The following networks and masks are banned from our network at the core due to being smurf amplifiers. When the folks who own these STOP THIS, we'll take them off the list. Contact me by TELEPHONE if you want to discuss this matter or what a Smurf is and why you should care. I'm going to start posting the blacklist here weekly in the hopes that peer pressure will cause people to clean up their acts. Until you DO clean up your act, you're not transiting our network - period. We're not going to accept this kind of vandalism and attractive nuisance any more. If you haven't disabled directed broadcast forwarding, you are a potential listee on this blacklist. DO IT NOW, or risk connectivity blockades. I urge all other network providers to block any identified smurf amplifier that they can verify, and to post their list as well. Only through public pressure can people be forced to CORRECTLY configure their networks to make these attacks impossible to launch. access-list 2 deny 128.118.0.0 0.0.255.255 access-list 2 deny 129.24.0.0 0.0.255.255 access-list 2 deny 129.111.0.0 0.0.255.255 access-list 2 deny 129.100.0.0 0.0.255.255 access-list 2 deny 128.40.0.0 0.0.255.255 access-list 2 deny 129.101.0.0 0.0.255.255 access-list 2 deny 203.64.0.0 0.0.255.255 access-list 2 deny 129.115.0.0 0.0.255.255 access-list 2 deny 203.108.225.0 0.0.0.255 access-list 2 deny 129.60.0.0 0.0.255.255 access-list 2 deny 137.79.0.0 0.0.255.255 access-list 2 deny 130.37.0.0 0.0.255.255 access-list 2 deny 130.70.0.0 0.0.255.255 access-list 2 deny 203.108.236.0 0.0.0.255 access-list 2 deny 132.169.0.0 0.0.255.255 access-list 2 deny 129.107.0.0 0.0.255.255 access-list 2 deny 129.49.0.0 0.0.255.255 access-list 2 deny 129.96.0.0 0.0.255.255 access-list 2 deny 130.65.0.0 0.0.255.255 access-list 2 deny 134.205.0.0 0.0.255.255 access-list 2 deny 129.29.0.0 0.0.255.255 access-list 2 deny 204.48.224.0 0.0.0.255 access-list 2 deny 205.177.49.0 0.0.0.255 access-list 2 deny 204.47.208.0 0.0.0.255 access-list 2 deny 204.242.172.0 0.0.0.255 access-list 2 deny 194.6.129.0 0.0.0.255 access-list 2 deny 206.31.78.0 0.0.0.255 access-list 2 deny 207.211.60.0 0.0.0.255 access-list 2 deny 206.27.242.0 0.0.0.255 access-list 2 deny 207.175.67.0 0.0.0.255 I'm sure there are more, but these are the ones blacklisted in our network configuration right now. -- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
On Sat, 11 Apr 1998, Karl Denninger wrote:
The following networks and masks are banned from our network at the core due to being smurf amplifiers.
I'm going to start posting the blacklist here weekly in the hopes that peer
Posting it here weekly only provides a mechanism for the littele fsckers that smurf to gain an up to date list of sites to bounce from. -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Atheism is a non-prophet organization. I route, therefore I am. Alex Rubenstein, alex@nac.net, KC2BUO, ISP/C Charter Member Father of the Network and Head Bottle-Washer Net Access Corporation, 9 Mt. Pleasant Tpk., Denville, NJ 07834 Don't choose a spineless ISP! We have more backbone! http://www.nac.net -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
On Sat, Apr 11, 1998 at 04:53:06PM -0400, Al Reuben wrote:
On Sat, 11 Apr 1998, Karl Denninger wrote:
The following networks and masks are banned from our network at the core due to being smurf amplifiers.
I'm going to start posting the blacklist here weekly in the hopes that peer
Posting it here weekly only provides a mechanism for the littele fsckers that smurf to gain an up to date list of sites to bounce from.
And you think they don't already HAVE the list? Where do you think WE got it from? From people smurfing us! The vandals ALREADY HAVE the list. I know this because we were attacked from each of those networks at least once. -- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
On Sun, 12 Apr 1998, Karl Denninger wrote:
And you think they don't already HAVE the list?
Where do you think WE got it from? From people smurfing us!
The vandals ALREADY HAVE the list. I know this because we were attacked
But posting the list of blackholed sites publicly gives the attackers a list of sites not to bother trying to use...so they keep coming out with new&improved versions of smurf using networks that actually work. ------------------------------------------------------------------ Jon Lewis <jlewis@fdt.net> | http://noagent.com/?jl1 for cheap Network Administrator | life insurance over the net. Florida Digital Turnpike | ______http://inorganic5.fdt.net/~jlewis/pgp for PGP public key____
On Sun, Apr 12, 1998 at 01:20:02AM -0400, Jon Lewis wrote:
On Sun, 12 Apr 1998, Karl Denninger wrote:
And you think they don't already HAVE the list?
Where do you think WE got it from? From people smurfing us!
The vandals ALREADY HAVE the list. I know this because we were attacked
But posting the list of blackholed sites publicly gives the attackers a list of sites not to bother trying to use...so they keep coming out with new&improved versions of smurf using networks that actually work.
The goal is to make the number of possible sources ZERO. If ISPs around the world refuse to forward directed broadcasts, it WILL be zero. If a provider loses connectivity to significant parts of the network, they'll fix their fscking routers. I'll note that one of the worst offenders right now, and the biggest sources, is APNIC's netblocks. There are huge, multi-T3-connected, smurf amplifiers on some of those network numbers. You'll find that in 203.64 there are multiple high-bandwidth sources with ENABLED directed broadcasts. Guess what? That entire /16 can't talk to us any more. I've tried talking to APNIC with no response. I've emailed every contact I can think of - nothing. Now I've told them to fsck off. They can either fix the damn thing or they can stuff connectivity to us up their behinds. I did this to huge parts of UUNET's infrastructure a few months ago. It *DID* get their attention, and smartly. At one time, not long back, their entire New York POP was one huge smurf amplifier of the worst kind - multiple MAX TNTs on 100BaseTX, all with directed broadcasts possible into their NICs. Ouch. We saw *sustained* loads in excess of 100Mbps coming from there. I blocked a /16, and two days later their CUSTOMERS started calling us asking why they couldn't talk to us any more. We told them why. Less than a week later it magically "fixed itself", although UUNET denied that they changed anything or that it was ever broken. Yeah, right. At least the problem got solved. Bluntly, I've had enough and so have my customers. Our IRC server is the recipient of daily attacks. Our *customers* DS1s are getting hit as well. While I can fix the IRC server problem by putting it on a Switched 100BaseTX port, that's not really a fix -- that's just making the firehose big enough that the jerks can't fill it. No more Mr. Nice Guy. I don't like getting paged at 3:00 AM because some two-bit punk got Klined off our IRC server for running clonebots and decided to smurf us in retaliation. My fix is to render all connectivity to and from the offending netblocks VOID until the owners fix their routers. These folks, by the way, are NOT clueless - they are DELIBERATELY ignoring the problem. The folks who can source significant smurfs today are NOT Joe's T1 and Grill. They are NATIONAL and INTERNATIONAL ISPs who damn well ought to know how to prevent this and why they should. The guy with a T1 can't hit us hard enough to even show up on our monitors. To make my blacklist you have to hit me with enough bandwidth that we *see* the problem, and that means you're at least mid-fractional-DS3 connected. If they're permitting this kind of behavior to take place *IT IS THEIR FAULT*, and has to be due to either deliberate lack of action or gross negligence. I'll KEEP adding netblocks to that access group as required, and keep posting the list. And I won't remove a single network from there until I've VERIFIED that they can no longer be used for this kind of vandalism. -- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
On Sun, 12 Apr 1998, Karl Denninger wrote: [...]
The folks who can source significant smurfs today are NOT Joe's T1 and Grill. They are NATIONAL and INTERNATIONAL ISPs who damn well ought to know how to prevent this and why they should. The guy with a T1 can't hit us hard enough to even show up on our monitors. To make my blacklist you have to hit me with enough bandwidth that we *see* the problem, and that means you're at least mid-fractional-DS3 connected.
And that is a very important point here. While trying to fix every network that can be used for smurf attacks would be a very difficult or even futile attempt, every network that can be used for smurf attacks isn't the issue. Yes, it is still bad, but as Karl says no matter what they do, smurf replies originating from a T1 connected network can't take down a moderate backbone without special effort. (ie. exploiting some other hole other than just flooding the bandwidth) Any sort of pressure that can be exerted to fix the well connected networks that cause problems, including public flogging, is appropriate. Also note that the networks that can cause real problems should have staff capable of fixing the problem without any hassles, although should and do are very different. The best part of all this is that the people that refuse to take action to stop their networks being used in this manner are wasting their own bandwidth and quite possibly a lot of money. Karl can be quite persistent in flogging dead (or nonexistent) horses, but I think it is a good thing he is flogging this one.
Hi. May be, someone will maintain such lists? First, it allow to fix smurf source by 'log' option in the CISCO list; second, it'll prefere some attacks. On Sat, 11 Apr 1998, Karl Denninger wrote:
Date: Sat, 11 Apr 1998 15:25:33 -0500 From: Karl Denninger <karl@mcs.net> To: nanog@merit.edu Subject: SMURF amplifier block list
The following networks and masks are banned from our network at the core due to being smurf amplifiers.
When the folks who own these STOP THIS, we'll take them off the list. Contact me by TELEPHONE if you want to discuss this matter or what a Smurf is and why you should care.
I'm going to start posting the blacklist here weekly in the hopes that peer pressure will cause people to clean up their acts. Until you DO clean up your act, you're not transiting our network - period.
We're not going to accept this kind of vandalism and attractive nuisance any more. If you haven't disabled directed broadcast forwarding, you are a potential listee on this blacklist.
DO IT NOW, or risk connectivity blockades.
I urge all other network providers to block any identified smurf amplifier that they can verify, and to post their list as well.
Only through public pressure can people be forced to CORRECTLY configure their networks to make these attacks impossible to launch.
access-list 2 deny 128.118.0.0 0.0.255.255 access-list 2 deny 129.24.0.0 0.0.255.255 access-list 2 deny 129.111.0.0 0.0.255.255 access-list 2 deny 129.100.0.0 0.0.255.255 access-list 2 deny 128.40.0.0 0.0.255.255 access-list 2 deny 129.101.0.0 0.0.255.255 access-list 2 deny 203.64.0.0 0.0.255.255 access-list 2 deny 129.115.0.0 0.0.255.255 access-list 2 deny 203.108.225.0 0.0.0.255 access-list 2 deny 129.60.0.0 0.0.255.255 access-list 2 deny 137.79.0.0 0.0.255.255 access-list 2 deny 130.37.0.0 0.0.255.255 access-list 2 deny 130.70.0.0 0.0.255.255 access-list 2 deny 203.108.236.0 0.0.0.255 access-list 2 deny 132.169.0.0 0.0.255.255 access-list 2 deny 129.107.0.0 0.0.255.255 access-list 2 deny 129.49.0.0 0.0.255.255 access-list 2 deny 129.96.0.0 0.0.255.255 access-list 2 deny 130.65.0.0 0.0.255.255 access-list 2 deny 134.205.0.0 0.0.255.255 access-list 2 deny 129.29.0.0 0.0.255.255 access-list 2 deny 204.48.224.0 0.0.0.255 access-list 2 deny 205.177.49.0 0.0.0.255 access-list 2 deny 204.47.208.0 0.0.0.255 access-list 2 deny 204.242.172.0 0.0.0.255 access-list 2 deny 194.6.129.0 0.0.0.255 access-list 2 deny 206.31.78.0 0.0.0.255 access-list 2 deny 207.211.60.0 0.0.0.255 access-list 2 deny 206.27.242.0 0.0.0.255 access-list 2 deny 207.175.67.0 0.0.0.255
I'm sure there are more, but these are the ones blacklisted in our network configuration right now.
-- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
Aleksei Roudnev, Network Operations Center, Relcom, Moscow (+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager) (+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax)
On Sun, 12 Apr 1998, Alex P. Rudnev wrote:
May be, someone will maintain such lists? First, it allow to fix smurf source by 'log' option in the CISCO list; second, it'll prefere some attacks.
If Karl will supply us the IP address of a non-critical machine in his network then we only need one list maintained. Anyone can then add new networks to Karl's list simply by smurfing his non-critical machine and it will still meet his criteria of a verified atack. -- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Sorry, you don't understand. The worst thing in the smurf attack is not the attack itself (small IP flood, what's it? now the hackers have not really big amlifiers at their lists), but the fact the attacker originated source is faded usially. The best way to found the source of such attack is to trace echo-request packets directed to one or more smurf-amplified networks. If some (even some) network anounce _we keep on-line list of smurf-amplified address and control all attempts to send packets to this networks_, do you suppose hackers would work through this network? Any attempt to send smurf cause them to be discovered and disconnected; even if it's only anouncement, not real control, it's enougph to prevent a lot of hackets from the such attempts. The only way to fight against any kind of such attacks is to be sure any intruder should be fixed and disconnected in a few minutes. If I proclaim (anyone who attempt to break CITYLINE.RU ISP here should be killed by the gang of big and gloomy boys) do you think anyone in Moscow attampts to break CITYLINE? Even if he don't believe to this anouncement - but 10% for this to be true is enougph for hacker to be stopped. Just this case. While we are not seing every day _XXX was catched and disconnected due to attempt to run SMURF_ you can found any new ways to defend yourself - no matter, they discover new ways to attack you. If they think they can be catched - it's enougph. Remember, this intruders use small ISP as their service providers, not huge MCI or SPRINT. And you even don't need the full list of such amplified addresses to open some kind of monitoring against the smurfers. Btw, if someone cry here _I am smurfed from XX.XX.XX.XX address, what should you do to help him? I guess you should check (by IP accounting if you have it; by NetFlow accounting if you have it; or close you boredom and go home if you have not any) _are you sure the echo-request packets to this broadcast addresses are not originated from YOUR customer_.
May be, someone will maintain such lists? First, it allow to fix smurf source by 'log' option in the CISCO list; second, it'll prefere some attacks.
If Karl will supply us the IP address of a non-critical machine in his network then we only need one list maintained. Anyone can then add new networks to Karl's list simply by smurfing his non-critical machine and it will still meet his criteria of a verified atack.
-- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Aleksei Roudnev, Network Operations Center, Relcom, Moscow (+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager) (+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax)
On Sun, 12 Apr 1998, Alex P. Rudnev wrote: ==>Remember, this intruders use small ISP as their service providers, not ==>huge MCI or SPRINT. Actually, the majority of these people use compromised root accounts in educational institutions, educational residence halls w/ Ethernet, enterprises w/o decent firewalls, and co-location machines. There are lists which exist of over 200-300 compromised root accounts and access capabilities from which someone can launch an attack. /cah
On Sun, Apr 12, 1998 at 12:35:44PM -0700, Craig A. Huegen wrote:
On Sun, 12 Apr 1998, Alex P. Rudnev wrote:
==>Remember, this intruders use small ISP as their service providers, not ==>huge MCI or SPRINT.
Actually, the majority of these people use compromised root accounts in educational institutions, educational residence halls w/ Ethernet, enterprises w/o decent firewalls, and co-location machines.
There are lists which exist of over 200-300 compromised root accounts and access capabilities from which someone can launch an attack.
/cah
Yep. But the point still remains that if you can't get the traffic out of the source network a smurf attempt doesn't work. Those "educational" sites which allow residence hall connections to launch this kind of thing deserve to be permanently black-holed from the Internet until they fix things. And yes, I know this means they'll have to spend money. Tough cookies. This is NOT an unsolvable problem (I can solve it with a $1,000 PC running IPFW between the residence hall Ethernet and the rest of the campus, or a few statements in a CISCO config) so people saying its an intractable problem are lying. Period. -- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
On Sun, 12 Apr 1998, Karl Denninger wrote:
Those "educational" sites which allow residence hall connections to launch this kind of thing deserve to be permanently black-holed from the Internet until they fix things. And yes, I know this means they'll have to spend money. Tough cookies. This is NOT an unsolvable problem (I can solve it with a $1,000 PC running IPFW between the residence hall Ethernet and the rest of the campus, or a few statements in a CISCO config) so people saying its an intractable problem are lying.
If anyone at an educational institution tells you that send them to UCLA http://www.math.ucla.edu/misc/smurf.html or Simon Fraser University http://www.cs.sfu.ca/CC/Hypermail/cmpt-471/0008.html or the RFC archive at USC's Information Sciences Institute ftp://ftp.isi.edu/in-notes/rfc2267.txt or the Computer Emergency Response Team at Carnegie Mellon University http://www.cert.org/advisories/CA-98.01.smurf.html If those universities can handle the problem then all educational institutions should be able to fix this. -- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Or, call Cisco.. press 1 and tell them you are being smurfed. They will work with specialists and authorities to track down the attacker and rest assured, they will be dealth with. One thing I like about Cisco, is they don't fsck around!! They get right down to business. On Sun, 12 Apr 1998, Alex P. Rudnev wrote: :Sorry, you don't understand. : :The worst thing in the smurf attack is not the attack itself (small IP :flood, what's it? now the hackers have not really big amlifiers at their :lists), but the fact the attacker originated source is faded usially. The :best way to found the source of such attack is to trace echo-request :packets directed to one or more smurf-amplified networks. : :If some (even some) network anounce _we keep on-line list of :smurf-amplified address and control all attempts to send packets to this :networks_, do you suppose hackers would work through this network? Any :attempt to send smurf cause them to be discovered and disconnected; even :if it's only anouncement, not real control, it's enougph to prevent a lot :of hackets from the such attempts. : :The only way to fight against any kind of such attacks is to be sure any :intruder should be fixed and disconnected in a few minutes. If I proclaim :(anyone who attempt to break CITYLINE.RU ISP here should be killed by the :gang of big and gloomy boys) do you think anyone in Moscow attampts to :break CITYLINE? Even if he don't believe to this anouncement - but 10% :for this to be true is enougph for hacker to be stopped. : :Just this case. While we are not seing every day _XXX was catched and :disconnected due to attempt to run SMURF_ you can found any new ways to :defend yourself - no matter, they discover new ways to attack you. If :they think they can be catched - it's enougph. : :Remember, this intruders use small ISP as their service providers, not :huge MCI or SPRINT. : :And you even don't need the full list of such amplified addresses to open :some kind of monitoring against the smurfers. : :Btw, if someone cry here _I am smurfed from XX.XX.XX.XX address, what :should you do to help him? I guess you should check (by IP accounting if :you have it; by NetFlow accounting if you have it; or close you boredom :and go home if you have not any) _are you sure the echo-request :packets to this broadcast addresses are not originated from YOUR customer_. : : : :> :> > May be, someone will maintain such lists? First, it allow to fix smurf :> > source by 'log' option in the CISCO list; second, it'll prefere some :> > attacks. :> :> If Karl will supply us the IP address of a non-critical machine in his :> network then we only need one list maintained. Anyone can then add new :> networks to Karl's list simply by smurfing his non-critical machine and it :> will still meet his criteria of a verified atack. :> :> -- :> Michael Dillon - Internet & ISP Consulting :> http://www.memra.com - E-mail: michael@memra.com :> :> :> : :Aleksei Roudnev, Network Operations Center, Relcom, Moscow :(+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager) :(+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax) : -- Regards, Jason A. Lixfeld jlixfeld@idirect.ca System Administrator [L5] jlixfeld@torontointernetxchange.net --------------------------------------------------------------------- TUCOWS Interactive Ltd. o/a | "A Different Kind of Internet Company" Internet Direct Canada Inc. | "FREE BANDWIDTH for Toronto Area IAPs" 5415 Dundas Street West | http://www.torontointernetxchange.net Suite 301, Toronto Ontario | (416) 236-5806 (T) M9B-1B5 CANADA | (416) 236-5804 (F) ---------------------------------------------------------------------
On Sun, Apr 12, 1998 at 08:55:48AM -0700, Michael Dillon wrote:
On Sun, 12 Apr 1998, Alex P. Rudnev wrote:
May be, someone will maintain such lists? First, it allow to fix smurf source by 'log' option in the CISCO list; second, it'll prefere some attacks.
If Karl will supply us the IP address of a non-critical machine in his network then we only need one list maintained. Anyone can then add new networks to Karl's list simply by smurfing his non-critical machine and it will still meet his criteria of a verified atack.
-- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Well, the kiddies think the IRC server is non-critical :-) -- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
I just came to realize that there is one big problem with using BGP to blackhole these SMURF-amplifier sites. Put really simply, if you create a BGP blackhole all you do is prevent your packets from getting to their network - not the converse. While being listed on a blackhole list which affects connectivity might be enough to encourage people to set no ip directed-broadcast or equivalent on appropriate interfaces, I'd rather see a real filter set which I can drop the packets at my internet-facing edges. How to update the filter set dynamically is another issue that I'd like to hear about. Am I thinking correctly here or am I missing some convoluted BGP configuration? - Forrest W. Christian (forrestc@imach.com) ---------------------------------------------------------------------- iMach, Ltd., P.O. Box 5749, Helena, MT 59604 http://www.imach.com Solutions for your high-tech problems. (406)-442-6648 ----------------------------------------------------------------------
I figured this should be a new thread. My opinion is that we need to fix some RFC's to help eliminate the SMURF problem and other problems. Is there a review of the Router and Host requirements RFC's in the works? Specifically, to review those areas which could be changed to fix some of these problems. For example, the directed broadcast stuff should be written to basically say that the DEFAULT must be for the directed broadcasts to be off. The real problem here is that the RFC's say that the default must be on. Where the BCP says that the default should be off. I'm sure there are other discrepancies between RFC's and the BCP. Shouldn't these be fixed? That way we have a document to point to. And, hopefully, the hardware vendors will follow with tradition and write code to the RFC spec. - Forrest W. Christian (forrestc@imach.com) ---------------------------------------------------------------------- iMach, Ltd., P.O. Box 5749, Helena, MT 59604 http://www.imach.com Solutions for your high-tech problems. (406)-442-6648 ----------------------------------------------------------------------
On Sun, 12 Apr 1998, Forrest W. Christian wrote:
My opinion is that we need to fix some RFC's to help eliminate the SMURF problem and other problems.
Look closely. I already posted this mentioning RFC 2267 If anyone at an educational institution tells you that send them to UCLA http://www.math.ucla.edu/misc/smurf.html or Simon Fraser University http://www.cs.sfu.ca/CC/Hypermail/cmpt-471/0008.html or the RFC archive at USC's Information Sciences Institute ftp://ftp.isi.edu/in-notes/rfc2267.txt or the Computer Emergency Response Team at Carnegie Mellon University http://www.cert.org/advisories/CA-98.01.smurf.html Here's an excerpt from a message I posted to another list with a good URL:
I'm STILL lost. How am I going to "localize the effect" of my downstream - who have not set "no ip directed broadcast" - being used as a SMURF amplifier? As for helping them fix it, how does that relate to "DEMANDING" the upstream fix the upstream's config?
Here is a URL with some info http://www.quadrunner.com/~chuegen/smurf.cgi Here is what I mean. -------------*-*-*-*- * - * - * * the void... :-) | FFF UUUUU OBOBOB | F = Fred's Network FFF----UUUUU---OBOBOB-- P = Patrick's Network FFF UUUUU OBOBOB U = Upstream provider for Fred and Patrick | | OB = Other Backbone provider PPP VVV V = Victim of the Smurf attack PPP VVV PPP VVV Now some mean guy out there in the void decides to attack the poor victim network by sending spoofed source packets to the broadcast address of Fred's network. The spoofed source address is that of the victim so that all the echo replies from the machines on Fred's network go to the victim's network. Now why should Patrick care? Why should he be demanding that his upstream do something about it? Because if the Upstream does nothing, people out there on the net may well start to block all of Upstream's address blocks. So Patrick can demand that his upstream take action to make sure that no SMURF amplifiers are downstream of them. Patrick has no business relationship with Fred but both have a business relationship with the Upstream. The Upstream could remind Fred that he must fix his routers according to their TOS or AUP. Or they could help Fred fix his routers. Or they could disconnect Fred. Or they could block all traffic to ?.?.?.255 in Fred's network. In fact, Upstream could regularly scan all of its address space to find misconfigured routers and help them fix this problem. If you have some time for code hacking maybe you could hack smurf or fraggle to create a program that does this.
Is there a review of the Router and Host requirements RFC's in the works? Specifically, to review those areas which could be changed to fix some of these problems.
RFCs take a long time to change, especially standards track RFCs. But it isn't that hard to get an informational RFC like 2267 published.
For example, the directed broadcast stuff should be written to basically say that the DEFAULT must be for the directed broadcasts to be off.
There are no guns in the IETF. Basically the RFCs should say exactly what they do say because that's the best consensus that people could reach. Maybe you could convince them to revise the RFC but you'll need to fully understand the entire scope of the protocol design, not just current operational issues. But that's something that needs to be discussed elsewhere. http://www.ietf.org Might be worthwhile for someone to spend a half hour explaining the directed broadcast issues at the next NANOG meeting? -- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Anyway, does there exists some proposals about adding trace capability to the routers? I mean - I'd like to ask the chain of routers _who does generate the packets with the SRC address A1 and DST address A2. Remember, the smurf problem was caused not due to amplification of the traffic but because the intruders are not traced usially. On Sun, 12 Apr 1998, Michael Dillon wrote:
Date: Sun, 12 Apr 1998 19:21:20 -0700 (PDT) From: Michael Dillon <michael@memra.com> To: nanog@merit.edu Subject: Re: Fixing RFC's WAS Re: SMURF amplifier block list
On Sun, 12 Apr 1998, Forrest W. Christian wrote:
My opinion is that we need to fix some RFC's to help eliminate the SMURF problem and other problems.
Look closely. I already posted this mentioning RFC 2267
If anyone at an educational institution tells you that send them to UCLA http://www.math.ucla.edu/misc/smurf.html or Simon Fraser University http://www.cs.sfu.ca/CC/Hypermail/cmpt-471/0008.html or the RFC archive at USC's Information Sciences Institute ftp://ftp.isi.edu/in-notes/rfc2267.txt or the Computer Emergency Response Team at Carnegie Mellon University http://www.cert.org/advisories/CA-98.01.smurf.html
Here's an excerpt from a message I posted to another list with a good URL:
I'm STILL lost. How am I going to "localize the effect" of my downstream - who have not set "no ip directed broadcast" - being used as a SMURF amplifier? As for helping them fix it, how does that relate to "DEMANDING" the upstream fix the upstream's config?
Here is a URL with some info http://www.quadrunner.com/~chuegen/smurf.cgi
Here is what I mean. -------------*-*-*-*- * - * - * * the void... :-) | FFF UUUUU OBOBOB | F = Fred's Network FFF----UUUUU---OBOBOB-- P = Patrick's Network FFF UUUUU OBOBOB U = Upstream provider for Fred and Patrick | | OB = Other Backbone provider PPP VVV V = Victim of the Smurf attack PPP VVV PPP VVV
Now some mean guy out there in the void decides to attack the poor victim network by sending spoofed source packets to the broadcast address of Fred's network. The spoofed source address is that of the victim so that all the echo replies from the machines on Fred's network go to the victim's network.
Now why should Patrick care? Why should he be demanding that his upstream do something about it? Because if the Upstream does nothing, people out there on the net may well start to block all of Upstream's address blocks. So Patrick can demand that his upstream take action to make sure that no SMURF amplifiers are downstream of them. Patrick has no business relationship with Fred but both have a business relationship with the Upstream. The Upstream could remind Fred that he must fix his routers according to their TOS or AUP. Or they could help Fred fix his routers. Or they could disconnect Fred. Or they could block all traffic to ?.?.?.255 in Fred's network. In fact, Upstream could regularly scan all of its address space to find misconfigured routers and help them fix this problem. If you have some time for code hacking maybe you could hack smurf or fraggle to create a program that does this.
Is there a review of the Router and Host requirements RFC's in the works? Specifically, to review those areas which could be changed to fix some of these problems.
RFCs take a long time to change, especially standards track RFCs. But it isn't that hard to get an informational RFC like 2267 published.
For example, the directed broadcast stuff should be written to basically say that the DEFAULT must be for the directed broadcasts to be off.
There are no guns in the IETF. Basically the RFCs should say exactly what they do say because that's the best consensus that people could reach. Maybe you could convince them to revise the RFC but you'll need to fully understand the entire scope of the protocol design, not just current operational issues. But that's something that needs to be discussed elsewhere. http://www.ietf.org
Might be worthwhile for someone to spend a half hour explaining the directed broadcast issues at the next NANOG meeting?
-- Michael Dillon - Internet & ISP Consulting http://www.memra.com - E-mail: michael@memra.com
Aleksei Roudnev, Network Operations Center, Relcom, Moscow (+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager) (+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax)
On Sun, Apr 12, 1998 at 01:57:00PM -0500, Karl Denninger wrote:
Well, the kiddies think the IRC server is non-critical :-)
***sjsobol makes a mental note to use irc.cs.cmu.edu instead of irc.mcs.net. -- Steve Sobol, Tech Support Guru, NACS.NET [http://www.nacs.net/support] Visit Shawn Kemp's website... Reignman info, merchandise and more!! http://www.reignman.com
Have the admins of these networks been notified of the problem? On Sat, 11 Apr 1998, Karl Denninger wrote:
The following networks and masks are banned from our network at the core due to being smurf amplifiers.
When the folks who own these STOP THIS, we'll take them off the list. Contact me by TELEPHONE if you want to discuss this matter or what a Smurf is and why you should care.
I'm going to start posting the blacklist here weekly in the hopes that peer pressure will cause people to clean up their acts. Until you DO clean up your act, you're not transiting our network - period.
We're not going to accept this kind of vandalism and attractive nuisance any more. If you haven't disabled directed broadcast forwarding, you are a potential listee on this blacklist.
DO IT NOW, or risk connectivity blockades.
I urge all other network providers to block any identified smurf amplifier that they can verify, and to post their list as well.
Only through public pressure can people be forced to CORRECTLY configure their networks to make these attacks impossible to launch.
access-list 2 deny 128.118.0.0 0.0.255.255 access-list 2 deny 129.24.0.0 0.0.255.255 access-list 2 deny 129.111.0.0 0.0.255.255 access-list 2 deny 129.100.0.0 0.0.255.255 access-list 2 deny 128.40.0.0 0.0.255.255 access-list 2 deny 129.101.0.0 0.0.255.255 access-list 2 deny 203.64.0.0 0.0.255.255 access-list 2 deny 129.115.0.0 0.0.255.255 access-list 2 deny 203.108.225.0 0.0.0.255 access-list 2 deny 129.60.0.0 0.0.255.255 access-list 2 deny 137.79.0.0 0.0.255.255 access-list 2 deny 130.37.0.0 0.0.255.255 access-list 2 deny 130.70.0.0 0.0.255.255 access-list 2 deny 203.108.236.0 0.0.0.255 access-list 2 deny 132.169.0.0 0.0.255.255 access-list 2 deny 129.107.0.0 0.0.255.255 access-list 2 deny 129.49.0.0 0.0.255.255 access-list 2 deny 129.96.0.0 0.0.255.255 access-list 2 deny 130.65.0.0 0.0.255.255 access-list 2 deny 134.205.0.0 0.0.255.255 access-list 2 deny 129.29.0.0 0.0.255.255 access-list 2 deny 204.48.224.0 0.0.0.255 access-list 2 deny 205.177.49.0 0.0.0.255 access-list 2 deny 204.47.208.0 0.0.0.255 access-list 2 deny 204.242.172.0 0.0.0.255 access-list 2 deny 194.6.129.0 0.0.0.255 access-list 2 deny 206.31.78.0 0.0.0.255 access-list 2 deny 207.211.60.0 0.0.0.255 access-list 2 deny 206.27.242.0 0.0.0.255 access-list 2 deny 207.175.67.0 0.0.0.255
I'm sure there are more, but these are the ones blacklisted in our network configuration right now.
-- -- Karl Denninger (karl@MCS.Net)| MCSNet - Serving Chicagoland and Wisconsin http://www.mcs.net/ | T1's from $600 monthly / All Lines K56Flex/DOV | NEW! Corporate ISDN Prices dropped by up to 50%! Voice: [+1 312 803-MCS1 x219]| EXCLUSIVE NEW FEATURE ON ALL PERSONAL ACCOUNTS Fax: [+1 312 803-4929] | *SPAMBLOCK* Technology now included at no cost
participants (11)
-
Al Reuben
-
Alex P. Rudnev
-
Craig A. Huegen
-
E Pluribus Linux
-
Forrest W. Christian
-
jlixfeld@idirect.ca
-
Jon Lewis
-
Karl Denninger
-
Marc Slemko
-
Michael Dillon
-
Robert Reynolds