SlideShare a Scribd company logo
redGuardian DP100
large scale DDoS mitigation
revision: 2017.08.04
Introduction
1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming
serious issue for network operators and their customers.
2. DDoS mitigation at this scale is considered complex and
expensive task.
3. We wold like to show you we can mitigate such attacks in a
cost-effective way.
redGuardian DP100 (1)
• DDoS scrubber for terabit scale DDoS attack mitigation
• 100Gbit+ scrubbing capacity per 1RU node
• DPI, lightweight unidirectional states, regexps
redGuardian DP100 (2)
• multi tenancy
• line rate speed
• runs on x86 platform
DDoS attacks
source: Akamai „State of the Internet”, Q4 2016
Notice, almost all high volume attacks are:
• reflected and amplified UDP, including
fragmented responses
• various TCP floods
It is the same and well known for years.
redGuardian – some of mitigated attacks
Protocol Name
UDP Chargen reflected response flood
UDP DNS reflected response flood
UDP Echo reflected response flood
UDP LDAP query flood
UDP LDAP reflected response flood
UDP MSSQL reflected response flood
UDP NetBIOS reflected response flood
UDP NTP reflected response flood
UDP QOTD reflected response flood
UDP RIP reflected response flood
UDP RPC Portmap reflected response flood
UDP Sentinel reflected response flood
UDP SNMP reflected response flood
UDP SSDP reflected response flood
UDP Steam query flood
UDP Steam reflected response flood
UDP fragment flood
TCP SYN flood
TCP ACK flood
TCP FIN flood
TCP RST flood
TCP fragment flood
TCP invalid flags
ICMP PING Flood
ICMP obsolete/legacy messages
ICMP fragment flood
GRE destination address validation
HTTP Wordpress botnet flood
IP invalid checksum
IP invalid fragment offset
IP packet length mismatch
IP source address from private address space
IP source address spoofed as myself
Comparison
Legacy DDoS solutions redGuardian
D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive
S/RTBH blocks source hosts, pushes thousands of entries into FIB,
may block legitimate users (spoofed source IPs)
logic does not rely on blocking source IPs, as these can be spoofed!
manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if
needed
installing Flowspec rules by DDoS detection system introduce
pressure on network equipment (thousands of rules pushed) when
facing large botnets and multi vector attacks, reaction is too slow
(dozen of seconds) and may block legitimate users (spoofed source
IPs)
does not require instrumentation from anomaly detection system,
blocks instantly; can match using more criterias than Flowspec,
including packet payload patterns
stateless ACL rules have limited functionality, while stateful engines
can be easily exhausted by installing millions of states
with lightweight states one can maintain billions of states with useful
metadata, thanks to that terabit scale inspection does not have to be
stateless
dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit
DDoS solutions price is very high
x86 hardware is fast, low cost and may already be installed in your
datacenter
Inside redGuardian x86 scrubber
• redGuardian dataplane
• 100G capacity
• 12 x 10G SFP+ port
or
1 x 100G QSFP28 port
• Xeon V3/V4 CPU
• 64GB RAM
• GNU/Linux OS
Inside redGuardian x86 scrubber: Ops perspective (1)
17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
// sniff sampled packets on received, transmitted or dropped side
# tcpdump -ni sampler-drop
# service dataplane status
● dataplane.service - Dataplane service
Loaded: loaded (/lib/systemd/system/dataplane.service; enabled)
Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago
Docs: man:dataplane(1)
man:dataplane.conf(5)
Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS)
Main PID: 37932 (dataplane)
CGroup: /system.slice/dataplane.service
└─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
Inside redGuardian x86 scrubber: Ops perspective (2)
# dpkg -l | grep dataplane
ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service
ii dataplane-collectd 280.0 amd64 dataplane collectd integration
// easy 3rd party performance management systems integration like Grafana
redGuardian capabilities (1)
• stateless ACL match L3/L4 and payload
– drop based on provided or custom sigantures
– drop udp sport 1434 data u64 0x5365727665724e61 at 3
– drop udp dport 389 data str "objectclass0" at 34
– drop frag single-or-first icmp type 0 code 1:255
• lightweight, unidirectional state filters
– suitable for asymmetric routing scenarios
– enforce retries, drop fragment chains
– billions of entries
redGuardian capabilities (2)
• rate-limiting
– enforce pps per flow with billions of policers
– enforce Mbps per rule or per customer on exit
• regexp engine
– drop packets with payload maching regular expressions
– match domain names in DNS query section
• source IP tagging for ACL rules
– each /24 of global IPv4 space can have one of 16 tags
– each /32 of global IPv4 space can have up to 8 marks
– drop udp srctag $bad_country
– drop udp marked $bad_ips
Performance
CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled)
Note: only one CPU core used for packet fowarding!
Scenario Mpps 10G line rate %
ACL basic drop 14,88 100%
ACL long drop 8,72 59%
TCP SYN state filter 10,04 67%
hashed rate-limit 10,44 70%
redGuardian can handle 100G line rate on modern multicore Xeon server.
Deployment (on-prem, off-path)
1. Place redGuardian scrubbers
nearby transit and peering routers
for effective traffic hijacking.
2. Connect directly to routers or core
switches using n×10G or 100G
ports (LAG), assign /31 p2p for
scrubber.
3. Use 3rd party opensource
(pmacct+ExaBGP, FastNetMon) or
commercial flow-based analytics
tools to detect IP under attack and
divert its incoming traffic (change
next-hop to scrubber or move
packets into special VRF).
4. Ensure injected /32 routes or
Flowspec rules are active at transit
router tables or transit interfaces
only (loop prevention).
redGuardian
scrubber
IP core
transit/peering VRF
flow-based
analytics
IP core
flows or SPAN
BGP /32 injection,
Flowspec rules, PBR
DDoS
victim
diverted traffic to
/32 victim
cleaned traffic
injected into IP core
normal traffic,
other customers
Deployment (on-prem, inline)
redGuardian
scrubber
protected networkupstream
1. Place redGuardian scrubbers between protected network and
upstream providers/transit links, using 2n×10G or 2n×100G ports.
2. Scrubber acts like filtering bridge between pairs of ports.
Availability
• physical 100G appliance
• software license
– use your own x86 hardware
– scale capacity between PoPs as needed
• service (BGP scrubbing center)
Conclusion
redGuardian provides:
1. performance typical for specialised hardware
2. elasticity typical for software
3. working solution for large scale DDoS attacks problem
Additional resources
1. twitter: @redguardianeu
2. https://www.slideshare.net/atendesoftware/presentations
3. https://www.redguardian.eu/
4. http://www.atendesoftware.pl/
5. e-mail: info @ redguardian.eu
DDoS shall not pass!
https://twitter.com/redguardianeu

More Related Content

What's hot (20)

PPTX
High Performance Networking Leveraging the DPDK and Growing Community
6WIND
 
PDF
Cilium - API-aware Networking and Security for Containers based on BPF
Thomas Graf
 
PDF
DevConf 2014 Kernel Networking Walkthrough
Thomas Graf
 
PPTX
TRex Realistic Traffic Generator - Stateless support
Hanoch Haim
 
PDF
DPDK in Containers Hands-on Lab
Michelle Holley
 
PDF
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
Jim St. Leger
 
ODP
Dpdk performance
Stephen Hemminger
 
PDF
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
Thomas Graf
 
PPTX
Vigor 3910 docker firmware quick start
Jimmy Tu
 
PPTX
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
Lagopus SDN/OpenFlow switch
 
PPTX
Enable DPDK and SR-IOV for containerized virtual network functions with zun
heut2008
 
PDF
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
Jim St. Leger
 
PDF
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
Thomas Graf
 
PDF
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus SDN/OpenFlow switch
 
PDF
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
Jim St. Leger
 
PDF
Linux Native, HTTP Aware Network Security
Thomas Graf
 
PPTX
Tc basics
jeromy fu
 
PDF
Network Programming: Data Plane Development Kit (DPDK)
Andriy Berestovskyy
 
PDF
Performance challenges in software networking
Stephen Hemminger
 
PDF
Open vSwitch - Stateful Connection Tracking & Stateful NAT
Thomas Graf
 
High Performance Networking Leveraging the DPDK and Growing Community
6WIND
 
Cilium - API-aware Networking and Security for Containers based on BPF
Thomas Graf
 
DevConf 2014 Kernel Networking Walkthrough
Thomas Graf
 
TRex Realistic Traffic Generator - Stateless support
Hanoch Haim
 
DPDK in Containers Hands-on Lab
Michelle Holley
 
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
Jim St. Leger
 
Dpdk performance
Stephen Hemminger
 
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
Thomas Graf
 
Vigor 3910 docker firmware quick start
Jimmy Tu
 
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
Lagopus SDN/OpenFlow switch
 
Enable DPDK and SR-IOV for containerized virtual network functions with zun
heut2008
 
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
Jim St. Leger
 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
Thomas Graf
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus SDN/OpenFlow switch
 
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
Jim St. Leger
 
Linux Native, HTTP Aware Network Security
Thomas Graf
 
Tc basics
jeromy fu
 
Network Programming: Data Plane Development Kit (DPDK)
Andriy Berestovskyy
 
Performance challenges in software networking
Stephen Hemminger
 
Open vSwitch - Stateful Connection Tracking & Stateful NAT
Thomas Graf
 

Viewers also liked (8)

PDF
Protect your edge BGP security made simple
Pavel Odintsov
 
PDF
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Pavel Odintsov
 
PDF
Lekker weer nlnog_nlnog_ddos_fl
Pavel Odintsov
 
PPTX
DeiC DDoS Prevention System - DDPS
Pavel Odintsov
 
PDF
Keeping your rack cool
Pavel Odintsov
 
PDF
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Pavel Odintsov
 
PDF
DDoS Mitigation Tools and Techniques
Babak Farrokhi
 
PDF
Nanog66 vicente de luca fast netmon
Pavel Odintsov
 
Protect your edge BGP security made simple
Pavel Odintsov
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Pavel Odintsov
 
Lekker weer nlnog_nlnog_ddos_fl
Pavel Odintsov
 
DeiC DDoS Prevention System - DDPS
Pavel Odintsov
 
Keeping your rack cool
Pavel Odintsov
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Pavel Odintsov
 
DDoS Mitigation Tools and Techniques
Babak Farrokhi
 
Nanog66 vicente de luca fast netmon
Pavel Odintsov
 
Ad

Similar to redGuardian DP100 large scale DDoS mitigation solution (17)

PDF
100 M pps on PC.
Redge Technologies
 
PDF
XDP in Practice: DDoS Mitigation @Cloudflare
C4Media
 
PDF
Rethinking Security: Corsa Red Armor Network Security Enforcement
Corsa Technology
 
PPTX
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PROIDEA
 
PDF
DoS and DDoS mitigations with eBPF, XDP and DPDK
Marian Marinov
 
PPTX
StreamSleuth 100 GbE Network Packet Processing Appliance
Marcus Weddle
 
PDF
Make DDoS expensive for the threat actors
APNIC
 
PPTX
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
PROIDEA
 
PDF
Denial of Service - Service Provider Overview
MarketingArrowECS_CZ
 
PDF
A10_CompactTrainingv5.pdf (1).pdf
neoalt
 
PPTX
SCADA Strangelove: Hacking in the Name
Positive Hack Days
 
PPTX
SCADA Strangelove: взлом во имя
Ekaterina Melnik
 
PPT
9534715
Pavel Odintsov
 
PDF
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PROIDEA
 
PPT
Packet Card Knowledge Transferfinal
Abdel-Fattah M. Hmoud
 
PDF
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
PDF
IPv6-Hardening.pdf
Mustafazer21
 
100 M pps on PC.
Redge Technologies
 
XDP in Practice: DDoS Mitigation @Cloudflare
C4Media
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Corsa Technology
 
PLNOG 18 - Paweł Małachowski - Spy hard czyli regexpem po pakietach
PROIDEA
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
Marian Marinov
 
StreamSleuth 100 GbE Network Packet Processing Appliance
Marcus Weddle
 
Make DDoS expensive for the threat actors
APNIC
 
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
PROIDEA
 
Denial of Service - Service Provider Overview
MarketingArrowECS_CZ
 
A10_CompactTrainingv5.pdf (1).pdf
neoalt
 
SCADA Strangelove: Hacking in the Name
Positive Hack Days
 
SCADA Strangelove: взлом во имя
Ekaterina Melnik
 
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PROIDEA
 
Packet Card Knowledge Transferfinal
Abdel-Fattah M. Hmoud
 
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
IPv6-Hardening.pdf
Mustafazer21
 
Ad

More from Redge Technologies (10)

PDF
[PL] DDoS na sieć ISP (KIKE 2023)
Redge Technologies
 
PDF
BGP zombie routes
Redge Technologies
 
PPTX
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
Redge Technologies
 
PPTX
BGP hijacks and leaks
Redge Technologies
 
PPTX
Stress your DUT
Redge Technologies
 
PPTX
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
Redge Technologies
 
PDF
100Mpps czyli jak radzić sobie z atakami DDoS?
Redge Technologies
 
PPTX
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
Redge Technologies
 
PDF
Na froncie walki z DDoS
Redge Technologies
 
PDF
100 M pakietów na sekundę dla każdego.
Redge Technologies
 
[PL] DDoS na sieć ISP (KIKE 2023)
Redge Technologies
 
BGP zombie routes
Redge Technologies
 
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
Redge Technologies
 
BGP hijacks and leaks
Redge Technologies
 
Stress your DUT
Redge Technologies
 
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
Redge Technologies
 
100Mpps czyli jak radzić sobie z atakami DDoS?
Redge Technologies
 
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
Redge Technologies
 
Na froncie walki z DDoS
Redge Technologies
 
100 M pakietów na sekundę dla każdego.
Redge Technologies
 

Recently uploaded (20)

PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
July Patch Tuesday
Ivanti
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Python basic programing language for automation
DanialHabibi2
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
July Patch Tuesday
Ivanti
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 

redGuardian DP100 large scale DDoS mitigation solution

  • 1. redGuardian DP100 large scale DDoS mitigation revision: 2017.08.04
  • 2. Introduction 1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming serious issue for network operators and their customers. 2. DDoS mitigation at this scale is considered complex and expensive task. 3. We wold like to show you we can mitigate such attacks in a cost-effective way.
  • 3. redGuardian DP100 (1) • DDoS scrubber for terabit scale DDoS attack mitigation • 100Gbit+ scrubbing capacity per 1RU node • DPI, lightweight unidirectional states, regexps
  • 4. redGuardian DP100 (2) • multi tenancy • line rate speed • runs on x86 platform
  • 5. DDoS attacks source: Akamai „State of the Internet”, Q4 2016 Notice, almost all high volume attacks are: • reflected and amplified UDP, including fragmented responses • various TCP floods It is the same and well known for years.
  • 6. redGuardian – some of mitigated attacks Protocol Name UDP Chargen reflected response flood UDP DNS reflected response flood UDP Echo reflected response flood UDP LDAP query flood UDP LDAP reflected response flood UDP MSSQL reflected response flood UDP NetBIOS reflected response flood UDP NTP reflected response flood UDP QOTD reflected response flood UDP RIP reflected response flood UDP RPC Portmap reflected response flood UDP Sentinel reflected response flood UDP SNMP reflected response flood UDP SSDP reflected response flood UDP Steam query flood UDP Steam reflected response flood UDP fragment flood TCP SYN flood TCP ACK flood TCP FIN flood TCP RST flood TCP fragment flood TCP invalid flags ICMP PING Flood ICMP obsolete/legacy messages ICMP fragment flood GRE destination address validation HTTP Wordpress botnet flood IP invalid checksum IP invalid fragment offset IP packet length mismatch IP source address from private address space IP source address spoofed as myself
  • 7. Comparison Legacy DDoS solutions redGuardian D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive S/RTBH blocks source hosts, pushes thousands of entries into FIB, may block legitimate users (spoofed source IPs) logic does not rely on blocking source IPs, as these can be spoofed! manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if needed installing Flowspec rules by DDoS detection system introduce pressure on network equipment (thousands of rules pushed) when facing large botnets and multi vector attacks, reaction is too slow (dozen of seconds) and may block legitimate users (spoofed source IPs) does not require instrumentation from anomaly detection system, blocks instantly; can match using more criterias than Flowspec, including packet payload patterns stateless ACL rules have limited functionality, while stateful engines can be easily exhausted by installing millions of states with lightweight states one can maintain billions of states with useful metadata, thanks to that terabit scale inspection does not have to be stateless dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit DDoS solutions price is very high x86 hardware is fast, low cost and may already be installed in your datacenter
  • 8. Inside redGuardian x86 scrubber • redGuardian dataplane • 100G capacity • 12 x 10G SFP+ port or 1 x 100G QSFP28 port • Xeon V3/V4 CPU • 64GB RAM • GNU/Linux OS
  • 9. Inside redGuardian x86 scrubber: Ops perspective (1) 17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast // sniff sampled packets on received, transmitted or dropped side # tcpdump -ni sampler-drop # service dataplane status ● dataplane.service - Dataplane service Loaded: loaded (/lib/systemd/system/dataplane.service; enabled) Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago Docs: man:dataplane(1) man:dataplane.conf(5) Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS) Main PID: 37932 (dataplane) CGroup: /system.slice/dataplane.service └─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
  • 10. Inside redGuardian x86 scrubber: Ops perspective (2) # dpkg -l | grep dataplane ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service ii dataplane-collectd 280.0 amd64 dataplane collectd integration // easy 3rd party performance management systems integration like Grafana
  • 11. redGuardian capabilities (1) • stateless ACL match L3/L4 and payload – drop based on provided or custom sigantures – drop udp sport 1434 data u64 0x5365727665724e61 at 3 – drop udp dport 389 data str "objectclass0" at 34 – drop frag single-or-first icmp type 0 code 1:255 • lightweight, unidirectional state filters – suitable for asymmetric routing scenarios – enforce retries, drop fragment chains – billions of entries
  • 12. redGuardian capabilities (2) • rate-limiting – enforce pps per flow with billions of policers – enforce Mbps per rule or per customer on exit • regexp engine – drop packets with payload maching regular expressions – match domain names in DNS query section • source IP tagging for ACL rules – each /24 of global IPv4 space can have one of 16 tags – each /32 of global IPv4 space can have up to 8 marks – drop udp srctag $bad_country – drop udp marked $bad_ips
  • 13. Performance CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled) Note: only one CPU core used for packet fowarding! Scenario Mpps 10G line rate % ACL basic drop 14,88 100% ACL long drop 8,72 59% TCP SYN state filter 10,04 67% hashed rate-limit 10,44 70% redGuardian can handle 100G line rate on modern multicore Xeon server.
  • 14. Deployment (on-prem, off-path) 1. Place redGuardian scrubbers nearby transit and peering routers for effective traffic hijacking. 2. Connect directly to routers or core switches using n×10G or 100G ports (LAG), assign /31 p2p for scrubber. 3. Use 3rd party opensource (pmacct+ExaBGP, FastNetMon) or commercial flow-based analytics tools to detect IP under attack and divert its incoming traffic (change next-hop to scrubber or move packets into special VRF). 4. Ensure injected /32 routes or Flowspec rules are active at transit router tables or transit interfaces only (loop prevention). redGuardian scrubber IP core transit/peering VRF flow-based analytics IP core flows or SPAN BGP /32 injection, Flowspec rules, PBR DDoS victim diverted traffic to /32 victim cleaned traffic injected into IP core normal traffic, other customers
  • 15. Deployment (on-prem, inline) redGuardian scrubber protected networkupstream 1. Place redGuardian scrubbers between protected network and upstream providers/transit links, using 2n×10G or 2n×100G ports. 2. Scrubber acts like filtering bridge between pairs of ports.
  • 16. Availability • physical 100G appliance • software license – use your own x86 hardware – scale capacity between PoPs as needed • service (BGP scrubbing center)
  • 17. Conclusion redGuardian provides: 1. performance typical for specialised hardware 2. elasticity typical for software 3. working solution for large scale DDoS attacks problem
  • 18. Additional resources 1. twitter: @redguardianeu 2. https://www.slideshare.net/atendesoftware/presentations 3. https://www.redguardian.eu/ 4. http://www.atendesoftware.pl/ 5. e-mail: info @ redguardian.eu
  • 19. DDoS shall not pass! https://twitter.com/redguardianeu