4788310 2000-02-12  01:09  /142 rader/ Postmaster
Mottagare: Bugtraq (import) <9751>
Ärende: A DDOS proposal.
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
Content-Type: text/plain
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-ID:  <0002111514392V.02552@smp>
Date:         Fri, 11 Feb 2000 13:23:36 -0800
Reply-To: Dragos Ruiu <dr@DURSEC.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Dragos Ruiu <dr@DURSEC.COM>
Organization: kyx.net
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Panic Button, open trouble notification channel: Attack Defender

The appropriate place to suggest this solution was at the NANOG
meeting on DDOS but I didn't think of it before then so I thought
that a posting to bugtraq may float this proposal for public
discussion. The term ISP is used below to refer to any network
service provider responsible for connecting end user systems or
servers to the net.

The problem with DDOS:

- It is infeasible to secure the entire net.

- Scanners for DDOS daemons are being built but still require efforts
from uniterested parties to run the scans. Frequency of scanning will
be an issue too.

- The attackers are often systems that are unattended or neglected as
far as security.  This makes it even harder to reach someone at the
site to stop the attack.

- The ones who are motivated to do something about DDOS are the
victims not the attack relays.

- The ISPs are also greatly motivated to ensure that their services
are not disrupted.

- The problem with disabling the attack is that the victim has to
contact many, many systems to notify them that they have been
breached and convince the administrators and take measures agains the
attacker software now embedded in their system.

As this is an industry wide issue, it is doubtful a single source
commercial antidote to all the potential DDOS problems can be found
with a single countermeasure. So I propose a collaboration between
service providers - an Anti-ddos ISP Coalition to remedy the problem.

The key issue I as I see it is one of notification, how do you notify
all the attackers that their systems are being detrimental to the
net.  I suggest that we move the onus of solution to their service
providers.  It has already been suggested that the ISPs that connect
the attacker-relays to the net may be culpable or liable for
damages... so they should be willing to expend some effort to resolve
the issue. There is already a push to educate about putting in proper
address filtering into provider routers, but this is not the full
solution because it will only hinder DDOS attacks based on spoofed
traffic. At dursec we have been testing DDOS effects for the last 8
months, and we've researched many DDOS techniques that do not require
spoofing, so address filters will not be a panacea solution.

One of the solutions we've been bandying about is some sort of
Emergency Broadcast Network like solution that would facilitate
communication during attacks or outages amongst service providers.
We would like to propose that an open-source, peer reviewed attack
notification system like this be developed.  It would work like this:

- Each ISP(AS) that has an IP address block allocated to it would
maintain a publicly listed attack/outage notification point. - call
it the Attack Defender daemon. By my estimate and materials published
by Boardwatch there are less than 15,000 ISPs in the world so
keeping/distributing a central contact table listing address blocks
and contact would be feasible (similar to whois).

- Free client software would be distributed to the participating
(hopefully all) ISPs customers.  This client software would
essentially be a red panic button for victims of a DDOS attack.  When
activated it would use some sort of strong crypto authentication and
notify your local service provider's Attack Defender that an attack
is in progress. The notice would contain a small description of the
attack and a list of attack sources gathered by promiscuous sniffing
by the Defender client as well as a contact e-mail for the attack
victim. The client could also log traffic stats for future forensic
verification/tracing of the attack. Varous levels of automation are
possible.

-When an ISP customer triggers the Attack Defender panic button, and
notifies his service providers' Defender daemon, it will in turn
contact/notify the other well-known and publicly listed Defender
contact addresses of the ISPs/ASs/Owners of the address blocks that a
victim ISP's customer has filed a complaint about attacks coming from
their nets. That notification will contain the offending source
address(es) and contact info for the victim and their ISPs technical
support for subsequent verification.

-When the incoming complaints from other Defenders reach some
configurable(and likely site dependent) threshold level, the AS's
Defender will notify/alarm the attack origin ISPs technical support
crew, who would supposedly have contact information for the client
nodes that are doing the attacking.  They could then notify, with
whatever strength of wording (:-) they feel is appropriate, their
customers that they must take additional security precautions and
hopefully provide assistance.  There are numerous inherent DoS
opportunities in such a system so great care needs to be taken care
beween Defenders to use strong authentication.  In addition,
guidelines should be drafted so no draconian penalties are imposed on
clients that have potentially spurious complaints filed against them.
I would suggest that no action be taken until mutliple complaints are
filed, and then some sort of attack verification process with the
victim be used before attack relays are notified/penalized.  Systems
that are repeatedly/consistently used as attackers could be
filtered/disabled/penalized until approriate security improvements
are demonstrated to their ISP - thus providing the motivation for the
attack relays to care about the damage they are doing and to spend
the effort on better security.

-To stop this system from being used as a DoS itself, I would propose
that some sort of fine or other financial penalty be imposed for
false or improper complaints being filed (like the fines for pulling
a fire alarm).

Obviously, the coding work of developing such a system is trivial,
but the problems are all political and administrative.  If this idea
is met with positive reception, I would even commit to developing the
open source software consortium here - I'm pretty sure we could have
it whipped up by next week - but the question really goes back out to
the technical planners at service providers: Would they would deploy
and take the appropriate measures to make such a system work.  The
barriers on this are all political not technical.

I could start a mailing list to discuss this solution at
defender@dursec.com if there is sufficient interest and I would urge
all interested parties to participate.  Feedback solicited either
here or via mail.... Is this idea feasible? Goofy? Realistic?


cheers,
--dr@dursec.com


--
dursec.com / kyx.net - we're from the future                      http://www.dursec.com
learn kanga-foo from security experts: CanSecWest - April 19-21 Vancouver

Speakers: Ron Gula/NSW, Ken Williams/E&Y, Marty Roesch/Hiverworld, Fyodor/insecure.org,
          RainForestPuppy/wiretrip.net, Theo de Raadt/OpenBSD, Max Vision/whitehats.com
(4788310) ------------------------------------------(Ombruten)

4801382 2000-02-15  19:11  /155 rader/ Postmaster
Mottagare: Bugtraq (import) <9770>
Ärende: Re: A DDOS proposal.
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
Content-Type: text/plain
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-ID:  <0002120530263I.02552@smp>
Date:         Sat, 12 Feb 2000 01:10:58 -0800
Reply-To: Dragos Ruiu <dr@DURSEC.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Dragos Ruiu <dr@DURSEC.COM>
Organization: kyx.net
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Thank you all for your kind comments, offers of help and input about
my attack signalling system proposal. Here are some comments to the
comments:

Re: In-band vs. Out of band signalling

In our tests so far, though we've found some pretty devastating
attacks, none of the host targeted attacks has succeeded in producing
100% saturation/failure to the point where an outbound connection
with some determined re-try and process priority could be completely
defeated.  My hypothesis at this point is that an in band
notification or signalling that would survive DoS could be built. If
not with TCP certainly with an aggressive UDP re-transmitter. You
will likely be able to squeak out that alarm packet eventually (even
with TCP I think). If anyone has some evidence to contradict this I
would love to hear about it. I estimate that out-of-band signalling
is -very- expensive (perhaps prohibitively). Let's save that for the
big e-commerce sites.

Having avoided the temptation (:-) to take out a whole bunch of
systems and try a test with a massive number of nodes our tests have
been limited to the small number (<10) of links we could cobble up
with our employee's home cablemodem/adsl links and other scrounged
systems and T1's from friends, but there seemed to be little effect
difference as we increased the number of nodes.  DDOS seems to be a
bandwidth game, and he/she with the most bandwidth wins.  If some
people would like to volunteer to set up a massive number of systems
in a testbed, we're game. We can even play target, but I may have to
talk to my ISPs and warn them. :-) C'mon, this is way more fun than
Seti@Home.

Re: DoS the victim and the relay Defenders simultaneously

One of the theoretical side effects of this quot;Defenderquot; system is that
there will be a big bull's eye painted on the Defender node - they
will likely become a target of choice so that you can get past them
and do some mischief.  This is both good and bad, good because the
obvious target can be fortified and watched appropriately, bad
because it's, well.... a target.  However DoSing the Defender will
hardly qualify as a stealth maneouver... when you see all that
traffic to it you will pretty much know that -something- is going
down. (And you -should- be watching.) I would be worried much more
about the stealthy clean up the complaints penetration.

Re: AI-driven attack sensing

There are a huge number of ways to wire this into advanced IDSes and
the like.  I think there will be a lot of vendors who may wish to
differentiate themselves or improve their features in this way.  I
was only proposing a rudimentary human operated triggering - you'd
think that only server operators would care enough about ddos and
uptime to go to the trouble of getting themselves wired into such a
system at first. I'm sure there will be lots of other clever ideas
here.

Re: Coding trivial

I didn't mean to downplay the difficulty of really securing an
app. But the effort here still seems dwarfed to the policy and
political issues to be overcome to make this work. A prototype is not
a long reach, I maintain.

Re: InterNIC whois as a contact instead.

First of all, for small companies they might work, but I've -tried-
on many occasions with more mundane portscans and attacks to contact
operators of servers attacking us to warn them about potential
compromises.  My success rate is less than 10%.  And you would be
surprised at the number of sites that are seemingly unreachable by
telephone (even some big ones). Then let's consider the language and
geography issues of attacks from different countries....

Another issue if you get attacked by forlorn.subgroup.megacorp.com
and you contact the whois for megacorp.com in likely a different city
is that it may take you a long time to reach the operator of the
attack system - if you can at all (sysadmins for large companies seem
to have developed the best telephone call avoidance technologies
around :-).

The other point here is that the ISPs Defender daemon would be able
to contact many sites en-masse (this is for -distributed- attacks) if
the other ISPs have a server listening for such requests. When was
the last time you tried to contact 100 server operators nevermind
1000? (Guys from Yahoo need not answer. :-) The idea is to distribute
the contact work to the ISPs responsible rather than saddling the
victim with the burden as we do now.

When I used to chase down attacks on our servers to warn sysops (I
don't anymore, declaring it futile), it would take me on the average
of a day per system if it worked, and I used to time out on it after
more than a day - which led to the abysmal success rate. Normally it
would take at least four phone calls before you got to someone who
understood what you were talking about.  Maybe things are better now
with all this DDOS visibility, but I doubt it.

Re: RTBL and blocking

Yes, some extension may be feasible.... but the issue here is not
some voluntary opt in filtering, but squelching and securing the
origin of the attacks.  Say I took over an address numerically just
below ddos poster child yahoo's dns server and another just above it
and installed my favorite super-nasty ddos tools. Most current
filtering facilities would likely have to block out a whole range of
addresses due to limits in the number of filters runnable with
reasonable performance, thereby making yahoo unreachable to your
users as well, sandwiched between those addresses.  One of the points
of my proposal was to avoid blocking by going to a root of the attack
- the vulnerable attack relays - and notifiying their ISPs
automatically.

Then further you have to provide some incentive for them to care
about their security - another surprise to me was how often I
contacted sysadmins who really couldn't care less that their box was
broken into and attacking my system as long as their app was still
running,  or,  even more frequently, who didn't believe the info or
understand attack technology. Hopefully with my proposal, their ISP
upon receiving complaints about the user, will be able to have some
leverage on the user - otherwise one bad apple who doesn't care about
security could get a whole address range blocked off, in a way giving
another kind of DoS attack as that entire ISPs customer base may be
made unreachable to/from a chunk of the net.  Without some
notification system, the ISP will never know the attack happened and
that they are being blocked - to them it will look like a whole chunk
of the net that is filtering them went mysteriously 404. (The revenue
loss implications of blocked customers are large for e-commerce.)
Blocking and filtering by itself will make the already flaky net more
so.

IMHO Though I do think an RTBL-like or derived blocking solution
would be a good incentive generator for ISPs that would choose to
ignore hypothetical inbound Defender complaints from other net users,
it doesn't strike me as a good solution in general. And there will
always be a few ISPs that ignore the guidelines is my bet - for
evidence I point to the difficulties of getting routing BGP
announcements to follow guidelines and the always-needed NANOG
tutorials. I doubt that we will ever completely mitigate DDOS - the
best we can hope for is to dramatically reduce the ridiculous ease
with which it can be done today. (Make'em work for their hack I
say. They have it so easy now. Why when I used to have to walk
through two miles of snow to hack on a 110 baud teletype... :-)
Unfortunately, I surmise this will require the tough road of securing
the obvious targets that will get taken over the most and do the most
damage. It would be interesting to see what wins the gets hacked the
most award....

Unless someone finds the magic silver bullet on this one, it's not
pretty, but I would still suggest we roll up our sleeves and start
getting to it. Sigh....

Again, thank you all for the valuable feedback,
--dr

--
dursec.com / kyx.net - we're from the future                      http://www.dursec.com
learn kanga-foo from security experts: CanSecWest - April 19-21 Vancouver

Speakers: Ron Gula/NSW, Ken Williams/E&Y, Marty Roesch/Hiverworld, Fyodor/insecure.org,
          RainForestPuppy/wiretrip.net, Theo de Raadt/OpenBSD, Max Vision/whitehats.com

p.s. I really did walk through two miles of snow to use a 110 baud
teletype for a while. :-)
(4801382) ------------------------------------------(Ombruten)

4802363 2000-02-15  23:12  /74 rader/ Postmaster
Mottagare: Bugtraq (import) <9792>
Ärende: Re: A DDOS proposal.
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.10.10002120401140.23577-100000@sarah.home.blockdev.net>
Date:         Sat, 12 Feb 2000 04:15:26 -0800
Reply-To: Matt <mickey@HOME.BLOCKDEV.NET>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Matt <mickey@HOME.BLOCKDEV.NET>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <0002111514392V.02552@smp>

Appropriate quoting (I hope) follows.

The chief concern with DDOS attacks is, as Mr. Rulu points out, that
it is not feasible to protect the entire net.  Morover, he is correct
that the solution he proposes would bring with it severe DOS and even
new DDOS opportunities, strong authentication notwithstanding.  Of
course, the issues of international legal enforcement, liability, etc
are glossed over or ignored.  In short, adopting a massive Panic
Button system, as suggested, would probably open more holes than it
would close, and many of the recommended remedies (fire alarm
penalties, for instance) would be difficult or impossible to enforce
in many circumstances.

The secret, I think, to limiting vulnerability to these sorts of
attacks, and limiting exposure, is to cause _someone_ (it doesn't
particularly matter who) to internalize the external costs of
protection.  That is, since (say) the University of California at
Santa Barbara has less (theoretical) personal stake in detecting DDOS
agents on compromised clients, they will expend no effort to do so.
If they fully internalized the costs of the damage, however (if CNN
could, for instance, reliably collect the entire potential damages
due to loss of service), they would have a greater incentive.  The
solution, then, becomes primarily technical- a reliable, trustworthy
means of identifying the author of a certain packet would need to be
obtained, so that packets could not be spoofed.

It should be remembered, too, that legal sanction against (for
instance) ISPs will be difficult to enforce in practice.  My computer
doesn't much care, or notice, if it is being flooded by Rwandan
networks or Australian- service is just as denied either way.  Legal
sanctions against foreign ISPs, however, are very difficult to
enforce.  Sanctions would have to transcend law and political
boundaries meaning network wide isolation of offensive networks, not
liability assessments.

	--Matt

On Fri, 11 Feb 2000, Dragos Ruiu wrote:

> The problem with DDOS:
>
> - It is infeasible to secure the entire net.
<DELETIA>

> As this is an industry wide issue, it is doubtful a single source commercial
> antidote to all the potential DDOS problems can be found with a single
> countermeasure. So I propose a collaboration between service providers -
> an Anti-ddos ISP Coalition to remedy the problem.

<DELETIA>
> . . . There are numerous inherent DoS
> opportunities in such a system so great care needs to be taken care beween
> Defenders to use strong authentication.  In addition, guidelines should be
> drafted so no draconian penalties are imposed on clients that have potentially
> spurious complaints filed against them.  I would suggest that no action be
> taken until mutliple complaints are filed, and then some sort of attack
> verification process with the victim be used before attack relays are
> notified/penalized.  Systems that are repeatedly/consistently used as attackers
> could be  filtered/disabled/penalized until approriate security improvements are
> demonstrated to their ISP - thus providing the motivation for the attack relays
> to care about the damage they are doing and to spend the effort on better
> security.
>
> -To stop this system from being used as a DoS itself, I would propose that
> some sort of fine or other financial penalty be imposed for false or improper
> complaints being filed (like the fines for pulling a fire alarm).
(4802363) ------------------------------------------(Ombruten)

4822674 2000-02-22  00:52  /155 rader/ Postmaster
Mottagare: Bugtraq (import) <9896>
Ärende: A DDOS defeating technique based on routing
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Message-ID:  <200002201734.OAA18447@ns1.via-net-works.net.ar>
Date:         Sun, 20 Feb 2000 14:33:44 -0300
Reply-To: Fernando Schapachnik <fpscha@via-net-works.net.ar>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Fernando Schapachnik <fpscha@NS1.VIA-NET-WORKS.NET.AR>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Distributed Deniel Of Service attacks. A proposal based on routing.
-------------------------------------------------------------------
(version 1.0)

Disclaimer
----------

	The opinions expressed here are mine only. My current
employer does not hold any responsability over them.

	This is only a proposal that must be considered as _draft_ or
_work in progress_. It is made available to the Internet community as
a contribution to fight the DDOS threat. It is published as and
'thinking starting point' rather than as closed solution.

	Please be aware that assesments made here could be wrong. I'd love to
here corrections and refutals.

Abstract
--------

	This paper describes a technique that -hopefully- can be used
to defeat the recent DDOS attacks. The solution presented here is
bases on routing. It requires a certain amount of extra network
infrastructure.

Introduction
------------

	Recent attacks to big Internet sites such as Yahoo and CNN
has possed a threat on Internet security. The problem with these DDOS
is that packets come from spoofed addresses and tracking the source
becomes a very complex task involving cross-AS cooperation and a huge
amount of time.

	Some measures have been proposed, but they are based on
filtering forged packets at the origin, and this means action by an
-a priori- uniterested party. Furthermore little has been proposed to
stop attacks as they are being produced.

	This paper introduces a method that can be used in some
situations to avoid this kind of attacks in a short time fraim. It's
efectivy increases if it is combined with origin-analysis techniques.


Description
-----------

	We will introduce the proposed technique by means of an
example. Let's suppose example.com has an important web site. During
the scope of this paper we will asume we are not interested on any
other service than www, although this method can be applied to
protect another services (but not all of them).  Another
simplification will be to assume that example.com has only one link
to the Internet.

	We can draw example.com current infrastructure like this:

    +--------+
-a--|        |            +---------------+
    |        |            |               |     +-----------------+
-b--|  ISP   +-----d------+ example.com's +-----+ www.example.com |
    |        |            | border router |     +-----------------+
-c--|        |            +---------------+     \
    +--------+                             \     10.0.0.2
                                            10.0.0.1

Being: a, b and c the ISP links to the Internet, and d a link between
the ISP and example.com. Let 10.0.0.1 be the IP assigned to the
internal interface of the border router and 10.0.0.2 the IP assigned
to www.example.com public web server.

	It can be argued that there must be a firewall in between,
but this is not relevant to the proposal.

	The proposed technique is about changing the IP addresses of
the hosts being attacked and diverting the IP block under attack to a
stub network where traffic can be analyzed to track it down, or just
dropped.

	In order to be ready to a massive DDOS attack, example.com should
change its network structure to something like:

                          +--------------+
               +----e-----+ stub network |
	       |          +--------------+
    +--------+ |
-a--|        | |          +---------------+
    |        | |          |               |     +-----------------+
-b--|  ISP   +-+---d------+ example.com's +-----+ www.example.com |
    |        |            | border router |     +-----------------+
-c--|        |            +---------------+     \
    +--------+                             \     10.0.0.2 and 10.0.1.2
                                            10.0.0.1 and 10.0.1.1

 +---------------+
 | example.com's |
 | DNS server    |
 | where         |
 | www=10.0.0.2  |
 +---------------+

	In case a DDOS attack against example.com is detected, the following
actions should be carried on:

1- dial up connection to example.com's externally located DNS server
(possible many of them in order to complicate DDOSing both www and
DNS servers) to make www.example.com point to 10.0.1.2.  2- phone
call to ISP to route traffic to 10.0.0.x to the stub network and
start routing the 10.0.1 network.

	These simple steps would divert the attack to a place where
it doesn't disrupts example.com functionality and where it can be
tracked down.

	Of course the attacker can notice the change, and: a) attack
also the new network. In this case his 'firing power' against each
network would be halfed. This opens the chance to example.com to have
many networks to be used for such cases. Hopefully, a sufficient
number of networks would make the amount of traffic received by each
one large enough to be handled by undelying infraestructure.  b)
attack _only_ the new network. example.com can switch back to the old
one, or even a new one. Maybe this is the best move the attacker can
made, but if he does the comprised machines would create a pattern of
traffic very easily identified by a distributed network scanner that
can consult a central site for patterns and can _hopefully_ be run on
periodic bases by ISPs concerned about Internet safety.


Conclusion
----------

	A method for defeating DDOS attacks on real time has been
depicted.  This method is not bullet proof and requires a certain
amount of extra network infrastructure.

	Publishing it in its actual form main purposed is having it enhanced
by the Internet community.



Fernando P. Schapachnik
Administración de la red
VIA NET.WORKS ARGENTINA S.A.
fernando@via-net-works.net.ar
(54-11) 4323-3333
(4822674) ------------------------------------------(Ombruten)

4838851 2000-02-25  23:19  /133 rader/ Postmaster
Mottagare: Bugtraq (import) <9965>
Ärende: Re: A DDOS defeating technique based on routing
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Message-ID:  <200002221732.OAA18546@ns1.via-net-works.net.ar>
Date:         Tue, 22 Feb 2000 14:32:56 -0300
Reply-To: Fernando Schapachnik <fpscha@via-net-works.net.ar>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Fernando Schapachnik <fpscha@NS1.VIA-NET-WORKS.NET.AR>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

I'll summarize many responses my proposal has have and give my
thoughts about each one. Sorry for not been able to answer each one
individually.  Not enought time ;-)

Let me first state that this was never meant to be a cure for every
situation. I think is only feasible in particular cases. I do agree
with most posts stating that to really solve DDOS we must attack the
problem at its roots: egress filtering. My proposal aimes to help the
ones that are being attacked.

Renaud Deraison <deraison@cvs.nessus.org> said:
>       In order to be ready to a massive DDOS attack, example.com should
> change its network structure to something like:
>
>                           +--------------+
>                +----e-----+ stub network |
>                |          +--------------+
>     +--------+ |
> -a--|        | |          +---------------+
>     |        | |          |               |     +-----------------+
> -b--|  ISP   +f+---d------+ example.com's +-----+ www.example.com |
>     |        |            | border router |     +-----------------+
> -c--|        |            +---------------+     \
>     +--------+                             \     10.0.0.2 and 10.0.1.2
>                                             10.0.0.1 and 10.0.1.1


If example.com is flooded with bogus network traffic (say, lots of
TCP RST) , then the link "f" that I added on your map will be flooded
anyway. So neither the stub network or example.com's border router
will receive all the data they should receive. So the attack is still
active.

---> Answer: it was just a graphic mistake. E and d should be
absolutely independent links.

=======================================================

Andreas Bogk <andreas@andreas.org> said:
>      The proposed technique is about changing the IP addresses of the hosts
> being attacked and diverting the IP block under attack to a stub network
> where traffic can be analyzed to track it down, or just dropped.

This will not help, as the ISPs border router is still flooded. You
could drop the BGP route for that network, but that is highly
undesirable: you would end up needing one BGP advertisement per
"important" server.

---> Answer: this solution is intendeed to site's whose ISP has
multiple links. Hopefully, the ISP total bandwidth is several times
the bandwidth it sells to its customer, and it uses some kind of
traffic shaping for each customer at the other end of its links, so
he could survive the attack. If the ISP can't survive the attack,
neither can its customers.

And BGP routes are a scarce resource, since they cost RAM in
everybody's border router: usually ASen try hard to announce as few of
them as possible, some aggregate all of their space to a single
announcement.

---> Answer: you would have to spend some resources in order to get
protection. ISP can aggregate routes at its borders, so nobody knows
that the route has been dropped (this is usefull is the ISP can
survive the attack) or can advertise each involved network
separatedly. The last option has the disadvantage you pointed out,
but the advantage of traffic being dispersed nearer its origin.

============================================

Many pointed out thinks like:
DNS records aren't instantly propogated to everyone (because of the
TTL). How do you make sure that clients are diverted to the proper
website?

---> Answer: Of course you have to use 0 (or very small) TTL DNS
records.  Remember RFC 1034: "[...] a zero TTL prohibits caching
[...]".

===========================================
David Brumley <dbrumley@rtfm.stanford.edu> said:

If the DDOS attack was targeted at the router one hop before the web
server, you would have to move the whole subnet.

---> Answer: Yes, you are right. A solution might be for this router
no to respond to ICMP or traceroutes, so its IP does not become
publicly available.

===========================================

Many pointed out:

The attacker can switch its attack to the new network.

---> Answer: in this case he is creating a very particular traffic
pattern.  He will be consulting DNS servers very often. The clients
can do it automatically, so surfing logs will show them, or even the
'evil master' behind the attack could make a mistake and consult them
often enough. If his software must attack and IP address (not a FQDN)
and he has some experience, he will consult DNS from one of the
comprised machines, but then again you can track him down from there,
as he must use real IPs to get to that machine.

===========================================================

Felix von Leitner <felix@convergence.de> said:

DDOS attacks normally saturate a, b and c as well, so this change will
only help dial-up users from ISP in general.  The DDOS attacks that
struck Germany so far have always taken the whole ISP with them.

---> Answer: I'd really like to know if during these attacks ISP was
appling bandwidth limiting to the customer being flooded on the other
side of each of its Internet links.



Fernando P. Schapachnik
Administración de la red
VIA NET.WORKS ARGENTINA S.A.
fernando@via-net-works.net.ar
(54-11) 4323-3333
(4838851) ------------------------------------------(Ombruten)