Anyone seeing any port 80 issues tonight? We're having some issues with our port 80 off-net traffic tonight.
On Sat, Mar 08, 2003 at 10:13:10PM -0600, John Murphy wrote:
Anyone seeing any port 80 issues tonight? We're having some issues with our port 80 off-net traffic tonight.
Do you think you could be a little more vague? -- Richard A Steenbergen <ras@e-gerbil.net> http://www.e-gerbil.net/ras GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
no port 80 issues (other than Code Red on the initial ramp up as always this time of the month). However, 445 is taking off. The new 'deloader' virus is taking off quick. It is installing VNC on infected machine ... On Sat, 8 Mar 2003 22:13:10 -0600 "John Murphy" <john.murphy@charter.net> wrote:
Anyone seeing any port 80 issues tonight? We're having some issues with our port 80 off-net traffic tonight.
-- -------------------------------------------------------------------- jullrich@euclidian.com Collaborative Intrusion Detection join http://www.dshield.org
Here is a graph of scans for port 445: http://isc.incidents.org/port_details.html?port=445
Are other people having problems with this right now? There doesn't seem to be very much traffic or information about this on any of the security lists (it is Sunday...). The last posted URL points to an impending storm... Other operators opinions about blocking port 445 before this thing starts spreading faster than it already is? On Sunday 09 March 2003 03:03 pm, james wrote:
Here is a graph of scans for port 445:
Are other people having problems with this right now? There doesn't seem to be very much traffic or information about this on any of the security lists (it is Sunday...). The last posted URL points to an impending storm...
Other operators opinions about blocking port 445 before this thing starts spreading faster than it already is?
IMHO, this is similar in impact to Opaserv. As an ISP, I would probably block 445 just to avoid having lots of people call Monday morning complaining about slow connections after they got infected. This worm is unlikely to cause major 'global' network slowdowns, so filtering further upstream probably makes not too much sense. The main 'facts' so far: - this virus does attempt to exploit weak passwords, not just open / no password shares - there are some reports that this worm has a VNC or IRC backdoor component, which opens the infected machines to future exploits. - port 445 has gotten a lot of attention from the malware community recently. So there are likely further exploits in the works.
-- -------------------------------------------------------------------- jullrich@euclidian.com Collaborative Intrusion Detection join http://www.dshield.org
Other operators opinions about blocking port 445 before this thing starts spreading faster than it already is?
We are an ISP, and we just decided to. Extended IP access list 199 (Compiled) deny tcp any any eq 445 (66574 matches) Last configuration change at 14:49:44 MST Sun Mar 9 2003 It is 15:35 now. ~ 1305 packets/min. Since we leave ports 135-139 open, the effects "should" be none on the users by blocking 445. Here is part of a conversation Jake Bates and I have been having: <James responds> You read my mind, this was the very issue running around my mind ! I am a router admin for the ISP cybermesa.com and I was trying to sort out this question so I could consider asking to block this port. What I know is the port 445 is a port XP and 2000 can run SMB on, much like what happens on 135-139 (Netbios, Client for MS networks, Print and File Sharing). So if the users use these services (on port 445) across the internet, blocking will effect them. My experience is that if the users do SMB, they do it on 135-139. So, my working theory is that blocking 445 will have no effect on them. If you block 135-139 already as part of policy (i.e., no Netbios), blocking 445 would also be part of the policy. Only XP and 2000 use 445, but can use 135-139; whichever is open. Cyber Mesa does not block 135-139 as legacy MS Messenger used those ports and it causes a "big deal" if they are blocked. So in my case I am really leaning to block port 445. Do you block ports 135-139 and what effect did it have on the users ? <Jack answers>
I'm with you, though. Blocking 445 may work well with 135-139 still open. I'll presume that XP/2000 tries 445 and upon a set timeout reverts to the older method.
-Jack
<James answers> Yep. I think actually 135.-139 is the default and it falls back to 445. http://www.microsoft.com/windows2000/techinfo/reskit/en-us/default.asp?url=/ windows2000/techinfo/reskit/en-us/cnet/cnbc_imp_wcug.asp In Windows 2000, it is also possible to use direct hosting to establish redirector or server connections between Windows 2000 computers without the use of NetBIOS. By default, Windows 2000 attempts to make connections using both methods so that it can support connections to older versions of Windows computers. However, in Windows 2000-only environments, you can disable NetBIOS over TCP/IP as described in the "NetBIOS Over TCP/IP Sessions" following in this chapter. James Edwards jamesh@cybermesa.com Routing and Security Administrator
On Sun, 9 Mar 2003, Jonathan Claybaugh wrote:
Are other people having problems with this right now? There doesn't seem to be very much traffic or information about this on any of the security lists (it is Sunday...). The last posted URL points to an impending storm...
Other operators opinions about blocking port 445 before this thing starts spreading faster than it already is?
Blocking ports in the core doesn't stop stuff from spreading. There are too many alternate paths in the core for systems to get infected through. In reality, backbones dropped 1434 packets as a traffic management practice (excessive traffic), not as a security management practice (protecting users). So far the Deloder worm appears to be responding to normal congestion feedback controls, limiting its network impact. Like CodeRed, Nimda, etc some edge providers may need to implement network controls due to scanning activities causing cache busting, but I suspect most network backbones will not need to do anything.
From: "Sean Donelan"
So far the Deloder worm appears to be responding to normal congestion feedback controls, limiting its network impact. Like CodeRed, Nimda, etc some edge providers may need to implement network controls due to scanning activities causing cache busting, but I suspect most network backbones will not need to do anything.
I agree. It will mostly be useful at edge networks to spot outbound traffic of possibly infected users. 445 should normally be very light, and I suspect that 99% of the systems issuing the traffic will be found to be infected with at least one worm or virus, and probably have more security issues. My last 445 spewing customer had 3 back door programs, 5 viruses, and 2 worms. It was, of course, a school computer. The problem with blocking is if you decide to remove the blocks. Upon removal of 1434 from my EBGP routers, I immediately saw 3 systems infected and start spewing. One of them, scarily, was a dialup while another was on a transit customers network and, of course, shut him down. If we protect the customer, the customer won't fix the problem. Blocks always have to be used with caution because of this. -Jack
So far the Deloder worm appears to be responding to normal congestion feedback controls, limiting its network impact. Like CodeRed, Nimda, etc some edge providers may need to implement network controls due to scanning activities causing cache busting, but I suspect most network backbones will not need to do anything.
I agree this is not a backbone issue. Since we are an ISP and at the edge, it is a good place to drop this. Traffic is not as large, as of yet, as the SQL worm. Blocking port 445, for us, means far less $$ in support time to deal with abuse reports and infected users.
I'm just waiting for hakerz to finally figure out that having the port number a hash of host address will effectively make port-based "notch" filtering useless. Usin On Sun, 9 Mar 2003, Sean Donelan wrote:
Blocking ports in the core doesn't stop stuff from spreading. There are too many alternate paths in the core for systems to get infected through. In reality, backbones dropped 1434 packets as a traffic management practice (excessive traffic), not as a security management practice (protecting users).
participants (8)
-
Jack Bates
-
james
-
Johannes Ullrich
-
John Murphy
-
Jonathan Claybaugh
-
Richard A Steenbergen
-
Sean Donelan
-
Vadim Antonov