulla Sicurezza ICT in Italia - Tipologie di attacchi DDoS (Dati Fastweb relativi all’anno 2018)
  • 4. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 4 The need for collaboration • Ideally, large DDoS attacks should be mitigated as close to the source as possible. • Practically, the good first step would be: – Customer asks upstream provider to mitigate – Peer asks another peers • As time goes by and trust is built, we might expect mitigation to naturally propagate closer to the source.
  • 5. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 5 Wait... This is not a new idea! Some of initiatives in this area: • Fingerprint Sharing Alliance (Arbor, 2005) • BGP FlowSpec (IETF, 2009) • M3AAWG DDoS Info Sharing (2017) • I2NSF (IETF, 2017) • Stellar: advanced blackholing (DE-CIX/TU Berlin/Max Planck Institute, 2018) • DOTS (IETF, work in progress)
  • 6. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 6 Wait... This is not a new idea! Some of initiatives in this area: • Fingerprint Sharing Alliance (Arbor, 2005) • BGP FlowSpec (IETF, 2009) • M3AAWG DDoS Info Sharing (2017) • I2NSF (IETF, 2017) • Stellar: advanced blackholing (DE-CIX/TU Berlin/Max Planck Institute, 2018) • DOTS (IETF, work in progress) • Vendor support • Open-source tools • Operational experience • User groups
  • 7. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 7 FlowSpec: vendors and open-source Controllers and BGP FlowSpec speakers: • Arbor (Netscout) • ExaBGP • FastNetMon • Nokia • Radware Routers: • Cisco IOS-XR (ASR9K, NCS5K) and IOS-XE • Juniper MX/PTX • Alcatel/Nokia 7x50 • Huawei NE routers • 6WIND • Arista Telemetry FlowSpec
  • 8. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 8 FlowSpec: operational experience & user groups Deployments (based on public information): • Cloudflare, Level3, Rostelecom, Orange Poland DDoS Peering initiative: • AT&T, Century Link, Charter • See slides at NANOG 71 and 75 (links in the end of this presentation) FlowSpec multi vendor tests by T-Mobile Austria and NextLayer : • Cisco, Juniper, Huawei, Nokia • Focus on Inter-AS applicability and operational needs
  • 9. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 9 What works well • FlowSpec is extensively used against DDoS Amplification attacks: • We see operational community is automating FlowSpec generation to stop attacks without human involvement: – Not just hyperscalers • We see adoption of FlowSpec as the way to redirect traffic on demand: – Redirect to Route Target – Redirect to Next-Hop
  • 10. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 10 What could be improved • Scale on router side: – Number of concurrently supported FlowSpec rules – Speed of FlowSpec rules import and processing • Various „safety nets“: – Prevent too many FlowSpec rules from impacting router forwarding performance – Lack of granularity in import policies: • It is impossible to allow/reject FlowSpec rules based on action • Therefore, possible for customer to change DSCP of their traffic to „network-critical“ • These are implementation-specific improvements. They do not require industry consensus in a form of IETF document or BCP.
  • 11. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 11 What is impossible to do with FlowSpec today • Match traffic based on random L3-L4 field or based on payload – Example: IP TTL, TCP Window Size • Report traffic statistics across administrative boundaries – ISP1 sends a FlowSpec rule to ISP2 – How ISP1 gets visibility into dropped traffic to estimate the efficacy of FlowSpec? • There is a lack of common approach to these problems. – We need standards (think RFC documents) or some well-defined Best Current Practices
  • 12. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 12 Flexible Payload Matching: problem statement • Majority of volumetric DDoS attacks are amplification attacks. They can be successfully mitigated using „standard“ FlowSpec, matching source UDP port: • However, there exist more complex cases: – Bittorent amplification – SSDP diffraction • These attacks result in packets with random source UDP port, so it‘s not possible to create a classifier using FlowSpec. • At the same time, these attacks generate specific patterns in payload. – And some routers are able to match packets based on payload.
  • 13. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 13 Flexible Payload Matching: solution (1/2) • Extend FlowSpec with „flexible match conditions“ component type: draft-khare-idr-bgp-flowspec-payload-match Type X – Flexible Match Conditions
  • 14. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 14 Flexible Payload Matching: solution (2/2) • Use new component type to match anywhere in the packet: – In any field – Across fields regardless of field boundaries – In payload • Match using: – Bit pattern with bitmask – Numeric pattern – Regular expressions draft-khare-idr-bgp-flowspec-payload-match
  • 15. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 15 FlowSpec and Reporting: problem statement • How do you know if FlowSpec rule is effective? • No standardized way to report traffic that matches FlowSpec policy: – SNMP counters – XML/Netconf – draft-wu-idr-flowspec-yang-cfg-02 • Good news: most routers generate flow telemetry for traffic, dropped by FlowSpec:
  • 16. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 16 FlowSpec and Reporting: solution • Corellate FlowSpec NLRI and Flow records: • Vendor-independent approach – No need to parse proprietary SNMP or XML data models FlagsToS Output Intf = 0 Input IntfProtoDst PortSrc PortDest IPSrc IP Flow Record Packet length TCP flag s ICMP type Dst Port Por t IP Protoc ol Source Prefix Dest Prefix FlowSpec NLRI Src Port ICMP code Etc…
  • 17. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 17 FlowSpec and Reporting: Inter-AS? • Reporting based on Netflow and FlowSpec correlation won‘t work between ASNs – No way for ISP1 to receive flow telemetry from ISP2 • Other approaches (SNMP, Netconf, streaming telemetry) won‘t work either • We would need something totally new: – Most likely some mediation tool that makes sure only relevant information is reported between ASNs – Or some concept of „administrative domains“ in flow / SNMP / streaming telemetry • Whatever the solution would be, having visibility into FlowSpec rules propagated between ASNs is going to be an essential factor for adoption
  • 18. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 18 FlowSpec evolution: RFC5575bis • Defines all traffic action extended communities as transitive extended communities. RFC5575 defined the traffic- rate action to be non-transitive and did not define the transitivity of the other action communities at all. • Introduces a new traffic filtering action traffic-rate-packets: – Instead of ”rate-limit to 100 bps” you can now “rate-limit to 100 pps” • Introduces rules how updates of Flow Specifications shall be handled in case they contain interfering actions • A full list of changes can be found in the references section of this slide deck Major changes
  • 19. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 19 Other interesting FlowSpec developments • FlowSpec interface set (draft-ietf-idr-flowspec-interfaceset) – Use BGP communities to signal to which interfaces (interface-set) should a FlowSpec action be applied – Supported in Cisco IOS-XE
  • 20. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 20 Summary • FlowSpec is a mature DDoS mitigation technology • No, it‘s not perfect and alone is not enough to stop all types of DDoS attacks – it is not applicable against TCP SYN floods and application layer DDoS – but it mitigates the most impacting DDoS types in ISP networks – amplification attacks • Check with $your_router_vendor what the platform limits are: – Scale – Policies • Don‘t be afraid to automate FlowSpec. If you don‘t know how – talk to us. • Work with IETF and vendors to get new FlowSpec ideas implemented A.k.a Last Slide
  • 21. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 21 References • Stellar, advanced blackholing: https://www.de- cix.net/Files/2731074c857497be3827ac9537b6e486f27aa57c/Research-paper-Stellar-Network-Attack-Mitigation- using-Advanced-Blackholing.pdf • NANOG71 DDoS peering: https://www.youtube.com/watch?v=Aj8EKYVSTtk • NANOG75 eBGP FlowSpec peering: https://www.youtube.com/watch?v=rKEz8mXcC7o • Interop FlowSpec tests by T-Mobile and Next Layer: https://www.nextlayer.at/wp-content/uploads/2018/06/loibl-bacher- bgp-flowspec-interop-012017.pdf • FlowSpec payload matching: https://datatracker.ietf.org/doc/draft-khare-idr-bgp-flowspec-payload-match/ • SSDP Diffraction Attack: https://www.netscout.com/blog/asert/new-twist-ssdp-attacks • FlowSpec at CloudFlare: https://meetings.ripe.net/see4/files/RIPE%20SEE4%20Belgrade%20Serbia%20- %20CloudFlare%20-%20DDoS%20mitigation%20-%20Martin%20Levy.pdf • FlowSpec at Level3: https://www.capacitymedia.com/articles/3585228/Level-3-launches-BGP-Flowspec-on-global- backbone • FlowSpec at Rostelecom: https://habr.com/ru/company/rostelecom/blog/325138/ • FlowSpec in Orange Poland: https://cert.orange.pl/aktualnosci/ddos-w-naszej-sieci-coraz-silniej-coraz-wiecej • RFC5575bis changes compared to RFC5575: https://tools.ietf.org/html/draft-ietf-idr-rfc5575bis-14#appendix-A The last slide, really
  • 22. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | PUBLIC 22 Thank You. www.netscout.com alessandro.bulletti@netscout.com kirill.kasavchenko@netscout.com