Routers have firewalls... But UPNP works on ipv6 :(
On Oct 22, 2016 10:39 AM, "Ken Hohhof" <af...@kwisp.com> wrote: > Takeaway quote: the Internet is “vulnerable to toasters”. > > > > I’ve got to suspect most of these cheap Chinese webcams (i.e. 90% of them) > and other devices are only accessible via a public IP address because of > UPnP. And apparently they are forwarding not just HTTP and HTTPS through > the router but also telnet and SSH. Death to UPnP! We don’t enable it > when customers lease routers from us. These cams should be using some sort > of proxy in the cloud to relay the video, not port forwarding on the > customer’s router. > > > > I also suspect a lot of these are outside the US. At the risk of opening > up the dreaded “NAT is not a firewall” and “IPv6 is great/terrible” > debates, how does IPv6 not increase the IoT threat? What is the typical > setup for an IPv6 enabled customer with toasters and webcams that get > public IPs? Does the router from the ISP or supplied by the customer still > implement a stateful firewall so that inbound traffic is blocked unless a > connection has been established by outbound traffic or a port forwarding > rule? Or are there IPv6 toasters with web and CLI access wide open? Does > UPnP still exist with IPv6? Maybe it’s no more of a problem with IPv6, but > then I still wonder, why are so many IoT devices accessible via telnet to > exploit the hardcoded default passwords? Maybe it’s not our customers > buying cheap webcams at Costco, maybe it’s really businesses putting their > security cameras directly on public IP addresses? > > > > > > *From:* Af [mailto:af-boun...@afmug.com] *On Behalf Of *Jaime Solorza > *Sent:* Saturday, October 22, 2016 9:57 AM > *To:* Animal Farm <af@afmug.com> > *Subject:* Re: [AFMUG] Another large DDoS, Stop Being a Dick > > > > 'Smart' home devices used as weapons in website attack > http://www.bbc.com/news/technology-37738823 > > > > On Oct 22, 2016 8:14 AM, "Mike Hammett" <af...@ics-il.net> wrote: > > Here's a tested config that works with standard IP Firewall. Once I get a > chance, I'll make and test a version that uses raw. > > /ip firewall address-list > add address=x.x.x.x/yy comment="My IPs" list=Public_Networks > add address=x.x.x.x/yy comment="Upstream /30" list=Public_Networks > add address=x.x.x.x/yy comment="Customer ABC's ARIN allocation" > list=Public_Networks > > /ip firewall filter > add action=drop chain=forward comment="Block Spoofed Traffic" > out-interface=[upstream interface] src-address-list=!Public_Networks > > > > ----- > Mike Hammett > Intelligent Computing Solutions <http://www.ics-il.com/> > <https://www.facebook.com/ICSIL> > <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> > <https://www.linkedin.com/company/intelligent-computing-solutions> > <https://twitter.com/ICSIL> > Midwest Internet Exchange <http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrotherswisp> > > > <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> > ------------------------------ > > *From: *"Mike Hammett" <af...@ics-il.net> > *To: *af@afmug.com > *Sent: *Friday, October 21, 2016 12:17:13 PM > *Subject: *Re: [AFMUG] Another large DDoS, Stop Being a Dick > > /ip firewall address-list > add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs" > add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream > customer X IPs" > > /ip firewall filter > add action=drop chain=forward comment="Drop spoofed traffic" disabled=no > out-interface="To-Upstream" dst-address-list=!"Public-IPs" > > That was largely composed off of the top of my head and typed on my phone, > so it may not be completely accurate. > > > You should also do it on customer-facing ports not allowing anything to > come in, but that would be best approached once Mikrotik and the per > interface setting for unicast reverse path filtering. You would then said > customer facing interfaces to strict and all other interfaces to loose. > They accepted the feature request, just haven't implemented it yet. > > > > ----- > Mike Hammett > Intelligent Computing Solutions <http://www.ics-il.com/> > <https://www.facebook.com/ICSIL> > <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> > <https://www.linkedin.com/company/intelligent-computing-solutions> > <https://twitter.com/ICSIL> > Midwest Internet Exchange <http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrotherswisp> > > > <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> > ------------------------------ > > *From: *"Mike Hammett" <af...@ics-il.net> > *To: *af@afmug.com > *Sent: *Friday, October 21, 2016 11:21:35 AM > *Subject: *[AFMUG] Another large DDoS, Stop Being a Dick > > There's another large DDoS going on now. Go to this page to see if you can > be used for UDP amplification (or other spoofing) attacks: > > https://www.caida.org/projects/spoofer/ > > Go to these pages for more longer term bad behavior monitoring: > > https://www.shadowserver.org/wiki/ > https://radar.qrator.net/ > > > Maybe we need to start a database of ASNs WISPs are using and start naming > and shaming them when they have bad actors on their network. This is > serious, people. Take it seriously. > > > > ----- > Mike Hammett > Intelligent Computing Solutions <http://www.ics-il.com/> > <https://www.facebook.com/ICSIL> > <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> > <https://www.linkedin.com/company/intelligent-computing-solutions> > <https://twitter.com/ICSIL> > Midwest Internet Exchange <http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrotherswisp> > > > <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> > > > > > > > >