Re: CPE dns hijacking malware

2013-11-12 Thread Matthew Galgoci
Date: Tue, 12 Nov 2013 06:35:51 + From: Dobbins, Roland rdobb...@arbor.net To: NANOG list nanog@nanog.org Subject: Re: CPE dns hijacking malware On Nov 12, 2013, at 1:17 PM, Jeff Kell jeff-k...@utc.edu wrote: (2) DHCP hijacking daemon installed on the client, supplying the

Re: CPE dns hijacking malware

2013-11-12 Thread Dobbins, Roland
On Nov 12, 2013, at 10:57 PM, Matthew Galgoci mgalg...@redhat.com wrote: It's probably more common than one would expect. Concur 100%. https://app.box.com/s/rblnddlhda44giwfa8hy --- Roland Dobbins rdobb...@arbor.net //

Re: CPE dns hijacking malware

2013-11-12 Thread Tom Morris
EXTREMELY common. Almost all Comcast Cable CPE has this same login, cusadmin / highspeed At least on ATT U-Verse gear, there's a sticker on the modem with the password which is a hash of the serial number or something equally unique. Almost all home routers also tend to have the default

Re: Do you obfuscate email headers when reporting spam issues to clients?

2013-11-12 Thread Landon
Hello NANOG, Just a quick note thanking those that responded to me on and off list. I appreciate the input! -- Landon Stewart landonstew...@gmail.com

RE: CPE dns hijacking malware

2013-11-12 Thread James Sink
Personally I have fond memories of going into my neighbor's router, flashing it with dd-wrt which allowed manual channel setting, and moving it off of the same wifi channel mine was on That was probably not a great idea, but you do what you have to sometimes. Props on that, but wouldn't it

Automatic abuse reports

2013-11-12 Thread Jonas Björklund
Hello, We got often abuse reports on hosts that has been involved in DDOS attacks. We contact the owner of the host help them fix the problem. I also would like to start send these abuse report to the ISP of the source. Are there any avaliable tools for this? Is there any plugin for nfsen? Do

Re: Automatic abuse reports

2013-11-12 Thread Sam Moats
We used to use a small perl script called tattle that would parse out the /var/log/secure on our *nix boxes, isolate the inbound ssh exploits, lookup the proper abuse contacts and report them. I haven't seen anything similar in years but it would be interesting to do more than null route IPs.

Re: CPE dns hijacking malware

2013-11-12 Thread Larry Sheldon
On 11/12/2013 3:24 PM, Larry Sheldon wrote: On 11/12/2013 12:12 AM, Dobbins, Roland wrote: On Nov 12, 2013, at 12:56 PM, Mike mike-na...@tiedyenetworks.com wrote: It appears that some of my subscribers DSL modems (which are acting as nat routers) have had their dns settings hijacked and

Re: CPE dns hijacking malware

2013-11-12 Thread Larry Sheldon
On 11/12/2013 3:54 PM, Larry Sheldon wrote: On 11/12/2013 3:24 PM, Larry Sheldon wrote: On 11/12/2013 12:12 AM, Dobbins, Roland wrote: On Nov 12, 2013, at 12:56 PM, Mike mike-na...@tiedyenetworks.com wrote: It appears that some of my subscribers DSL modems (which are acting as nat routers)

Re: Automatic abuse reports

2013-11-12 Thread Jeroen Massar
On 2013-11-12 16:58, Jonas Björklund wrote: Hello, We got often abuse reports on hosts that has been involved in DDOS attacks. We contact the owner of the host help them fix the problem. I also would like to start send these abuse report to the ISP of the source. Are there any

Re: CPE dns hijacking malware

2013-11-12 Thread Tom Morris
As I recall, the unit in question had a severely flawed auto channel selection algorithm that always, without fail, landed on the first OCCUPIED channel. It was pretty terrible. On Tue, Nov 12, 2013 at 4:18 PM, James Sink james.s...@freedomvoice.comwrote: Personally I have fond memories of

Re: CPE dns hijacking malware

2013-11-12 Thread Jared Mauch
Someone has to move. The defaults are really bad in dense deployments of 1,6,11. Always fun when we went to Japan in the early days and our equipment could not see channel 13 :-) Most need more fhss than single channel stuff. Jared Mauch On Nov 12, 2013, at 2:18 PM, James Sink

Re: Automatic abuse reports

2013-11-12 Thread Daniël W . Crompton
On 12 November 2013 22:52, Sam Moats s...@circlenet.us wrote: We used to use a small perl script called tattle that would parse out the /var/log/secure on our *nix boxes, isolate the inbound ssh exploits, lookup the proper abuse contacts and report them. I haven't seen anything similar in

Re: Automatic abuse reports

2013-11-12 Thread Randy Bush
I also would like to start send these abuse report to the ISP of the source. good idea. we all need more entries in our .procmailrcs randy

Re: Automatic abuse reports

2013-11-12 Thread William Herrin
On Tue, Nov 12, 2013 at 4:52 PM, Sam Moats s...@circlenet.us wrote: We used to use a small perl script called tattle that would parse out the /var/log/secure on our *nix boxes, isolate the inbound ssh exploits, lookup the proper abuse contacts and report them. I haven't seen anything similar

Re: Automatic abuse reports

2013-11-12 Thread Sam Moats
Your right they wouldn't get all of the way through. The three way handshake is great against blind spoofing attacks. That said the original poster was focused on a DOS event,to do that you really don't need the full handshake. I'm not sure if the end goal of whomever we were dealing with was

Re: Automatic abuse reports

2013-11-12 Thread William Herrin
On Tue, Nov 12, 2013 at 9:07 PM, Sam Moats s...@circlenet.us wrote: That said the original poster was focused on a DOS event,to do that you really don't need the full handshake. Point. Though not all DDOSes are created equal. The simple packet flood is, as likely as not, from forged addresses.

Re: Automatic abuse reports

2013-11-12 Thread Brandon Galbraith
On Tue, Nov 12, 2013 at 10:03 PM, William Herrin b...@herrin.us wrote: Now it would be trivial to setup syslog and sshd to give only the sessions that complete the handshake, however I'm also not sure how responsive some of the abuse contacts may be. I'll keep my restrictive network settings

Re: Automatic abuse reports

2013-11-12 Thread joel jaeggli
On Nov 12, 2013, at 9:16 PM, Brandon Galbraith brandon.galbra...@gmail.com wrote: On Tue, Nov 12, 2013 at 10:03 PM, William Herrin b...@herrin.us wrote: Now it would be trivial to setup syslog and sshd to give only the sessions that complete the handshake, however I'm also not sure how

Re: Automatic abuse reports

2013-11-12 Thread Hal Murray
William Herrin b...@herrin.us said: That's the main problem: you can generate the report but if it's about some doofus in Dubai what are the odds of it doing any good? It's much worse than that. Several 500 pound gorillas expect you to jump through various hoops to report abuse. Have you