Yup and while that sounds absolutely crazy in one regard, it’s scary and real 
in another …..

There was a study (can’t find it at moment) done that was in reference to a 
600Gb/s attack through NTP amplification and it showed that only 1-2% of 
*vulnerable* devices participated in the attack .. “what if” 50% of those 
devices were participating kind of thing

> On Oct 21, 2016, at 5:50 PM, Ken Hohhof <af...@kwisp.com> wrote:
> 
> Well, lots of theories.  Another is it’s retaliation against Dyn for publicly 
> calling out BackConnect for BGP spoofing.  One guy posted very 
> authoritatively on Broadband Reports that the real target was Comcast because 
> … data caps.
>  
> I’m not sure I buy that WikiLeaks attacked Dyn because of the Ecuador thing.  
> For one thing, WikiLeaks does leaks, DDoS attacks is more like Anonymous.  
> But probably you’re saying it’s Russia.  Hmmmm, that seems like quite an 
> escalation, since Assange losing his WiFi in the embassy is hardly going to 
> stop Wikileaks unless there’s a lot bigger cyber attack on Wikileaks than has 
> been reported.
>  
> I heard someone on the radio say after Ecuador took away Assange’s Internet 
> privileges, “be sure to lock your Ecuadors and windows”.
>  
> One thing we can probably all agree on is that it was just a matter of time 
> before somebody DDoS’d the whole Internet.  The capability has probably been 
> there for awhile and it’s almost surprising it took this long.  Nobody seemed 
> to want to do anything about the DDoS problem when it was just gamer kids 
> booting each other and DD4BC and little WISPs getting blown off the air 
> because they couldn’t mitigate 1 Gb+ attacks.  I hope someone has been 
> thinking about what to do when they start blowing the whole Internet off the 
> air on a daily basis.
>  
>   <>
> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
> Behalf Of Tim Reichhart
> Sent: Friday, October 21, 2016 4:14 PM
> To: af@afmug.com <mailto:af@afmug.com>
> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>  
>  
>  
> <https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0ahUKEwiWw6Pz5-zPAhULw4MKHXxzAdEQqQIIIzAC&url=http%3A%2F%2Fwww.nbcnews.com%2Fnews%2Fus-news%2Fu-s-urged-ecuador-act-against-assange-n669271&usg=AFQjCNFuBoBAn34nGg1E9PfoLvURndTCFQ>
> I say this major ddos attack is sure blow back on what US told Ecuador to Act 
> Against WikiLeaks Leader.
>> 
>> -----Original Message-----
>> From: "That One Guy /sarcasm" <thatoneguyst...@gmail.com 
>> <mailto:thatoneguyst...@gmail.com>>
>> To: af@afmug.com <mailto:af@afmug.com>
>> Date: 10/21/16 05:06 PM
>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>> 
>> i think there are only two hackers left, the rest are script kiddies
>> half of these mopes calling themselves "hackers" have little education, 
>> hacking quite often requires a high degree of mathmatics capability, most of 
>> these l77t "hackers" cant even multiply
>>  
>>  
>> On Fri, Oct 21, 2016 at 3:52 PM, Paul Stewart <p...@paulstewart.org 
>> <mailto:p...@paulstewart.org>> wrote:
>>> Good point … and totally agree that the word "hacking" used to mean 
>>> something - now it just kinda makes people laugh and not take it seriously 
>>> at all anymore…
>>>  
>>>  
>>>> On Oct 21, 2016, at 4:44 PM, Ken Hohhof <af...@kwisp.com 
>>>> <mailto:af...@kwisp.com>> wrote:
>>>>  
>>>>  
>>>> I think his point was that a denial of service attack is not hacking.
>>>>  
>>>> I just heard on the radio someone was asking, if I try to use Twitter and 
>>>> it doesn't work because of this attack, is my computer how hacked?
>>>>  
>>>> Even stuff that rightly gets called hacking is an insult to hackers. Like 
>>>> if your webcam is on a public IP address and I guess that the password is 
>>>> 1234, and that gets me root access to install whatever I want, it hardly 
>>>> seems right to call that hacking.
>>>>  
>>>> But taking down a site by flooding it (or its authoritative DNS servers) 
>>>> with traffic is not the same as hacking the site.
>>>>  
>>>>   <>
>>>>  From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
>>>> Behalf Of Paul Stewart
>>>> Sent: Friday, October 21, 2016 3:34 PM
>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick 
>>>>  
>>>> Agree…. it should be focused on end users better securing themselves …. 
>>>>  
>>>>> On Oct 21, 2016, at 3:44 PM, That One Guy /sarcasm 
>>>>> <thatoneguyst...@gmail.com <mailto:thatoneguyst...@gmail.com>> wrote:
>>>>>  
>>>>> Im getting irritated by news reports calling this hacking. That term has 
>>>>> been so obfuscated by dimwits that it has no value
>>>>>  
>>>>> On Fri, Oct 21, 2016 at 1:54 PM, Josh Luthman 
>>>>> <j...@imaginenetworksllc.com <mailto:j...@imaginenetworksllc.com>> wrote:
>>>>>> It works great for me 90% of the time. The other 10% it refuses to 
>>>>>> function at all.
>>>>>> 
>>>>>>  
>>>>>> Josh Luthman
>>>>>> Office: 937-552-2340 <http://tel:937-552-2340>
>>>>>> Direct: 937-552-2343 <http://tel:937-552-2343>
>>>>>> 1100 Wayne St
>>>>>> Suite 1337
>>>>>> Troy, OH 45373
>>>>>>  
>>>>>>  
>>>>>> On Fri, Oct 21, 2016 at 2:50 PM, Paul Stewart <p...@paulstewart.org 
>>>>>> <mailto:p...@paulstewart.org>> wrote:
>>>>>>> LOL …. scary shit….
>>>>>>>  
>>>>>>> Facebook being slow isn't anything new in my experience … they have to 
>>>>>>> be having a hard time keeping up sometimes …. last I heard they were 
>>>>>>> adding something around 200-300 new servers a day in each data centre
>>>>>>>  
>>>>>>>> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm 
>>>>>>>> <thatoneguyst...@gmail.com <mailto:thatoneguyst...@gmail.com>> wrote:
>>>>>>>>  
>>>>>>>> forcing people to interact in person... a dangerous prospect in these 
>>>>>>>> times
>>>>>>>>  
>>>>>>>> On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart 
>>>>>>>> <timreichh...@hometowncable.net 
>>>>>>>> <mailto:timreichh...@hometowncable.net>> wrote:
>>>>>>>>> It seems like facebook is also getting slow.
>>>>>>>>>  
>>>>>>>>>> 
>>>>>>>>>> -----Original Message-----
>>>>>>>>>> From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>>
>>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>> Date: 10/21/16 02:37 PM
>>>>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>>> 
>>>>>>>>>> This is still going right now... big and small websites and ISP's 
>>>>>>>>>> are unreachable and unresponsive. :(
>>>>>>>>>> 
>>>>>>>>>> Travis
>>>>>>>>>> 
>>>>>>>>>> On 10/21/2016 12:19 PM, Ken Hohhof wrote:
>>>>>>>>>>  
>>>>>>>>>>> Interesting, according to that, the ISP DNS servers are recruited 
>>>>>>>>>>> as part of the attack on the victim's authoritative DNS servers, by 
>>>>>>>>>>> sending queries from within the ISP's network.
>>>>>>>>>>>  
>>>>>>>>>>> No spoofing, no amplification, no misconfigured DNS servers 
>>>>>>>>>>> required, yet the ISP's DNS servers are used to send the attack 
>>>>>>>>>>> traffic. All that is needed is a compromised IoT to send the query.
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  From: Af [mailto:af-boun...@afmug.com 
>>>>>>>>>>> <mailto:af-boun...@afmug.com>] On Behalf Of Josh Baird
>>>>>>>>>>> Sent: Friday, October 21, 2016 12:42 PM 
>>>>>>>>>>> 
>>>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>> Right - crap IoT devices on the Mirai botnet were responsible for 
>>>>>>>>>>> shoving 620+Gbps of traffic at Akamai to take down Krebs (and over 
>>>>>>>>>>> 1Tbps to take down OVH). No spoofing involved.
>>>>>>>>>>>  
>>>>>>>>>>> Interesting article on the techniques used by Mirai:
>>>>>>>>>>>  
>>>>>>>>>>> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
>>>>>>>>>>>  
>>>>>>>>>>> <https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937>
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com 
>>>>>>>>>>> <mailto:af...@kwisp.com>> wrote:
>>>>>>>>>>>> The amplifier would receive a query from a spoofed IP address, and 
>>>>>>>>>>>> respond using a legit IP address. So the attacker needs to control 
>>>>>>>>>>>> some computers that can spoof the victim's IP address, but the 
>>>>>>>>>>>> actual attack traffic comes from the amplifiers using legit source 
>>>>>>>>>>>> IPs.
>>>>>>>>>>>>  
>>>>>>>>>>>> In the case of IoT botnets, I'm not sure any spoofing is required.
>>>>>>>>>>>>  
>>>>>>>>>>>>   <>
>>>>>>>>>>>>  From: Af [mailto:af-boun...@afmug.com 
>>>>>>>>>>>> <mailto:af-boun...@afmug.com>] On Behalf Of Josh Baird
>>>>>>>>>>>> Sent: Friday, October 21, 2016 12:21 PM
>>>>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick 
>>>>>>>>>>>>  
>>>>>>>>>>>> It's a good start. It attempts to prevent spoofed traffic 
>>>>>>>>>>>> originating from your network to leave your network (or BCP38).
>>>>>>>>>>>>  
>>>>>>>>>>>> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman 
>>>>>>>>>>>> <j...@imaginenetworksllc.com <mailto:j...@imaginenetworksllc.com>> 
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>> It can't be that simple...can it?
>>>>>>>>>>>>> 
>>>>>>>>>>>>>  
>>>>>>>>>>>>> Josh Luthman
>>>>>>>>>>>>> Office: 937-552-2340 <http://tel:937-552-2340>
>>>>>>>>>>>>> Direct: 937-552-2343 <http://tel:937-552-2343>
>>>>>>>>>>>>> 1100 Wayne St
>>>>>>>>>>>>> Suite 1337
>>>>>>>>>>>>> Troy, OH 45373
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net 
>>>>>>>>>>>>> <mailto:af...@ics-il.net>> wrote:
>>>>>>>>>>>>>> /ip firewall address-list
>>>>>>>>>>>>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My 
>>>>>>>>>>>>>> IPs"
>>>>>>>>>>>>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no 
>>>>>>>>>>>>>> comment="Downstream customer X IPs"
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> /ip firewall filter
>>>>>>>>>>>>>> add action=drop chain=forward comment="Drop spoofed traffic" 
>>>>>>>>>>>>>> disabled=no out-interface="To-Upstream" 
>>>>>>>>>>>>>> dst-address-list=!"Public-IPs"
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> That was largely composed off of the top of my head and typed on 
>>>>>>>>>>>>>> my phone, so it may not be completely accurate.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> You should also do it on customer-facing ports not allowing 
>>>>>>>>>>>>>> anything to come in, but that would be best approached once 
>>>>>>>>>>>>>> Mikrotik and the per interface setting for unicast reverse path 
>>>>>>>>>>>>>> filtering. You would then said customer facing interfaces to 
>>>>>>>>>>>>>> strict and all other interfaces to loose. They accepted the 
>>>>>>>>>>>>>> feature request, just haven't implemented it yet.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> -----
>>>>>>>>>>>>>> Mike Hammett
>>>>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/ICSIL> 
>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>>>>>>>>>>>>>  <https://twitter.com/ICSIL>
>>>>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/mdwestix> 
>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>>>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> 
>>>>>>>>>>>>>> From: "Mike Hammett" <af...@ics-il.net <mailto:af...@ics-il.net>>
>>>>>>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>>>>>> Sent: Friday, October 21, 2016 11:21:35 AM
>>>>>>>>>>>>>> Subject: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> There's another large DDoS going on now. Go to this page to see 
>>>>>>>>>>>>>> if you can be used for UDP amplification (or other spoofing) 
>>>>>>>>>>>>>> attacks:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> https://www.caida.org/projects/spoofer/ 
>>>>>>>>>>>>>> <https://www.caida.org/projects/spoofer/>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Go to these pages for more longer term bad behavior monitoring:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> https://www.shadowserver.org/wiki/ 
>>>>>>>>>>>>>> <https://www.shadowserver.org/wiki/>
>>>>>>>>>>>>>> https://radar.qrator.net/ <https://radar.qrator.net/>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Maybe we need to start a database of ASNs WISPs are using and 
>>>>>>>>>>>>>> start naming and shaming them when they have bad actors on their 
>>>>>>>>>>>>>> network. This is serious, people. Take it seriously.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> -----
>>>>>>>>>>>>>> Mike Hammett
>>>>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/ICSIL> 
>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>>>>>>>>>>>>>  <https://twitter.com/ICSIL>
>>>>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/mdwestix> 
>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>>>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>>>>  <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> 
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>>>  
>>>>>>>>>>>> 
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>> 
>>>>>>>>  
>>>>>>>>  
>>>>>>>> 
>>>>>>>>  
>>>>>>>>  
>>>>>>>> --  
>>>>>>>> If you only see yourself as part of the team but you don't see your 
>>>>>>>> team as part of yourself you have already failed as part of the team.
>>>>>>>>  
>>>>>>>>  
>>>>>>> 
>>>>>>>  
>>>>>>>  
>>>>>>>  
>>>>>>  
>>>>>>  
>>>>>>  
>>>>>  
>>>>>  
>>>>> 
>>>>>  
>>>>>  
>>>>> --  
>>>>> If you only see yourself as part of the team but you don't see your team 
>>>>> as part of yourself you have already failed as part of the team.
>>>>>  
>>>>>  
>>>> 
>>>>  
>>>>  
>>> 
>>> 
>>>  
>>>  
>>>  
>>  
>> 
>> 
>>  
>> --
>> If you only see yourself as part of the team but you don't see your team as 
>> part of yourself you have already failed as part of the team.

Reply via email to