So when we get our mikrotiks on the edge of our network we will be able to
easily do this magic blocking too?

On Tue, Dec 23, 2014 at 10:43 AM, Mark Radabaugh via Af <af@afmug.com>
wrote:
>
> UDP 1900 is ephemeral port, and a low number.
>
> Many network stacks pick ports sequentially above 1025 which means some
> portion of legitimate traffic is going to be dropped if you block just
> based on UDP 1900.   It will cause intermittent and unpredictable failures
> for applications and it will likely be very difficult to troubleshoot since
> the issue will be short lived in most cases.
>
> You probably want to consider a more specific filter looking deeper in the
> packet.
>
> Mark
>
>
>
>
>
> On Dec 23, 2014, at 10:06 AM, Ty Featherling via Af <af@afmug.com> wrote:
>
> After seeing suspicious traffic I have dropped UDP port 1900 globally with
> no ill-effects. I have dropepd over 300 GB of that traffic this month.
>
> -Ty
>
> On Mon, Dec 22, 2014 at 9:36 PM, Ken Hohhof via Af <af@afmug.com> wrote:
>>
>>   I read somewhere, I think maybe Ars, that the DDoS attack has been
>> going on for several days and is using primarily NTP and SSDP (UPnP
>> discovery protocol) amplification.  And that SSDP has succeeded NTP and DNS
>> as the amplification method for big (> 1Gbps) DDoS attacks.  Apparently
>> because the industry jumped on securing open NTP servers.  And even though
>> SSDP provides less amplification than NTP, there are more targets and they
>> are mostly home routers which consumers are not going to patch even if
>> there is patched firmware available.  Plus UDP makes it easier to spoof the
>> source IP.
>>
>> So I must have missed that UDP port 1900 is the new target for
>> amplification.
>>
>> I did a quick torch and saw a bunch of traffic on udp/1900, some inbound
>> only which I assume are scans, some bidirectional which I’m thinking is
>> suspicious but maybe some port 1900 traffic is normal because it is in the
>> >1024 ephemeral port range.
>>
>> I went and signed up for ShadowServer, figuring they will tell me what
>> IPs were responding to SSDP requests on what date and I can track down the
>> customer.  Anyone have a better approach?  If you identify customers with
>> UPnP open to the outside, are you contacting them and pushing them to fix
>> it?
>>
>> It’s just amazing to me that some routers would have UPnP open on the WAN
>> side.  What’s wrong with these companies?  I saw DLink mentioned, and sure
>> enough, when I torched for udp/1900, I saw a lot of connections for a
>> customer that I seem to remember has a DLink DIR-655.
>>
>>
>>  *From:* Jaime Solorza via Af <af@afmug.com>
>> *Sent:* Monday, December 22, 2014 7:58 PM
>> *To:* Animal Farm <af@afmug.com>
>> *Subject:* Re: [AFMUG] North Korea is down....
>>
>>  linksys modems for backhauls
>>
>>  Jaime Solorza
>> Wireless Systems Architect
>> 915-861-1390
>>
>> On Mon, Dec 22, 2014 at 2:48 PM, Tyson Burris @ Internet Communications
>> Inc via Af <af@afmug.com> wrote:
>>
>>>  No! No! They have Comcast Cable and Century Link DSL.  Normal stuff.
>>>
>>>
>>>
>>> *Tyson Burris, President*
>>> *Internet Communications Inc.*
>>> *739 Commerce Dr.*
>>> *Franklin, IN 46131*
>>>
>>> *317-738-0320 <317-738-0320> Daytime #*
>>> *317-412-1540 <317-412-1540> Cell/Direct #*
>>> *Online: **www.surfici.net* <http://www.surfici.net/>
>>>
>>>
>>>
>>> <image001.png>
>>>
>>> *What can ICI do for you?*
>>>
>>>
>>> *Broadband Wireless - PtP/PtMP Solutions - WiMax - Mesh Wifi/Hotzones -
>>> IP Security - Fiber - Tower - Infrastructure.*
>>>
>>> *CONFIDENTIALITY NOTICE: This e-mail is intended for the*
>>> *addressee shown. It contains information that is*
>>> *confidential and protected from disclosure. Any review,*
>>> *dissemination or use of this transmission or its contents by*
>>> *unauthorized organizations or individuals is strictly*
>>> *prohibited.*
>>>
>>>
>>>
>>> *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Travis Johnson
>>> via Af
>>> *Sent:* Monday, December 22, 2014 4:24 PM
>>> *To:* af@afmug.com
>>> *Subject:* Re: [AFMUG] North Korea is down....
>>>
>>>
>>>
>>> The FBI setup a P2P server in North Korea with the Sony movie as the
>>> only download. LOL
>>>
>>> Travis
>>>
>>> On 12/22/2014 2:08 PM, CBB - Jay Fuller via Af wrote:
>>>
>>>
>>> What did we do? Lol. How did we do it ?
>>>
>>> Sent from my Verizon Wireless 4G LTE Smartphone
>>>
>>>
>>>
>>
>>
>
>

-- 
All parts should go together without forcing. You must remember that the
parts you are reassembling were disassembled by you. Therefore, if you
can't get them together again, there must be a reason. By all means, do not
use a hammer. -- IBM maintenance manual, 1925

Reply via email to