LOL …. scary shit….

Facebook being slow isn’t anything new in my experience … they have to be 
having a hard time keeping up sometimes …. last I heard they were adding 
something around 200-300 new servers a day in each data centre

> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm 
> <thatoneguyst...@gmail.com> wrote:
> 
> forcing people to interact in person... a dangerous prospect in these times
> 
> On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart 
> <timreichh...@hometowncable.net <mailto:timreichh...@hometowncable.net>> 
> wrote:
> It seems like facebook is also getting slow.
> 
> -----Original Message-----
> From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>>
> To: af@afmug.com <mailto:af@afmug.com>
> Date: 10/21/16 02:37 PM
> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
> 
> This is still going right now... big and small websites and ISP's are 
> unreachable and unresponsive. :(
> 
> Travis
> 
> 
> On 10/21/2016 12:19 PM, Ken Hohhof wrote:
>  
>> Interesting, according to that, the ISP DNS servers are recruited as part of 
>> the attack on the victim's authoritative DNS servers, by sending queries 
>> from within the ISP's network.
>> 
>>  
>> No spoofing, no amplification, no misconfigured DNS servers required, yet 
>> the ISP's DNS servers are used to send the attack traffic. All that is 
>> needed is a compromised IoT to send the query.
>> 
>>  
>>   <>
>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
>> Behalf Of Josh Baird
>> Sent: Friday, October 21, 2016 12:42 PM
>> To: af@afmug.com <mailto:af@afmug.com>
>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>> 
>>  
>> Right - crap IoT devices on the Mirai botnet were responsible for shoving 
>> 620+Gbps of traffic at Akamai to take down Krebs (and over 1Tbps to take 
>> down OVH). No spoofing involved.
>> 
>>  
>> Interesting article on the techniques used by Mirai:
>> 
>>  
>> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
>>  
>> <https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937>
>>  
>>  
>> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com 
>> <mailto:af...@kwisp.com>> wrote:
>> 
>> The amplifier would receive a query from a spoofed IP address, and respond 
>> using a legit IP address. So the attacker needs to control some computers 
>> that can spoof the victim's IP address, but the actual attack traffic comes 
>> from the amplifiers using legit source IPs.
>> 
>>  
>> In the case of IoT botnets, I'm not sure any spoofing is required.
>> 
>>  
>>   <>
>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
>> Behalf Of Josh Baird
>> Sent: Friday, October 21, 2016 12:21 PM
>> To: af@afmug.com <mailto:af@afmug.com>
>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>> 
>>  
>> It's a good start. It attempts to prevent spoofed traffic originating from 
>> your network to leave your network (or BCP38).
>> 
>>  
>> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman <j...@imaginenetworksllc.com 
>> <mailto:j...@imaginenetworksllc.com>> wrote:
>> 
>> It can't be that simple...can it?
>> 
>> 
>> 
>>  
>> Josh Luthman
>> Office: 937-552-2340 <http://tel:937-552-2340>
>> Direct: 937-552-2343 <http://tel:937-552-2343>
>> 1100 Wayne St
>> Suite 1337
>> Troy, OH 45373
>> 
>>  
>>  
>> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net 
>> <mailto:af...@ics-il.net>> wrote:
>> 
>> /ip firewall address-list
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs"
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream 
>> customer X IPs"
>> 
>> /ip firewall filter
>> add action=drop chain=forward comment="Drop spoofed traffic" disabled=no 
>> out-interface="To-Upstream" dst-address-list=!"Public-IPs"
>> 
>> That was largely composed off of the top of my head and typed on my phone, 
>> so it may not be completely accurate.
>> 
>> 
>> You should also do it on customer-facing ports not allowing anything to come 
>> in, but that would be best approached once Mikrotik and the per interface 
>> setting for unicast reverse path filtering. You would then said customer 
>> facing interfaces to strict and all other interfaces to loose. They accepted 
>> the feature request, just haven't implemented it yet.
>> 
>> 
>> 
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>  <https://www.facebook.com/ICSIL> 
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>  <https://www.facebook.com/mdwestix> 
>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>  <https://www.facebook.com/thebrotherswisp>
>> 
>> 
>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> From: "Mike Hammett" <af...@ics-il.net <mailto:af...@ics-il.net>>
>> To: af@afmug.com <mailto:af@afmug.com>
>> Sent: Friday, October 21, 2016 11:21:35 AM
>> Subject: [AFMUG] Another large DDoS, Stop Being a Dick
>> 
>> There's another large DDoS going on now. Go to this page to see if you can 
>> be used for UDP amplification (or other spoofing) attacks:
>> 
>> https://www.caida.org/projects/spoofer/ 
>> <https://www.caida.org/projects/spoofer/>
>> 
>> Go to these pages for more longer term bad behavior monitoring:
>> 
>> https://www.shadowserver.org/wiki/ <https://www.shadowserver.org/wiki/>
>> https://radar.qrator.net/ <https://radar.qrator.net/>
>> 
>> 
>> Maybe we need to start a database of ASNs WISPs are using and start naming 
>> and shaming them when they have bad actors on their network. This is 
>> serious, people. Take it seriously.
>> 
>> 
>> 
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>  <https://www.facebook.com/ICSIL> 
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>  <https://www.facebook.com/mdwestix> 
>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>  <https://www.facebook.com/thebrotherswisp>
>> 
>> 
>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
>>  
> 
>  
> 
> 
> 
> -- 
> If you only see yourself as part of the team but you don't see your team as 
> part of yourself you have already failed as part of the team.

Reply via email to