Yes Steve. It is easy. -Ty
On Tue, Dec 23, 2014 at 11:18 AM, That One Guy via Af <af@afmug.com> wrote: > > So when we get our mikrotiks on the edge of our network we will be able to > easily do this magic blocking too? > > On Tue, Dec 23, 2014 at 10:43 AM, Mark Radabaugh via Af <af@afmug.com> > wrote: >> >> UDP 1900 is ephemeral port, and a low number. >> >> Many network stacks pick ports sequentially above 1025 which means some >> portion of legitimate traffic is going to be dropped if you block just >> based on UDP 1900. It will cause intermittent and unpredictable failures >> for applications and it will likely be very difficult to troubleshoot since >> the issue will be short lived in most cases. >> >> You probably want to consider a more specific filter looking deeper in >> the packet. >> >> Mark >> >> >> >> >> >> On Dec 23, 2014, at 10:06 AM, Ty Featherling via Af <af@afmug.com> wrote: >> >> After seeing suspicious traffic I have dropped UDP port 1900 globally >> with no ill-effects. I have dropepd over 300 GB of that traffic this month. >> >> -Ty >> >> On Mon, Dec 22, 2014 at 9:36 PM, Ken Hohhof via Af <af@afmug.com> wrote: >>> >>> I read somewhere, I think maybe Ars, that the DDoS attack has been >>> going on for several days and is using primarily NTP and SSDP (UPnP >>> discovery protocol) amplification. And that SSDP has succeeded NTP and DNS >>> as the amplification method for big (> 1Gbps) DDoS attacks. Apparently >>> because the industry jumped on securing open NTP servers. And even though >>> SSDP provides less amplification than NTP, there are more targets and they >>> are mostly home routers which consumers are not going to patch even if >>> there is patched firmware available. Plus UDP makes it easier to spoof the >>> source IP. >>> >>> So I must have missed that UDP port 1900 is the new target for >>> amplification. >>> >>> I did a quick torch and saw a bunch of traffic on udp/1900, some inbound >>> only which I assume are scans, some bidirectional which I’m thinking is >>> suspicious but maybe some port 1900 traffic is normal because it is in the >>> >1024 ephemeral port range. >>> >>> I went and signed up for ShadowServer, figuring they will tell me what >>> IPs were responding to SSDP requests on what date and I can track down the >>> customer. Anyone have a better approach? If you identify customers with >>> UPnP open to the outside, are you contacting them and pushing them to fix >>> it? >>> >>> It’s just amazing to me that some routers would have UPnP open on the >>> WAN side. What’s wrong with these companies? I saw DLink mentioned, and >>> sure enough, when I torched for udp/1900, I saw a lot of connections for a >>> customer that I seem to remember has a DLink DIR-655. >>> >>> >>> *From:* Jaime Solorza via Af <af@afmug.com> >>> *Sent:* Monday, December 22, 2014 7:58 PM >>> *To:* Animal Farm <af@afmug.com> >>> *Subject:* Re: [AFMUG] North Korea is down.... >>> >>> linksys modems for backhauls >>> >>> Jaime Solorza >>> Wireless Systems Architect >>> 915-861-1390 >>> >>> On Mon, Dec 22, 2014 at 2:48 PM, Tyson Burris @ Internet Communications >>> Inc via Af <af@afmug.com> wrote: >>> >>>> No! No! They have Comcast Cable and Century Link DSL. Normal stuff. >>>> >>>> >>>> >>>> *Tyson Burris, President* >>>> *Internet Communications Inc.* >>>> *739 Commerce Dr.* >>>> *Franklin, IN 46131* >>>> >>>> *317-738-0320 <317-738-0320> Daytime #* >>>> *317-412-1540 <317-412-1540> Cell/Direct #* >>>> *Online: **www.surfici.net* <http://www.surfici.net/> >>>> >>>> >>>> >>>> <image001.png> >>>> >>>> *What can ICI do for you?* >>>> >>>> >>>> *Broadband Wireless - PtP/PtMP Solutions - WiMax - Mesh Wifi/Hotzones - >>>> IP Security - Fiber - Tower - Infrastructure.* >>>> >>>> *CONFIDENTIALITY NOTICE: This e-mail is intended for the* >>>> *addressee shown. It contains information that is* >>>> *confidential and protected from disclosure. Any review,* >>>> *dissemination or use of this transmission or its contents by* >>>> *unauthorized organizations or individuals is strictly* >>>> *prohibited.* >>>> >>>> >>>> >>>> *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Travis Johnson >>>> via Af >>>> *Sent:* Monday, December 22, 2014 4:24 PM >>>> *To:* af@afmug.com >>>> *Subject:* Re: [AFMUG] North Korea is down.... >>>> >>>> >>>> >>>> The FBI setup a P2P server in North Korea with the Sony movie as the >>>> only download. LOL >>>> >>>> Travis >>>> >>>> On 12/22/2014 2:08 PM, CBB - Jay Fuller via Af wrote: >>>> >>>> >>>> What did we do? Lol. How did we do it ? >>>> >>>> Sent from my Verizon Wireless 4G LTE Smartphone >>>> >>>> >>>> >>> >>> >> >> > > -- > All parts should go together without forcing. You must remember that the > parts you are reassembling were disassembled by you. Therefore, if you > can't get them together again, there must be a reason. By all means, do not > use a hammer. -- IBM maintenance manual, 1925 >