I may be traumatized until November 9.
bp
<part15sbs{at}gmail{dot}com>
On 10/21/2016 11:48 AM, That One Guy /sarcasm wrote:
forcing people to interact in person... a dangerous prospect in these
times
On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart
<timreichh...@hometowncable.net
<mailto:timreichh...@hometowncable.net>> wrote:
It seems like facebook is also getting slow.
------------------------------------------------------------------------
-----Original Message-----
From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>>
To: af@afmug.com <mailto:af@afmug.com>
Date: 10/21/16 02:37 PM
Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
This is still going right now... big and small websites and
ISP's are unreachable and unresponsive. :(
Travis
On 10/21/2016 12:19 PM, Ken Hohhof wrote:
Interesting, according to that, the ISP DNS servers are
recruited as part of the attack on the victim's authoritative
DNS servers, by sending queries from within the ISP's network.
No spoofing, no amplification, no misconfigured DNS servers
required, yet the ISP's DNS servers are used to send the
attack traffic. All that is needed is a compromised IoT to
send the query.
*From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of* Josh
Baird
*Sent:* Friday, October 21, 2016 12:42 PM
*To:* af@afmug.com <mailto:af@afmug.com>
*Subject:* Re: [AFMUG] Another large DDoS, Stop Being a Dick
Right - crap IoT devices on the Mirai botnet were responsible
for shoving 620+Gbps of traffic at Akamai to take down Krebs
(and over 1Tbps to take down OVH). No spoofing involved.
Interesting article on the techniques used by Mirai:
https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
<https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937>
On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com
<mailto:af...@kwisp.com>> wrote:
The amplifier would receive a query from a spoofed IP
address, and respond using a legit IP address. So the
attacker needs to control some computers that can spoof
the victim's IP address, but the actual attack traffic
comes from the amplifiers using legit source IPs.
In the case of IoT botnets, I'm not sure any spoofing is
required.
*From:* Af [mailto:af-boun...@afmug.com
<mailto:af-boun...@afmug.com>] *On Behalf Of* Josh Baird
*Sent:* Friday, October 21, 2016 12:21 PM
*To:* af@afmug.com <mailto:af@afmug.com>
*Subject:* Re: [AFMUG] Another large DDoS, Stop Being a Dick
It's a good start. It attempts to prevent spoofed traffic
originating from your network to leave your network (or
BCP38).
On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman
<j...@imaginenetworksllc.com
<mailto:j...@imaginenetworksllc.com>> wrote:
It can't be that simple...can it?
Josh Luthman
Office: 937-552-2340 <http://tel:937-552-2340>
Direct: 937-552-2343 <http://tel:937-552-2343>
1100 Wayne St
Suite 1337
Troy, OH 45373
On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett
<af...@ics-il.net <mailto:af...@ics-il.net>> wrote:
/ip firewall address-list
add list="Public-IPs" address=x.x.x.x/yy
disabled=no comment="My IPs"
add list="Public-IPs" address=x.x.x.x/yy
disabled=no comment="Downstream customer X IPs"
/ip firewall filter
add action=drop chain=forward comment="Drop
spoofed traffic" disabled=no
out-interface="To-Upstream"
dst-address-list=!"Public-IPs"
That was largely composed off of the top of my
head and typed on my phone, so it may not be
completely accurate.
You should also do it on customer-facing ports
not allowing anything to come in, but that would
be best approached once Mikrotik and the per
interface setting for unicast reverse path
filtering. You would then said customer facing
interfaces to strict and all other interfaces to
loose. They accepted the feature request, just
haven't implemented it yet.
-----
Mike Hammett
Intelligent Computing Solutions
<http://www.ics-il.com/>
<https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
Midwest Internet Exchange
<http://www.midwest-ix.com/>
<https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
The Brothers WISP <http://www.thebrotherswisp.com/>
<https://www.facebook.com/thebrotherswisp>
<https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
------------------------------------------------------------------------
*From:* "Mike Hammett" <af...@ics-il.net
<mailto:af...@ics-il.net>>
*To:* af@afmug.com <mailto:af@afmug.com>
*Sent:* Friday, October 21, 2016 11:21:35 AM
*Subject:* [AFMUG] Another large DDoS, Stop Being
a Dick
There's another large DDoS going on now. Go to
this page to see if you can be used for UDP
amplification (or other spoofing) attacks:
https://www.caida.org/projects/spoofer/
<https://www.caida.org/projects/spoofer/>
Go to these pages for more longer term bad
behavior monitoring:
https://www.shadowserver.org/wiki/
<https://www.shadowserver.org/wiki/>
https://radar.qrator.net/
Maybe we need to start a database of ASNs WISPs
are using and start naming and shaming them when
they have bad actors on their network. This is
serious, people. Take it seriously.
-----
Mike Hammett
Intelligent Computing Solutions
<http://www.ics-il.com/>
<https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
Midwest Internet Exchange
<http://www.midwest-ix.com/>
<https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
The Brothers WISP <http://www.thebrotherswisp.com/>
<https://www.facebook.com/thebrotherswisp>
<https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
--
If you only see yourself as part of the team but you don't see your
team as part of yourself you have already failed as part of the team.