-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

in-line:

Jordan Medlen wrote:
> I'm sure most people on this list have heard of or use snort. There is an
> add-on package called snortsam. This package allows automation of blocking
> traffic deemed malicious via a null route statement or ACL statement. We
> have been in the process over the last month of implementing this on our
> network with much success. I think the only problem that we have had with it
> thus far is underestimating just how well it was actually going to work. As
> with any snort implementation, it takes time to tweak and tune the rule
> sets, however we have managed to kill a huge amount of traffic either coming
> from our customers or destined to our customers. While this is not a perfect
> system, it is much better than idly sitting there and letting the abuse
> continue.
- -------------------------
One thing would be nice (maybe a wish-list) if snortsam could send an
e-mail notification (similar to other proactive tools) rather than
pushing for ACL change which could possibly break something due to FP.
This could lead to a headless chicken syndrome scenario. Also where I
come from, we cannot implement change(s) to any P1/P2 (business
critical) devices w/o a change management request except for emergencies.



regards,
/virendra


> 
> ---
> Jordan Medlen
> Chief Technology Officer and Architect
> Sago Networks 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Michael Nicks
> Sent: Sunday, August 13, 2006 2:07 PM
> To: [EMAIL PROTECTED]
> Subject: Re: [Full-disclosure] what can be done with botnet C&C's?
> 
> 
> I hate to stir the flames again, but this idea sounds a lot like RBLs.  :)
> 
> All kidding aside, I'm curious as to when we will reach the point where the
> devices of our networks will be able to share information regarding sporadic
> bursts or predefined traffic patterns in network traffic within a certain
> time frame, determine it is a related outgoing (or incoming) attack, and
> mitigate/stop the traffic. I think it certainly is possible to accomplish
> this on a per-router level, but being able to have the devices communicate
> and share information between one another is a completely separate thing.
> (New protocol perhaps.)
> 
> The only real method that I really have in my toolkit to stop incoming DDoS
> on a AS-wide perspective is originating a /32 within an AS with a next-hop
> of a discard interface.
> 
> Something similar to that nature but more flexible and designed for the sole
> purpose of preventing/stopping abuse would be a very nice feature.
> 
> Cheers.
> -Michael
> 
> --
> Michael Nicks
> Network Engineer
> KanREN
> e: [EMAIL PROTECTED]
> o: +1-785-856-9800 x221
> m: +1-913-378-6516
> 
> Payam Tarverdyan Chychi wrote:
>>  I've been reading on this subject for the last several weeks and it 
>> seems as if everyone just like to come up with out of the box ideas 
>> that are not realistic for today's network environments
>>
>>>> J.Oquendo, thanks for the Smurf example . as there are still
>> admins/engineers at large networks that have no clue as to what they 
>> are doing. so QoS is for sure out of the question.. at least at this 
>> time.
>>
>> Depending on agents to take actions and protecting our networks is 
>> even a bigger joke. Back in late 90s where kiddies were using the 
>> simplest types of C&C, open wide irc networks with visible Channels 
>> and no encryptions. and agents couldn't do anything unless the attack 
>> was big enough to take down Amazon, yahoo, Microsoft or some other 
>> major provider with enough $$$ to start an investigation.
>>
>> So what makes you think that agents are of any help in today's world 
>> where c&c have gotten so much more sophisticated, use backup private 
>> servers, encryption, tunneling and much much more..
>>
>> In my opinion, the only way to really start cracking down on c&c and 
>> put an end to it is the cooperation of major ISP's. I realize that 
>> most isp's cant/wont setup a security team to just investigate c&c / 
>> attacks (would this really fall under the Abuse team?) but perhaps If 
>> all major networks worked together and created a active db list of c&c 
>> found either on their networks or attacking ones network. then it 
>> would be much much easier to trace back c&c and dispose of them.
>>
>> Unfortunately, we don't live in a perfect world and most isp's hate 
>> sharing any information. I guess its better for them to have a bigger 
>> ego than a safer / more stable network.
>>
>> Please feel free to correct me if I am wrong.
>>
>> -Payam
> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFE5LdspbZvCIJx1bcRAk04AJ9bsdHfeGY/8bo+CFFyPCNBIYLAxwCaAqv/
0v8mDACXHUBiSQAtBgZ0p0g=
=yOnO
-----END PGP SIGNATURE-----

Reply via email to