Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

one way to mitigate DDoS is to enforce source IP checks on the way OUT of a datacenter (egress).

sure there are botnets, infected devices, etc that would conform to this but where does the sheer power of a big ddos attack come from? including those who sell it as a service. they have to have some infrastructure in some datacenter right?

make a law that forces every edge router of a datacenter to check for source IP and you would eliminate a very big portion of DDoS as we know it.

until then, the only real and effective method of mitigating a DDoS attack is with even more bandwidth. you are basically a black hole to the attack, which cloudflare basically is.





alright, what you are proposing is kind of hard to do. Source routing is not easy, and source validations is even harder.

and what prevents me, as a abuse hoster or "bad guy" from just announcing my own IP space directly on a transit or IXP?

You might say, the IXP should do source checking aswell, but what if ipspace is distributed/anycasted across multiple ASN's/ on the IXP?

Also, if you add multiple egress points distributed across different routing domains, it gets complicated fast.

Does my transit upstream need to do source validation of my IP space? What about their upstream? Also, how would he know which IPspace belongs to which ASN's considering the allocation of ASN numbers and IP space is distributed across different organisations across the globe. (some of which are more malicious/non function than others[0]). Source routing becomes extremly complex because there is no single, universal mapping between IP space and ASN's they belong too.

[0]https://afrinic.net/notice-for-termination-of-the-receiversh...


The biggest attacks literally come from botnets. There’s not a lot coming from infrastructure services precisely because these services are incentivized to shut that shit down. At most it would be used as the control plane which is how people attempt to shut down the botnets.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: