Re: Ingress filtering on transits, peers, and IX ports

2020-11-20 Thread Brian Knight via NANOG
As a final update to this thread, we started blocking spoofed and invalid traffic as of early Thursday morning Nov 19th. So far, knock on wood, no reports of issues from our customer base. In addition, I've been able to verify with the security research team's test tool that we are no longer

RE: Ingress filtering on transits, peers, and IX ports

2020-10-23 Thread adamv0025
> Randy Bush > Sent: Tuesday, October 20, 2020 6:19 AM > > term blocked-ports { > from { > protocol [ tcp udp ]; > first-fragment; > destination-port > [ 0 sunrpc 135 netbios-ns netbios-dgm netbios-ssn 111 445 syslog > 11211]; > } > then { > sample;

Re: Ingress filtering on transits, peers, and IX ports

2020-10-22 Thread Brian Knight via NANOG
Randy, thank you for the reminder to look also at what services (L4 ports) should be generally blocked. As I was implementing a similar rule for logging purposes, I discovered an oddity with $VENDOR_C_XR ACLs. I created the following: object-group port TCPUDP-BLOCKED eq 0 eq sunrpc eq

Re: Ingress filtering on transits, peers, and IX ports

2020-10-20 Thread Baldur Norddahl
Might filtering port 11211 like that not risk blocking random connections, where the operating system picked that port as source, which then becomes destination on the reply packets? tir. 20. okt. 2020 07.19 skrev Randy Bush : > term blocked-ports { > from { > protocol [ tcp udp ]; >

Re: Ingress filtering on transits, peers, and IX ports

2020-10-20 Thread Dobbins, Roland
> On 15 Oct 2020, at 05:43, Brian Knight via NANOG wrote: > > I think that's good for an enterprise network, but as an SP, I'm very > hesitant to include this. Is this included in anyone else's transit / peer / > IX ACL? This must not be done on peering links and on transit networks

Re: Ingress filtering on transits, peers, and IX ports

2020-10-20 Thread Marcos Manoni
Hi, You are missing some IPv6 bogons prefixes. Check: http://www.bgp4all.com.au/pfs/_media/workshops/05-bgp-bcp.pdf (page 51-53) http://bgpfilterguide.nlnog.net/guides/bogon_prefixes/#configuration-examples-ipv6 Regards.

Re: Ingress filtering on transits, peers, and IX ports

2020-10-20 Thread Tim Durack
I took a slightly different approach for my mental exercise, expressed in IOS pigeon: object-group ip address AS65001 192.0.2.0 255.255.255.0 end object-group v6-network AS65001 2001:DB8::/32 end object-group ip address TwentyFiveGigE1/0/1 192.0.2.0 255.255.255.254 end

Re: Ingress filtering on transits, peers, and IX ports

2020-10-19 Thread Randy Bush
term blocked-ports { from { protocol [ tcp udp ]; first-fragment; destination-port [ 0 sunrpc 135 netbios-ns netbios-dgm netbios-ssn 111 445 syslog 11211]; } then { sample; discard; } } and i block all external

Re: Ingress filtering on transits, peers, and IX ports

2020-10-19 Thread Brian Knight via NANOG
Thanks to the folks who responded to my messages on and off-list. A couple of folks have asked me to summarize the responses that I received. * Static ACL is currently the best way to protect a multi-homed network. Loose RPF may be used if bogon filtering is more important, but it does not

Re: Ingress filtering on transits, peers, and IX ports

2020-10-19 Thread Casey Deccio
> On Oct 14, 2020, at 3:34 PM, Eric Kuhnke wrote: > > I think he means packet captures from an example, voluntarily-tested > recursive nameserver subject to this attack. Thanks. We have updated all the report pages with a self-test tool specific to the network associated with the report.

RE: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread adamv0025
> Chris Adams > Sent: Thursday, October 15, 2020 3:59 PM > > Once upon a time, adamv0...@netconsultings.com > said: > > Actually ideally there would be a feature/knob to automatically sync BGP > (and static routes) with packet filters. > > Junos has prefix-lists that can be referenced in both

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Blake Hudson
Speaking as an ISP:     Most of the ISP networks I manage are multi-homed, and I don't think uRPF provides the knobs to ensure legitimate traffic doesn't get dropped in some cases, so we use static ACLs at the upstream edge on ingress (and egress). These need updated any time new IP space is

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Chris Adams
Once upon a time, adamv0...@netconsultings.com said: > Actually ideally there would be a feature/knob to automatically sync BGP (and > static routes) with packet filters. Junos has prefix-lists that can be referenced in both BGP policy and firewall statements. -- Chris Adams

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Tim Durack
On Thu, Oct 15, 2020 at 10:30 AM Saku Ytti wrote: > On Thu, 15 Oct 2020 at 17:22, Tim Durack wrote: > > > > We deploy urpf strict on all customer end-host and broadband circuits. > In this scenario urpf = ingress acl I don't have to think about. > > But you have to think about what prefixes a

RE: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread adamv0025
> From: Saku Ytti > Sent: Thursday, October 15, 2020 3:30 PM > > On Thu, 15 Oct 2020 at 17:22, Tim Durack wrote: > > > > We deploy urpf strict on all customer end-host and broadband circuits. In > this scenario urpf = ingress acl I don't have to think about. > > But you have to think about

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Nick Hilliard
Saku Ytti wrote on 15/10/2020 15:29: But you have to think about what prefixes a customer has. If BGP you need to generate prefix-list, if static you need to generate a static route. As you already have to know and manage this information, what is the incremental cost to also emit an ACL? the

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Saku Ytti
On Thu, 15 Oct 2020 at 17:22, Tim Durack wrote: > We deploy urpf strict on all customer end-host and broadband circuits. In > this scenario urpf = ingress acl I don't have to think about. But you have to think about what prefixes a customer has. If BGP you need to generate prefix-list, if

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Tim Durack
We deploy urpf strict on all customer end-host and broadband circuits. In this scenario urpf = ingress acl I don't have to think about. We deploy urpf loose on all customer multihomed DIA circuits. I dont this makes sense - ingress packet acl would be more sane. Any flavour of urpf on upstream

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Saku Ytti
On Thu, 15 Oct 2020 at 15:14, wrote: > Yes one should absolutely do that, but... > But considering to become a good netizen what is more work? > a) Testing and the enabling uRPF on every customer facing box or setting up > precise ACLs on every customer facing port, and then maintaining all

RE: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread adamv0025
> From: Saku Ytti > Sent: Thursday, October 15, 2020 11:12 AM > > Hey, > Hey Saku, > > All stub autonomous systems should have a simple egress ACL allowing > only PI of their customers and their own PAs -it’s a simple ACL at each > AS-Exit > points (towards transits/peers), that’s it. > > > >

RE: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Jean St-Laurent via NANOG
ght want to add all the amplification ports like 123, 161, etc Jean -Original Message- From: NANOG On Behalf Of Brian Knight via NANOG Sent: Wednesday, October 14, 2020 6:43 PM To: nanog Subject: Re: Ingress filtering on transits, peers, and IX ports So I have put together what I t

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Baldur Norddahl
. > > -not sure why this isn’t the first sentence in every BCP and “security > bulletin”… > > > > > > adam > > > > *From:* NANOG *On > Behalf Of *Baldur Norddahl > *Sent:* Thursday, October 15, 2020 8:38 AM > *To:* nanog@nanog.org > *Subject:* Re:

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Saku Ytti
Hey, > All stub autonomous systems should have a simple egress ACL allowing only PI > of their customers and their own PAs -it’s a simple ACL at each AS-Exit > points (towards transits/peers), that’s it. > > -not sure why this isn’t the first sentence in every BCP and “security > bulletin”… I

RE: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread adamv0025
”… adam From: NANOG On Behalf Of Baldur Norddahl Sent: Thursday, October 15, 2020 8:38 AM To: nanog@nanog.org Subject: Re: Ingress filtering on transits, peers, and IX ports All DNS resolvers discovered on our network belong to customers. Our own resolvers, running unbound, were

Re: Ingress filtering on transits, peers, and IX ports

2020-10-15 Thread Baldur Norddahl
All DNS resolvers discovered on our network belong to customers. Our own resolvers, running unbound, were not discovered. While filtering same AS on ingress could help those customers (but only one was a open relay), filtering bogons is something the customer can also do. Or the software can be

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Mark Andrews
> On 15 Oct 2020, at 04:09, Casey Deccio wrote: > > >> On Oct 13, 2020, at 8:49 PM, Chris Adams wrote: >> >> Once upon a time, Eric Kuhnke said: >>> Considering that one can run an instance of an anycasted recursive >>> nameserver, under heavy load for a very large number of clients, on a

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Brian Knight via NANOG
So I have put together what I think is a reasonable and complete ACL. From my time in the enterprise world, I know that a good ingress ACL filters out traffic sourcing from: * Bogon blocks, like 0.0.0.0/8, 127.0.0.0/8, RFC1918 space, etc (well-documented in

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Eric Kuhnke
I think he means packet captures from an example, voluntarily-tested recursive nameserver subject to this attack. On Wed, Oct 14, 2020 at 11:53 AM Casey Deccio wrote: > Hi Bryan, > > > On Oct 14, 2020, at 12:43 PM, Bryan Holloway wrote: > > > > I too would like to know more about their

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Mel Beckman
"What do you mean by "tangibles in the form of PCAPs”” I think Brian means packet captures, in PCAP format, so that we can observe example testing via Wireshark or some other protocol analyzer. -mel > On Oct 14, 2020, at 11:52 AM, Casey Deccio wrote: > > Hi Bryan, > >> On Oct 14, 2020, at

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Casey Deccio
Hi Bryan, > On Oct 14, 2020, at 12:43 PM, Bryan Holloway wrote: > > I too would like to know more about their methodology We've written up our methodology and results in a paper that will be available in a few weeks. Happy to post it here if folks are interested. Obviously, no networks are

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Bryan Holloway
I too would like to know more about their methodology and actual tangibles ideally in the form of PCAPs. On 10/14/20 4:56 PM, Brian Knight via NANOG wrote: Hi Eric, I shot a message over the folk who did the testing for more info about their test.  If I'm able to find anything useful in our

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Jared Mauch
On Tue, Oct 13, 2020 at 05:49:42PM -0500, Brian Knight via NANOG wrote: > Hi Mel, > > My understanding of uRPF is: > > * Strict mode will permit a packet only if there is a route for the > source IP in the RIB, and that route points to the interface where the > packet was received > > *

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Mike Hammett
14, 2020 3:12:22 AM Subject: Re: Ingress filtering on transits, peers, and IX ports Brian Knight via NANOG wrote on 13/10/2020 23:49: > Strict mode won't work for us, because with our multi-homed transits and > IX peers, we will almost certainly drop a legitimate packet because the >

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Casey Deccio
> On Oct 13, 2020, at 8:49 PM, Chris Adams wrote: > > Once upon a time, Eric Kuhnke said: >> Considering that one can run an instance of an anycasted recursive >> nameserver, under heavy load for a very large number of clients, on a $600 >> 1U server these days... I wonder what exactly the

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Brian Knight via NANOG
Hi Eric, I shot a message over the folk who did the testing for more info about their test. If I'm able to find anything useful in our logs from their detail, I'll post it to the list. The message referenced DNS cache poisoning and DDOS amplification, so it seemed fairly general and more

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Brian Knight via NANOG
Hi Marcos, Thanks for your reply. But I am looking for guidance on traffic filtering, not BGP prefix filtering. I have looked at BCP 84, and it's a good overview of the methods available to an ISP. My questions are more operational in nature and are not covered by the document. Of the

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Brandon Martin
On 10/13/20 9:40 PM, Nikolas Geyer wrote: Tl;dr - definitely don’t accept your own prefix from the site it originated from, or other sites that have internal connectivity. But also don’t assume that an AS has a full-mesh of internal connectivity behind it and shouldn’t accept its own prefixes

Re: Ingress filtering on transits, peers, and IX ports

2020-10-14 Thread Nick Hilliard
Brian Knight via NANOG wrote on 13/10/2020 23:49: Strict mode won't work for us, because with our multi-homed transits and IX peers, we will almost certainly drop a legitimate packet because the best route is through another transit. there's no "almost" about it: strict mode is unfeasible for

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Seth Mattinen
On 10/13/20 8:04 PM, Eric Kuhnke wrote: If I had a dollar for every 'scary security alert' email received in a NOC email inbox from a 'security researcher group' that is the results of a port scan, or some small subset of trojan infected residential endpoint computers attempting outbound

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Eric Kuhnke
If I had a dollar for every 'scary security alert' email received in a NOC email inbox from a 'security researcher group' that is the results of a port scan, or some small subset of trojan infected residential endpoint computers attempting outbound connections on ($common_service_port), or

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Chris Adams
Once upon a time, Eric Kuhnke said: > Considering that one can run an instance of an anycasted recursive > nameserver, under heavy load for a very large number of clients, on a $600 > 1U server these days... I wonder what exactly the threat model is. A customer forwarded one of these notices to

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Eric Kuhnke
Aside from the BCPs currently being discussed for ingress filtering, I would be very interested in seeing what this traffic looked like from the perspective of your DNS servers' logs. I assume you're talking about customer facing recursive/caching resolvers, and not authoritative-only

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Nikolas Geyer
Specifically with regards to “Don’t accept your own prefix”, this poses an interesting challenge for the original notice sent out by the security researchers. It is not uncommon today for various content networks (and others) to operate multiple “island networks” with a single ASN. For

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Marcos Manoni
Hi, Brian Check RFC3704/BCP84 Ingress Filtering for Multihomed Networks (Updated by: RFC8704 Enhanced Feasible-Path uRPF). Ingress Access Lists require typically manual maintenance, but are the most bulletproof when done properly; typically, ingress access lists are best fit between

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Brian Knight via NANOG
Hi Mel, My understanding of uRPF is: * Strict mode will permit a packet only if there is a route for the source IP in the RIB, and that route points to the interface where the packet was received * Loose mode will permit a packet if there is a route for the source IP in the RIB. It does not

RE: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Jean St-Laurent via NANOG
. I’m curious to hear/read which uRPF would you recommend for this particular case. Thanks Jean St-Laurent From: NANOG On Behalf Of Mel Beckman Sent: Tuesday, October 13, 2020 6:22 PM To: Brian Knight Cc: nanog@nanog.org Subject: Re: Ingress filtering on transits, peers, and IX ports

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Matt Harris
Matt Harris|Infrastructure Lead Engineer 816-256-5446|Direct Looking for something? Helpdesk Portal|Email Support|Billing Portal We build and deliver end-to-end IT solutions. On Tue, Oct 13, 2020 at 5:22 PM Mel Beckman wrote: > You can also use Unicast Reverse Path Forwarding. RPF is more

Re: Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Mel Beckman
You can also use Unicast Reverse Path Forwarding. RPF is more efficient than ACLs, and has the added advantage of not requiring maintenance. In a nutshell, if your router has a route to a prefix in its local RIB, then incoming packets from a border interface having a matching source IP will be

Ingress filtering on transits, peers, and IX ports

2020-10-13 Thread Brian Knight via NANOG
We recently received an email notice from a group of security researchers who are looking at the feasibility of attacks using spoofed traffic. Their methodology, in broad strokes, was to send traffic to our DNS servers with a source IP that looked like it came from our network. Their attacks