Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Sean Donelan
On Sun, 17 Apr 2005, Randy Bush wrote: > celebrate diversity (aka i wish all my competitors did that:-) What did people think would happen if they try to hold third-parties liable for the actions of others? Third-parties have very little interest in defending your diversity. And if the FCC star

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush
> interesting... everytime we have filtered in the core we've gotten > complaints, I believe many folks filtered/rate-limited in their cores for > welchia/nachia and got bunches of complaints about it as well... Hrm, > maybe all of these folks are just grumpy-geeks? i suspect that the remaining s

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow
On Sun, 17 Apr 2005, Randy Bush wrote: > >>> On my Cisco-based SP network with RPMs in MGX chassis acting as > >>> PEs: I have the ACL below applied on many network devices to > >>> block the common worms ports, > >> if you are a service provider, perhaps filtering in the core > >> will not be a

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow
On Sun, 17 Apr 2005, J.D. Falk wrote: > > On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote: > > > > deny tcp any any range 135 139 > > > deny udp any any range 135 netbios-ss > > > deny tcp any any eq 445 > > > deny udp any any eq 1026 > > > > Similar as before, you are going to

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow
On Sun, 17 Apr 2005, J.D. Falk wrote: > > On 04/17/05, Randy Bush <[EMAIL PROTECTED]> wrote: > > > > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs: > > > I have the ACL below applied on many network devices to block the > > > common worms ports, > > > > if you are a service

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Sean Donelan
On Sun, 17 Apr 2005, Christopher L. Morrow wrote: > one approach might be radius installed filters? some contract language to > allow 'customers' to request standard templated filters at little/no-extra > cost to them. Allow them to make the decision to filter themselves (where > 'themselves' may

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread John Kristoff
On Sun, 17 Apr 2005 13:00:30 -0700 "J.D. Falk" <[EMAIL PROTECTED]> wrote: > > > deny udp any any eq 1026 > > > > Similar as before, you are going to be removing some legitimate > > traffic. > > Is this really true? All of the ports listed above are used by > LAN protocols that w

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "J.D. Falk" writes: > >On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote: > >> > deny tcp any any range 135 139 >> > deny udp any any range 135 netbios-ss >> > deny tcp any any eq 445 >> > deny udp any any eq 1026 >> >> Similar as before, you are go

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread J.D. Falk
On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote: > > deny tcp any any range 135 139 > > deny udp any any range 135 netbios-ss > > deny tcp any any eq 445 > > deny udp any any eq 1026 > > Similar as before, you are going to be removing some legitimate > traffic. Is this

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread John Kristoff
On Sun, 17 Apr 2005 13:28:21 +0200 Kim Onnel <[EMAIL PROTECTED]> wrote: > I have the ACL below applied on many network devices to block the > common worms ports, Beware, you are guaranteed to be blocking other, legitimate things too with some of these rules. More below. > ip access-list extend

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Kim Onnel
Even if they care, its consuming alot of CPU resources and bandwidth, i had a long quarrel with my teams members on should we do it or not, i understand that if we only provide best effort traffic without any filtering contracted its wrong to do it, but the ACL matches are so big, doing it on the

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread J.D. Falk
On 04/17/05, Randy Bush <[EMAIL PROTECTED]> wrote: > > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs: > > I have the ACL below applied on many network devices to block the > > common worms ports, > > if you are a service provider, perhaps filtering in the core will > not b

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush
>>> On my Cisco-based SP network with RPMs in MGX chassis acting as >>> PEs: I have the ACL below applied on many network devices to >>> block the common worms ports, >> if you are a service provider, perhaps filtering in the core >> will not be appreciated by some customers. of course, as a >> p

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow
On Sun, 17 Apr 2005, Randy Bush wrote: > > > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs: > > I have the ACL below applied on many network devices to block the > > common worms ports, > > if you are a service provider, perhaps filtering in the core will > not be appreciat

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush
> On my Cisco-based SP network with RPMs in MGX chassis acting as PEs: > I have the ACL below applied on many network devices to block the > common worms ports, if you are a service provider, perhaps filtering in the core will not be appreciated by some customers. of course, as a provider, you c

Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Suresh Ramasubramanian
On 4/17/05, Kim Onnel <[EMAIL PROTECTED]> wrote: > > Can someone confirm if my approach explained below is sufficient and > if there is other/better ways to do this ? something i am missing. > blocking netbios and 2..3 other ports is one way to go. however, what you need is fast detection and

BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Kim Onnel
Hello, Can someone confirm if my approach explained below is sufficient and if there is other/better ways to do this ? something i am missing. On my Cisco-based SP network with RPMs in MGX chassis acting as PEs: I have the ACL below applied on many network devices to block the common worms port