It works great for me 90% of the time.  The other 10% it refuses to
function at all.


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Fri, Oct 21, 2016 at 2:50 PM, Paul Stewart <p...@paulstewart.org> wrote:

> LOL …. scary shit….
>
> Facebook being slow isn’t anything new in my experience … they have to be
> having a hard time keeping up sometimes …. last I heard they were adding
> something around 200-300 new servers a day in each data centre
>
> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm <
> thatoneguyst...@gmail.com> wrote:
>
> forcing people to interact in person... a dangerous prospect in these times
>
> On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart <
> timreichh...@hometowncable.net> wrote:
>
>> It seems like facebook is also getting slow.
>>
>> ------------------------------
>> -----Original Message-----
>> From: "Travis Johnson" <t...@ida.net>
>> To: af@afmug.com
>> Date: 10/21/16 02:37 PM
>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>
>> This is still going right now... big and small websites and ISP's are
>> unreachable and unresponsive. :(
>>
>> Travis
>>
>>
>> On 10/21/2016 12:19 PM, Ken Hohhof wrote:
>>
>>
>> Interesting, according to that, the ISP DNS servers are recruited as part
>> of the attack on the victim's authoritative DNS servers, by sending queries
>> from within the ISP's network.
>>
>>
>> No spoofing, no amplification, no misconfigured DNS servers required, yet
>> the ISP's DNS servers are used to send the attack traffic. All that is
>> needed is a compromised IoT to send the query.
>>
>>
>>
>>
>> *From:* Af [mailto:af-boun...@afmug.com <af-boun...@afmug.com>] *On
>> Behalf Of* Josh Baird
>> *Sent:* Friday, October 21, 2016 12:42 PM
>>
>> *To:* af@afmug.com
>> *Subject:* Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>
>>
>>
>> Right - crap IoT devices on the Mirai botnet were responsible for shoving
>> 620+Gbps of traffic at Akamai to take down Krebs (and over 1Tbps to take
>> down OVH). No spoofing involved.
>>
>>
>> Interesting article on the techniques used by Mirai:
>>
>>
>> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that
>> -took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
>>
>>
>>
>> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com> wrote:
>>
>> The amplifier would receive a query from a spoofed IP address, and
>> respond using a legit IP address. So the attacker needs to control some
>> computers that can spoof the victim's IP address, but the actual attack
>> traffic comes from the amplifiers using legit source IPs.
>>
>>
>> In the case of IoT botnets, I'm not sure any spoofing is required.
>>
>>
>>
>>
>> *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of* Josh Baird
>> *Sent:* Friday, October 21, 2016 12:21 PM
>> *To:* af@afmug.com
>> *Subject:* Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>
>>
>> It's a good start. It attempts to prevent spoofed traffic originating
>> from your network to leave your network (or BCP38).
>>
>>
>> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman <
>> j...@imaginenetworksllc.com> wrote:
>>
>> It can't be that simple...can it?
>>
>>
>>
>>
>> Josh Luthman
>> Office: 937-552-2340 <http://tel:937-552-2340>
>> Direct: 937-552-2343 <http://tel:937-552-2343>
>> 1100 Wayne St
>> Suite 1337
>> Troy, OH 45373
>>
>>
>>
>> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net> wrote:
>>
>> /ip firewall address-list
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs"
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream
>> customer X IPs"
>>
>> /ip firewall filter
>> add action=drop chain=forward comment="Drop spoofed traffic" disabled=no
>> out-interface="To-Upstream" dst-address-list=!"Public-IPs"
>>
>> That was largely composed off of the top of my head and typed on my
>> phone, so it may not be completely accurate.
>>
>>
>> You should also do it on customer-facing ports not allowing anything to
>> come in, but that would be best approached once Mikrotik and the per
>> interface setting for unicast reverse path filtering. You would then said
>> customer facing interfaces to strict and all other interfaces to loose.
>> They accepted the feature request, just haven't implemented it yet.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>>
>>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>>
>> *From:* "Mike Hammett" <af...@ics-il.net>
>> *To:* af@afmug.com
>> *Sent:* Friday, October 21, 2016 11:21:35 AM
>> *Subject:* [AFMUG] Another large DDoS, Stop Being a Dick
>>
>> There's another large DDoS going on now. Go to this page to see if you
>> can be used for UDP amplification (or other spoofing) attacks:
>>
>> https://www.caida.org/projects/spoofer/
>>
>> Go to these pages for more longer term bad behavior monitoring:
>>
>> https://www.shadowserver.org/wiki/
>> https://radar.qrator.net/
>>
>>
>> Maybe we need to start a database of ASNs WISPs are using and start
>> naming and shaming them when they have bad actors on their network. This is
>> serious, people. Take it seriously.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>>
>>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
>
>
> --
> If you only see yourself as part of the team but you don't see your team
> as part of yourself you have already failed as part of the team.
>
>
>

Reply via email to