LOL …. scary shit…. Facebook being slow isn’t anything new in my experience … they have to be having a hard time keeping up sometimes …. last I heard they were adding something around 200-300 new servers a day in each data centre
> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm > <thatoneguyst...@gmail.com> wrote: > > forcing people to interact in person... a dangerous prospect in these times > > On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart > <timreichh...@hometowncable.net <mailto:timreichh...@hometowncable.net>> > wrote: > It seems like facebook is also getting slow. > > -----Original Message----- > From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>> > To: af@afmug.com <mailto:af@afmug.com> > Date: 10/21/16 02:37 PM > Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick > > This is still going right now... big and small websites and ISP's are > unreachable and unresponsive. :( > > Travis > > > On 10/21/2016 12:19 PM, Ken Hohhof wrote: > >> Interesting, according to that, the ISP DNS servers are recruited as part of >> the attack on the victim's authoritative DNS servers, by sending queries >> from within the ISP's network. >> >> >> No spoofing, no amplification, no misconfigured DNS servers required, yet >> the ISP's DNS servers are used to send the attack traffic. All that is >> needed is a compromised IoT to send the query. >> >> >> <> >> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On >> Behalf Of Josh Baird >> Sent: Friday, October 21, 2016 12:42 PM >> To: af@afmug.com <mailto:af@afmug.com> >> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick >> >> >> Right - crap IoT devices on the Mirai botnet were responsible for shoving >> 620+Gbps of traffic at Akamai to take down Krebs (and over 1Tbps to take >> down OVH). No spoofing involved. >> >> >> Interesting article on the techniques used by Mirai: >> >> >> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937 >> >> <https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937> >> >> >> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com >> <mailto:af...@kwisp.com>> wrote: >> >> The amplifier would receive a query from a spoofed IP address, and respond >> using a legit IP address. So the attacker needs to control some computers >> that can spoof the victim's IP address, but the actual attack traffic comes >> from the amplifiers using legit source IPs. >> >> >> In the case of IoT botnets, I'm not sure any spoofing is required. >> >> >> <> >> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On >> Behalf Of Josh Baird >> Sent: Friday, October 21, 2016 12:21 PM >> To: af@afmug.com <mailto:af@afmug.com> >> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick >> >> >> It's a good start. It attempts to prevent spoofed traffic originating from >> your network to leave your network (or BCP38). >> >> >> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman <j...@imaginenetworksllc.com >> <mailto:j...@imaginenetworksllc.com>> wrote: >> >> It can't be that simple...can it? >> >> >> >> >> Josh Luthman >> Office: 937-552-2340 <http://tel:937-552-2340> >> Direct: 937-552-2343 <http://tel:937-552-2343> >> 1100 Wayne St >> Suite 1337 >> Troy, OH 45373 >> >> >> >> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net >> <mailto:af...@ics-il.net>> wrote: >> >> /ip firewall address-list >> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs" >> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream >> customer X IPs" >> >> /ip firewall filter >> add action=drop chain=forward comment="Drop spoofed traffic" disabled=no >> out-interface="To-Upstream" dst-address-list=!"Public-IPs" >> >> That was largely composed off of the top of my head and typed on my phone, >> so it may not be completely accurate. >> >> >> You should also do it on customer-facing ports not allowing anything to come >> in, but that would be best approached once Mikrotik and the per interface >> setting for unicast reverse path filtering. You would then said customer >> facing interfaces to strict and all other interfaces to loose. They accepted >> the feature request, just haven't implemented it yet. >> >> >> >> ----- >> Mike Hammett >> Intelligent Computing Solutions <http://www.ics-il.com/> >> <https://www.facebook.com/ICSIL> >> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >> <https://www.linkedin.com/company/intelligent-computing-solutions> >> <https://twitter.com/ICSIL> >> Midwest Internet Exchange <http://www.midwest-ix.com/> >> <https://www.facebook.com/mdwestix> >> <https://www.linkedin.com/company/midwest-internet-exchange> >> <https://twitter.com/mdwestix> >> The Brothers WISP <http://www.thebrotherswisp.com/> >> <https://www.facebook.com/thebrotherswisp> >> >> >> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >> From: "Mike Hammett" <af...@ics-il.net <mailto:af...@ics-il.net>> >> To: af@afmug.com <mailto:af@afmug.com> >> Sent: Friday, October 21, 2016 11:21:35 AM >> Subject: [AFMUG] Another large DDoS, Stop Being a Dick >> >> There's another large DDoS going on now. Go to this page to see if you can >> be used for UDP amplification (or other spoofing) attacks: >> >> https://www.caida.org/projects/spoofer/ >> <https://www.caida.org/projects/spoofer/> >> >> Go to these pages for more longer term bad behavior monitoring: >> >> https://www.shadowserver.org/wiki/ <https://www.shadowserver.org/wiki/> >> https://radar.qrator.net/ <https://radar.qrator.net/> >> >> >> Maybe we need to start a database of ASNs WISPs are using and start naming >> and shaming them when they have bad actors on their network. This is >> serious, people. Take it seriously. >> >> >> >> ----- >> Mike Hammett >> Intelligent Computing Solutions <http://www.ics-il.com/> >> <https://www.facebook.com/ICSIL> >> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >> <https://www.linkedin.com/company/intelligent-computing-solutions> >> <https://twitter.com/ICSIL> >> Midwest Internet Exchange <http://www.midwest-ix.com/> >> <https://www.facebook.com/mdwestix> >> <https://www.linkedin.com/company/midwest-internet-exchange> >> <https://twitter.com/mdwestix> >> The Brothers WISP <http://www.thebrotherswisp.com/> >> <https://www.facebook.com/thebrotherswisp> >> >> >> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> > > > > > > -- > If you only see yourself as part of the team but you don't see your team as > part of yourself you have already failed as part of the team.