[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Cloudflare is down

On 2013-03-04 08:09, Christopher Morrow wrote:
> On Mon, Mar 4, 2013 at 2:31 AM, Saku Ytti <saku at ytti.fi> wrote:
>> I know lot of vendors are fuzzing with 'codenomicon' and they appear 
>> not to
>> have flowspec fuzzer.
> i suspect they fuzz where the money is ...
> number of users of bgp?
> number of users of flowspec?

While fuzzing of BGP[*] on the wire _may have identified some of this, 
there were many components involved (e.g., the DDoS attack on a 
customer's DNS servers that tickled their "attack profiler", their 
attack profiler was presumably confused about the suspect packet sizes 
as indicated in the presented "output signature", their operator didn't 
identify the issue before disseminating the recommended "signatures", 
JUNOS didn't barf when compiling the configuration (that'd be a big 
packet), a memory leak / thrashing triggered by the ingested flow_spec 
UPDATE crashed receiving routers, routers apparently recovered 
non-deterministically, etc..).

Leo's comments remind me of the The President's Commission to 
Investigate the Accident at Three Mile Island (TMI) findings, where 
pretty much everyone was blamed, but the operators were identified as 
ultimately culpable (in this case, presumably, _they also wrote the 
"attack profiler", although "they" may not have been precisely who 
deployed the policy).

For an interesting perspective of "normal accidents" derived from 
interactive complexity see [NormalAccidents], it's quite applicable to 
today's networks systems, methinks.


[NormalAccidents] Perrow, Charles, "Normal Accidents: Living with 
High-Risk Technologies", 1999.