untitled

Similar documents
total.dvi

Agenda Security Workshop Control Plane Forwarding Plane Management Plane

2011 NTT Information Sharing Platform Laboratories

橡C14.PDF

shtsuchi-janog35.5-grnet.pptx

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

untitled

Microsoft PowerPoint - janog20-bgp-public-last.ppt

CCIE IP Anycast RP Anycast RP Anycast RP Anycast RP PIM-SM RP RP PIM-SM RP RP RP PIM Register RP PIM-SM RP PIM-SM RP RP RP RP Auto RP/BSR RP RP RP RP

untitled

untitled

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou

ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat

untitled

Microsoft PowerPoint irs14-rtbh.ppt

JANOG14-コンバージェンスを重視したMPLSの美味しい使い方

untitled

橡3-MPLS-VPN.PDF

初めてのBFD

LAN


untitled

untitled

SRX300 Line of Services Gateways for the Branch

3. LISP B EID RLOC ETR B 4. ETR B ITR A 1: LISP 5. ITR A B EID RLOC 6. A SYN 7. ITR A ITR A B EID RLOC SYN ITR A RLOC ETR B RLOC 8. ETR B SYN ETR B B

2004 SYN/ACK SYN Flood G01P014-6

template.dvi

Juniper Networks Corporate PowerPoint Template

1 IPv6 WG OS SWG PCOSIPv6 Windows Vista 2 3 KAMEUSAGIMacOSX IPv6 2

PDF

untitled

ScreenOS Copyright (C) 2005 NOX Co., Ltd. All Rights Reserved. Version1.00

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

ヤマハ ルーター ファイアウォール機能~説明資料~

IPv4aaSを実現する技術の紹介

今企業が取るべきセキュリティ対策とは策

perimeter gateway

第1回 ネットワークとは

IPv6 トラブルシューティング~ ISP編~

IP IP DHCP..

untitled

ヤマハ ルーター ファイアウォール機能~説明資料~

fusion.PDF

EtherChannelの設定

橡2-TrafficEngineering(revise).PDF

Packet Tracer: 拡張 ACL の設定 : シナリオ 1 トポロジ アドレステーブル R1 デバイスインターフェイス IP アドレスサブネットマスクデフォルトゲートウェイ G0/ N/A G0/

IIJ Technical WEEK IIJのバックボーンネットワーク運用

untitled

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)

Teradici Corporation # Canada Way, Burnaby, BC V5G 4X8 Canada p f Teradici Corporation Teradi

WEB.dvi

Si-R30取扱説明書

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能)

untitled


IIJ Technical WEEK SEILシリーズ開発動向:IPv6対応の現状と未来

Dell SonicWALL NSA NSA & Reassembly-Free Deep Packet & Inspection RFDPI 1 Network Security Appliance 3600 Network Security Appliance 4600 USB 2 x 10Gb

SRX License

GA-1190J

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

橡sirahasi.PDF

untitled

AirMac ネットワーク構成の手引き

オペレーティング システムでの traceroute コマンドの使用

【公開】村越健哉_ヤフーのIP CLOSネットワーク

IP.dvi

Transcription:

Peers Working Together to Battle Attacks to the Internet JANOG17 20 Jan 2006 Matsuzaki Yoshinobu <maz@iij.ad.jp> Tomoya Yoshida <yoshida@ocn.ad.jp> Taka Mizuguchi <taka@ntt.net> NSP-SEC/NSE-SEC-JP

Agenda NSP-SEC-JP Update ISP bogon routes bogon ISP Security survey Source Address Validation ACL, urpf How to use urpf 2

1. NSP-SEC-JP Update 3

1. NSP-SEC-JP Update NSP-SEC-JP NSP-SEC-JP Bogon Route-sever 4

1.1 NSP-SEC-JP NSP-SEC Sub-community NSP-SEC ML ISP/ICP confidential ML 5

1.2 NSP-SEC-JP < > 2006/1/6 ISP 25 Vender 3 Team Cymru 1 SP 6

1.3.1 bogon bogon route-server 5 http://www.cymru.com/bgp/bogon-rs.html.jis bogon BGP bogon 7

1.3.2 ISP Bogon Bogon ISP Private Link Local TestNet Multicast ISP 8

1.3.3 bogon route-server origin AS = 65333 community = 65333:888 bogon urpf loose mode source address bogon drop filtering ( more specific) 9

1.3.4 bogon route-server urpf loose 2 1 10

2. Security Trend 11

2.1 Darknet TCP UDP Warm 12

2.1.1 TCP Port 13

2.1.2 UDP Port 14

2.1.3 Worm W32/Sasser-A Deloder.A SQL Slammer Doomjuice Dabber.A 15

2.1.4 Worm W32/Sasser-A Deloder.A SQL Slammer Doomjuice Dabber.A 16

2.2.1 ISP Security Survey Tier-1/2 ISP / Tier1 Tier2 20 15 44% 10 28% 17

2.2.2 ISP Security Survey DNS Poisoning DDoS 64% 18

2.2.3 ISP Security Survey BGP DNS Poisoning DDoS BGP BGP BGP 19

2.2.4 ISP Security Survey 20

2.2.5 ISP Security Survey 500 500 21

2.2.6 ISP Security Survey 500 500 22

2.2.7 ISP Security Survey 10Gbps 1 10Gbps 500M 1Gbps 100 500Mbps 100M 23

2.2.8 ISP Security Survey 10Gbps 1 10Gbps 500M 1Gbps 100 500Mbps 100M 24

2.2.9 ISP Security Survey Web Web IRC IRC RIAA( RIAA( ) ISP ISP 25

2.2.10 ISP Security Survey 26

2.2.11 ISP Security Survey ACL BGP 27

3 Source Address Validation 28

3.1 Source IP address RFC3704 BCP84 Ingress Filtering for Multi-homed Networks 29

3.2 RT.a srcip: 0.0.0.0 srcip: 10.0.0.1 srcip: 0.0.0.0 RT.b srcip: 10.0.0.1 10.0.0.0/23 10.0.2.0/24 10.0.3.0/24 30

3.3 ACL Interface urpf check Source IP address 31

3.4 urpf check strict mode interface loose mode feasible mode 32

3.5 urpf 10.0.0.0/23 via <if.0> 10.0.2.0/24 via <if.1> 10.0.3.0/24 via <if.2> 10.0.4.0/24 via <if.3> if.3 if.0 if.1 if.2 srcip: 10.0.0.1 dstip: 10.0.4.1 forwarding 1. dst-ip 2. drop 3. urpf check 1. src-ip 2. drop (loose) 3. interface interface drop(strict) 4. urpf check OK! 33

3.6 urpf strict mode network 10.0.0.0/23 via <if.0> 10.0.2.0/24 via <if.1> interface OK srcip: 10.0.0.1 if.0 if.1 NG srcip: 10.0.0.1 interface drop 10.0.0.0/23 10.0.2.0/24 34

3.7 urpf loose mode network 10.0.0.0/23 via <if.0> 10.0.2.0/24 via <if.1> OK srcip: 10.0.2.1 if.0 if.1 NG srcip: 0.0.0.0 drop 10.0.0.0/23 : 10.0.2.0/24 : 35

3.8 urpf Cisco strict/loose mode /Engine urpf MIB drop packet netflow Juniper strict/feasible/loose mode urpf MIB drop cflowd AlaxalA 36

3.9 How to use urpf? Strict 37 Single-homed Static Loose ISP Peer ISP Transit ISP ISP Multi-homed Static BGP Peer ISP

3.10 urpf ISP ISP loose strict static single homed static loose loose static static multi homed static loose loose ISP 38

Let s Join NSP-SEC-JP!! 39

URL: http://puck.nether.net/mailman/listinfo/nsp-security-jp http://puck.nether.net/mailman/listinfo/nsp-security http://www.cymru.com/ http://www.arbor.net/downloads/arbor_worldwide_isp_s ecurity_report.pdf 40