ok I added the /30 on my upstream to the allow list

On Sat, Oct 22, 2016 at 12:33 PM, Mike Hammett <af...@ics-il.net> wrote:

> The IP address on your upstream interface needs to be able to respond to
> respond to ICMP and other requests.
>
>
> 10.0.0.0/30 Network
> 10.0.0.1/30 Their Router
> 10.0.0.2/30 Your Router
> 10.0.0.3/30 Broadcast
>
>
> 10.0.0.2 needs to be able to respond to things and the firewall should be
> blocking it if not otherwise allowed.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL>
> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
> <https://www.linkedin.com/company/intelligent-computing-solutions>
> <https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix>
> <https://www.linkedin.com/company/midwest-internet-exchange>
> <https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp>
>
>
> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------
> *From: *"Kurt Fankhauser" <lists.wavel...@gmail.com>
> *To: *af@afmug.com
> *Sent: *Saturday, October 22, 2016 11:24:40 AM
> *Subject: *Re: [AFMUG] Another large DDoS, Stop Being a Dick
>
> Mike,
>
> Thank you for sharing this Mikrotik Firewall rule! I was at the WISPPlooza
> session on internet security and first heard of this spoofing problem and
> about how you should drop this traffic. I implemented the rule and logged
> it before I flat out dropped it and just in 60 seconds I was seeing
> thousands of packets showing up in my Mikrotik Log. Apparently I was being
> used as a spoof relay. I also noticed a slight decrease in overall traffic
> going out to my upstream provider. I can not believe how easy it was to
> implement this rule with Mikrotik. One thing I did not do was add my
> upstreams /30 BGP address to the allow list. Why should I do that? My BGP
> is still working without it.
>
> On Sat, Oct 22, 2016 at 10:14 AM, Mike Hammett <af...@ics-il.net> wrote:
>
>> Here's a tested config that works with standard IP Firewall. Once I get a
>> chance, I'll make and test a version that uses raw.
>>
>> /ip firewall address-list
>> add address=x.x.x.x/yy comment="My IPs" list=Public_Networks
>> add address=x.x.x.x/yy comment="Upstream /30" list=Public_Networks
>> add address=x.x.x.x/yy comment="Customer ABC's ARIN allocation"
>> list=Public_Networks
>>
>> /ip firewall filter
>> add action=drop chain=forward comment="Block Spoofed Traffic"
>> out-interface=[upstream interface] src-address-list=!Public_Networks
>>
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>>
>>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>> *From: *"Mike Hammett" <af...@ics-il.net>
>> *To: *af@afmug.com
>> *Sent: *Friday, October 21, 2016 12:17:13 PM
>> *Subject: *Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>
>> /ip firewall address-list
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My IPs"
>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="Downstream
>> customer X IPs"
>>
>> /ip firewall filter
>> add action=drop chain=forward comment="Drop spoofed traffic" disabled=no
>> out-interface="To-Upstream" dst-address-list=!"Public-IPs"
>>
>> That was largely composed off of the top of my head and typed on my
>> phone, so it may not be completely accurate.
>>
>>
>> You should also do it on customer-facing ports not allowing anything to
>> come in, but that would be best approached once Mikrotik and the per
>> interface setting for unicast reverse path filtering. You would then said
>> customer facing interfaces to strict and all other interfaces to loose.
>> They accepted the feature request, just haven't implemented it yet.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>>
>>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>> *From: *"Mike Hammett" <af...@ics-il.net>
>> *To: *af@afmug.com
>> *Sent: *Friday, October 21, 2016 11:21:35 AM
>> *Subject: *[AFMUG] Another large DDoS, Stop Being a Dick
>>
>> There's another large DDoS going on now. Go to this page to see if you
>> can be used for UDP amplification (or other spoofing) attacks:
>>
>> https://www.caida.org/projects/spoofer/
>>
>> Go to these pages for more longer term bad behavior monitoring:
>>
>> https://www.shadowserver.org/wiki/
>> https://radar.qrator.net/
>>
>>
>> Maybe we need to start a database of ASNs WISPs are using and start
>> naming and shaming them when they have bad actors on their network. This is
>> serious, people. Take it seriously.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>>
>>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>
>>
>>
>>
>
>

Reply via email to