vyos@vyos:~$ add container image sflow/ddos-protectFirst, download the sflow/ddos-protect image.
vyos@vyos:~$ mkdir -m 777 /config/sflow-rtCreate a directory to store persistent container state.
set container network sflowrt prefix 192.168.1.0/24Define an internal network to connect to container. Currently VyOS BGP does not allow direct connections to local addresses (e.g. 127.0.0.1), so we need to put controller on its own network so the router can connect and receive DDoS mitigation BGP RTBH / Flowspec controls.
set container name sflow-rt image sflow/ddos-protect set container name sflow-rt host-name sflow-rt set container name sflow-rt arguments '-Dddos_protect.router=192.168.1.1 -Dddos_protect.enable.flowspec=yes' set container name sflow-rt environment RTMEM value 200M set container name sflow-rt memory 0 set container name sflow-rt volume store source /config/sflow-rt set container name sflow-rt volume store destination /sflow-rt/store set container name sflow-rt network sflowrt address 192.168.1.2
Configure a container to run the image. The -Dddos_protect.router argument sets the BGP neighbor address, 192.168.1.1.
vyos@vyos:~$ ifconfig podman-sflowrt podman-sflowrt: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255 ether be:9e:69:f4:d0:4e txqueuelen 1000 (Ethernet) RX packets 28 bytes 2662 (2.5 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 27 bytes 8032 (7.8 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0Connections to containers on sflowrt container network appear to originate from 192.168.1.1, the address assigned to VyOS interface podman-sflowrt.
set system sflow interface eth0 set system sflow interface eth1 set system sflow interface eth2 set system sflow polling 30 set system sflow sampling-rate 1000 set system sflow drop-monitor-limit 50 set system sflow server 192.168.1.2Configure sFlow and send to sflow-rt container address 192.168.1.2.
set protocols bgp system-as 64500 set protocols bgp neighbor 192.168.1.2 port 1179 set protocols bgp neighbor 192.168.1.2 remote-as 65000 set protocols bgp neighbor 192.168.1.2 address-family ipv4-unicast set protocols bgp neighbor 192.168.1.2 address-family ipv4-flowspecConfigure sflow-rt as BGP neighbor. Documentation ASN 64500 should be replaced by your ASN. The private ASN 65000 is a DDoS Protect default and can be changed with the -Dddos_protect.as argument.
ssh -L 8008:192.168.1.2:8008 vyos@router.exampleUse ssh tunnel to connect to the container network and access web interface at http://localhost:8008. Real-time DDoS mitigation using BGP RTBH and FlowSpec describes how to configure the DDoS protect application. The screen capture above shows the Charts page after a couple of simulated DDoS attacks on an address, 198.51.100.129, protected by the VyOS router. The charts show two ip_flood and a single udp_amplification attack - see DDoS attacks and BGP Flowspec responses for information on simulating different types of DDoS attack to test mitigation responses. The Controls page shows three active controls. The table shows the targeted address, administrative address group, attack type, protocol, detection time, mitigation action and status of each active DDoS attack.
vyos@vyos:~$ show bgp ipv4 BGP table version is 0, local router ID is 192.168.1.1, vrf id 0 Default local pref 100, local AS 64500 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, r RIB-failure, S Stale, R Removed Nexthop codes: @NNN nexthop's vrf id, < announce-nh-self Origin codes: i - IGP, e - EGP, ? - incomplete RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path 198.51.100.129/32 192.0.2.1 0 65000 i Displayed 1 routes and 1 total pathsThe show command verifies that a Remotely Triggered Black Hole (RTBH) rule has been received for the drop mitigation actions. Advertising a black hole route risks collateral damage since it drops all traffic to the targetted host in order to protect network bandwidth and services provided by other hosts.
vyos@vyos:~$ show bgp ipv4 flowspec detail BGP flowspec entry: (flags 0x418) Destination Address 198.51.100.129/32 IP Protocol = 17 Source Port = 53 FS:rate 0.000000 received for 00:00:12 not installed in PBRThe show command verifies that a Flowspec rule has been received for the filter mitigation action. Using Flowspec to filter traffic is more targetted than using black hole routes. In this case only UDP traffic (IP Protocol 17) with Source Port 53 (DNS) is dropped, all other services provided by the targetted host are still accessible.
vyos@vyos:~$ show log container sflow-rt 2023-04-08T00:24:14Z INFO: Starting sFlow-RT 3.0-1681 2023-04-08T00:24:16Z INFO: Version check, running latest 2023-04-08T00:24:17Z INFO: Listening, BGP port 1179 2023-04-08T00:24:18Z INFO: Listening, sFlow port 6343 2023-04-08T00:24:19Z INFO: Listening, HTTP port 8008 2023-04-08T00:24:19Z INFO: DNS server 1.1.1.1 2023-04-08T00:24:19Z INFO: app/ddos-protect/scripts/ddos.js started 2023-04-08T00:24:19Z INFO: app/prometheus/scripts/export.js started 2023-04-08T00:24:19Z INFO: app/browse-drops/scripts/top.js started 2023-04-08T00:24:19Z INFO: app/browse-flows/scripts/top.js started 2023-04-08T00:26:11Z INFO: BGP open 192.168.1.1 51252 2023-04-08T14:37:36Z INFO: DDoS drop ip_flood 198.51.100.129 local 47 2023-04-08T14:38:19Z INFO: DDoS filter udp_amplification 198.51.100.129 local 53 2023-04-08T14:38:19Z INFO: DDoS drop ip_flood 198.51.100.129 local 17Attacks are recorded in the container log. Monitoring DDoS mitigation describes how to use Prometheus / Elasticsearch / Grafana to monitor DDoS activity and build dashboards.
This is only a partial configuration. Peering sessions with upstream routers need to be configured to propagate controls so that DDoS attack traffic can be blocked before it saturates the upstream link. The limited scrubbing capacity of the VyOS software router isn't a factor since traffic will be dropped in hardware upstream. The flexibility of the VyOS router is an advantage in providing visibility and analytics to quickly trigger mitigation actions.
No comments:
Post a Comment