Agree…. it should be focused on end users better securing themselves …. 

> On Oct 21, 2016, at 3:44 PM, That One Guy /sarcasm 
> <thatoneguyst...@gmail.com> wrote:
> 
> Im getting irritated by news reports calling this hacking. That term has been 
> so obfuscated by dimwits that it has no value
> 
> On Fri, Oct 21, 2016 at 1:54 PM, Josh Luthman <j...@imaginenetworksllc.com 
> <mailto:j...@imaginenetworksllc.com>> wrote:
> It works great for me 90% of the time.  The other 10% it refuses to function 
> at all.
> 
> 
> Josh Luthman
> Office: 937-552-2340 <tel:937-552-2340>
> Direct: 937-552-2343 <tel:937-552-2343>
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
> 
> On Fri, Oct 21, 2016 at 2:50 PM, Paul Stewart <p...@paulstewart.org 
> <mailto:p...@paulstewart.org>> wrote:
> LOL …. scary shit….
> 
> Facebook being slow isn’t anything new in my experience … they have to be 
> having a hard time keeping up sometimes …. last I heard they were adding 
> something around 200-300 new servers a day in each data centre
> 
>> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm 
>> <thatoneguyst...@gmail.com <mailto:thatoneguyst...@gmail.com>> wrote:
>> 
>> forcing people to interact in person... a dangerous prospect in these times
>> 
>> On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart 
>> <timreichh...@hometowncable.net <mailto:timreichh...@hometowncable.net>> 
>> wrote:
>> It seems like facebook is also getting slow.
>> 
>> -----Original Message-----
>> From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>>
>> To: af@afmug.com <mailto:af@afmug.com>
>> Date: 10/21/16 02:37 PM
>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>> 
>> This is still going right now... big and small websites and ISP's are 
>> unreachable and unresponsive. :(
>> 
>> Travis
>> 
>> 
>> On 10/21/2016 12:19 PM, Ken Hohhof wrote:
>>  
>>> Interesting, according to that, the ISP DNS servers are recruited as part 
>>> of the attack on the victim's authoritative DNS servers, by sending queries 
>>> from within the ISP's network.
>>> 
>>>  
>>> No spoofing, no amplification, no misconfigured DNS servers required, yet 
>>> the ISP's DNS servers are used to send the attack traffic. All that is 
>>> needed is a compromised IoT to send the query.
>>> 
>>>  
>>>   <>
>>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
>>> Behalf Of Josh Baird
>>> Sent: Friday, October 21, 2016 12:42 PM
>>> 
>>> 
>>> To: af@afmug.com <mailto:af@afmug.com>
>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>> 
>>>  
>>> Right - crap IoT devices on the Mirai botnet were responsible for shoving 
>>> 620+Gbps of traffic at Akamai to take down Krebs (and over 1Tbps to take 
>>> down OVH). No spoofing involved.
>>> 
>>>  
>>> Interesting article on the techniques used by Mirai:
>>> 
>>>  
>>> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
>>>  
>>> <https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937>
>>>  
>>>  
>>> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com 
>>> <mailto:af...@kwisp.com>> wrote:
>>> 
>>> The amplifier would receive a query from a spoofed IP address, and respond 
>>> using a legit IP address. So the attacker needs to control some computers 
>>> that can spoof the victim's IP address, but the actual attack traffic comes 
>>> from the amplifiers using legit source IPs.
>>> 
>>>  
>>> In the case of IoT botnets, I'm not sure any spoofing is required.
>>> 
>>>  
>>>   <>
>>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
>>> Behalf Of Josh Baird
>>> Sent: Friday, October 21, 2016 12:21 PM
>>> To: af@afmug.com <mailto:af@afmug.com>
>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>> 
>>>  
>>> It's a good start. It attempts to prevent spoofed traffic originating from 
>>> your network to leave your network (or BCP38).
>>> 
>>>  
>>> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman <j...@imaginenetworksllc.com 
>>> <mailto:j...@imaginenetworksllc.com>> wrote:
>>> 
>>> It can't be that simple...can it?
>>> 
>>> 
>>> 
>>>  
>>> Josh Luthman
>>> Office: 937-552-2340 <http://tel:937-552-2340>
>>> Direct: 937-552-2343 <http://tel:937-552-2343>
>>> 1100 Wayne St
>>> Suite 1337
>>> Troy, OH 45373
>>> 
>>>  
>>>  
>>> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net 
>>> <mailto:af...@ics-il.net>> wrote:
>>> 
>>> /ip firewall address-list
>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs"
>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream 
>>> customer X IPs"
>>> 
>>> /ip firewall filter
>>> add action=drop chain=forward comment="Drop spoofed traffic" disabled=no 
>>> out-interface="To-Upstream" dst-address-list=!"Public-IPs"
>>> 
>>> That was largely composed off of the top of my head and typed on my phone, 
>>> so it may not be completely accurate.
>>> 
>>> 
>>> You should also do it on customer-facing ports not allowing anything to 
>>> come in, but that would be best approached once Mikrotik and the per 
>>> interface setting for unicast reverse path filtering. You would then said 
>>> customer facing interfaces to strict and all other interfaces to loose. 
>>> They accepted the feature request, just haven't implemented it yet.
>>> 
>>> 
>>> 
>>> -----
>>> Mike Hammett
>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>  <https://www.facebook.com/ICSIL> 
>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>>> <https://twitter.com/ICSIL>
>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>  <https://www.facebook.com/mdwestix> 
>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>> <https://twitter.com/mdwestix>
>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>  <https://www.facebook.com/thebrotherswisp>
>>> 
>>> 
>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>> From: "Mike Hammett" <af...@ics-il.net <mailto:af...@ics-il.net>>
>>> To: af@afmug.com <mailto:af@afmug.com>
>>> Sent: Friday, October 21, 2016 11:21:35 AM
>>> Subject: [AFMUG] Another large DDoS, Stop Being a Dick
>>> 
>>> There's another large DDoS going on now. Go to this page to see if you can 
>>> be used for UDP amplification (or other spoofing) attacks:
>>> 
>>> https://www.caida.org/projects/spoofer/ 
>>> <https://www.caida.org/projects/spoofer/>
>>> 
>>> Go to these pages for more longer term bad behavior monitoring:
>>> 
>>> https://www.shadowserver.org/wiki/ <https://www.shadowserver.org/wiki/>
>>> https://radar.qrator.net/ <https://radar.qrator.net/>
>>> 
>>> 
>>> Maybe we need to start a database of ASNs WISPs are using and start naming 
>>> and shaming them when they have bad actors on their network. This is 
>>> serious, people. Take it seriously.
>>> 
>>> 
>>> 
>>> -----
>>> Mike Hammett
>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>  <https://www.facebook.com/ICSIL> 
>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>>> <https://twitter.com/ICSIL>
>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>  <https://www.facebook.com/mdwestix> 
>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>> <https://twitter.com/mdwestix>
>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>  <https://www.facebook.com/thebrotherswisp>
>>> 
>>> 
>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>>>  
>> 
>>  
>> 
>> 
>> 
>> -- 
>> If you only see yourself as part of the team but you don't see your team as 
>> part of yourself you have already failed as part of the team.
> 
> 
> 
> 
> 
> -- 
> If you only see yourself as part of the team but you don't see your team as 
> part of yourself you have already failed as part of the team.

Reply via email to