m o

c . NETWORK SECURITY i b o o h a s By Dennis Burgess

OVERVIEW

• DDOS Attacks • Client Isolation • Network Security

s

b o o h a

c .i

m o

DDOS ATTACK

• Common Types of DDOS • DNS Amplification

m o

c .i

• Due to Open DNS Resolvers • These are DNS servers that respond to anyone for any request. • Every MIkroTik that has “Allow-Remote-Requests” turned on is a potential attack vector • Attackers like this; it’s a 1:179 bandwidth amplification factor

b o o h a

• NTP Amplification

s

• Open NTP servers • Attackers have up to 1:556 bandwidth amplification factor

• There are others, these are the most common!

DDOS ATTACK

• DNS Amplification • How does this work • Requires Open DNS Recursive resolver

b o o h a

c .i

m o

• Recursive resolver, will go out and find what the answer is, add the answer to its cache and then return the result to the client. • non-authoritative answer – it gives an answer when its actually not the server responsible. • When you check the “allow remote requests” in IP DNS in RouterOS, without any rules, that creates a open DNS recursive resolver. I.e. any public IP on that box will respond to any DNS request.

s

DDOS ATTACK

• DNS Amplification • How does this work • Attacker

b o o h a

c .i

m o

• Uses his botnet -- Collection of workstations/devices that he has control of. • Sends Spoofed IP packets to open DNS resolvers. • The spoofed IP is the attacked IP. • The Open DNS servers, then respond with the correct answer but seeing that the packet came from the attacked IP (spoofed IPs), the response goes to the attacked IP • Many times, a 60-70 byte request can generate many return packets, causing high pps and bandwidth inbound.

s

DDOS ATTACK

•GOALS for DDOS •Take services off-line

m o

c •Fill the pipe so thati.the server or client is off-line b o •No bandwidth for real world o h application a •Highslatency, services off-line.

DDOS ATTACK

•GOALS for DDOS •Gamers

c .i

m o

•Lots of gamers have found that using DDOS against a fellow gamer can cause high latency •Thus they can win the prize if their fellow gamers have high latency. •Quite a few of League of Legends users do this!

s

b o o h a

DDOS ATTACK

m o

•DDOS •Typically large scale, can be 100meg to hundreds of Gigabit's •Typically need to be able to weather the storm •Need enough bandwidth to absorb the attack and block it from getting in. •Rules can include high PPS going to an individual IP address

s

b o o h a

c .i

DDOS ATTACK

s

b o o h a

c .i

m o

DDOS ATTACK

• How to Stop DDOS Attacks • First line of defense is to have enough bandwidth

m o

c .i

• 5 gig attack hits a 1 gig port, the port is swamped, and it has succeeded.

b o o h a

• Second is Black Hole Servers

• BGP process to send a individual /32 to black hole • Back holes route, to that individual /32 dropping traffic before it gets to your edge device.

• This prevents that /32 from getting out but prevents traffic from filling your entire pipe. • This in effect has done what the attacker wants, to take the customer off-line.

s

• Third is BCP 38

• Prevent spoofed packets form leaving your network. • If everyone did this, it would make these types of attacks uncommon. • You can also use strict reverse path.

DDOS ATTACK

m o

• How to Stop DDOS Attacks • First line of defense is to have enough bandwidth

c .i

• If you have enough bandwidth, you can firewall • Place rules in to detect high amounts of PPS going to a specific IP address • Drop all traffic to that IP address for 10 minutes

b o o h a

• Most on-line services do this; they route your traffic though their network that has high amounts of bandwidth at datacenters that is purchased on the cheap. • They then detect and block the DDOS attack. • This does work, but adds latency inside your network • Typically are cost prohibitive

s

• If the traffic continues add them back in until the traffic stops, this blocks that type of traffic but does not take the customer off-line. This is a failed DDOS.

DDOS ATTACK

• How to Stop DDOS Attacks • Second is Black Hole Servers • • • • • •

m o

c .i

If you don’t have enough bandwidth to survive the attack You advertise a /32 into black hole servers Typically BGP process Your provider must support this and have a documented and automated method Some providers will have you establish a BGP session with their black hole servers Some providers will simply have your add your /32 announcement with a specific community. • By advertising, you are telling your upstream(s) to block all traffic to that /32

b o o h a

• This is YOUR /32, your IP, that IP will be offline, but the attack will not fill your pipe.

s

• You can automate this with MIkroTik and several other solutions out there exist to detect and automate. • You can setup a BGP peer inside your network that you can get to that a single advertisement on it, advertises it to all of your upstream using the proper method.

DDOS ATTACK

m o

•How to Stop DDOS Attacks •If you don’t have BGP, do not have enough bandwidth, and are getting attacked.

b o o h a

c .i

• The only option is to call your upstream. • Sometimes they will take a statement and/or block traffic going to a specific IP • This is non-automated • This means that IP will be offline • Some providers only have this method  • Some providers will not black hole! Make sure to ask prior to purchasing.

s

PREVENTION

m o

•Key is metrics •Inbound metrics and pps is important to block attacks, but not block normal traffic •Every network is different, don’t use my numbers as they may not work for you!

s

b o o h a

c .i

PREVENTION

m o

• Key is metrics • These metrics work for one customer, but not for another. • Make sure you understand what you are doing, when you put these kinds of rules in. • Note that there is no block rule here, we place that on the forward chain.

b o o h a

c .i

• Make sure you know what you are going to block before blocking!

s

s

b o o h a

c .i

m o

CLIENT ISOLATION

CLIENT ISOLATION

m o

•Every client should be isolated into its own broadcast domain •This is not practical in all conditions, but can be done. •This allows the client to only talk to the router (their gateway) via ARP •Layer 3 connectivity can be used to allow clients to talk to one another, etc. •Layer 2 connectivity should never be given to your wireless network or infrastructure.

s

b o o h a

c .i

• How to do this? • Tower router with VLANs to switching • Add ports to bridge group • Firewall with Split-Horizon

• This is hardware blocking • Turn off Default-Forward in access point – or disable clientto-client forwarding

b o o h a

• This then puts each client into their own broadcast domain. • /interface bridge port set [find] horizon=100

s

CLIENT ISOLATION

c .i

m o

CLIENT ISOLATION • You can also use • Bridge filters to drop all forward traffic. • Thus you can allow specific MAC addresses to specific MAC addresses • This blocks all data between bridged ports. • This is a software feature

s

b o o h a

• /interface bridge firewall add chain=forward action=drop

c .i

m o

CLIENT ISOLATION

m o

•Rouge DHCP Servers •This prevents the effects of Rough DHCP Servers

c .i

b o •Note, that your client should not o have layer 2 access to your h a network anyways, so should not be s an issue.

CLIENT ISOLATION

m o

•Rouge DHCP Servers •You can use DHCP-Alert to alert you of other DHCP Servers •It will give you the MAC address and IP of the router that is running. •However with proper client isolation, this should not matter.

s

b o o h a

c .i

CLIENT ISOLATION

m o

•Switches •You can use switches, to do this as well •Protected-Port status is a switch port that can’t communicate with other switch ports that is in the same group.

s

b o o h a

c .i

b o o h a

c .i

m o

NETWORK SECURITY

s

NETWORK SECURITY

m o

• Inbound Ports • 80,443,8080,8181,81-90, 21-25, 123, 53, 161, 135-139, 445, 110, 143, 8888 • Common inbound ports to block, both TCP and UDP

b o o h a

c .i

• Blocks common amplification attacks, as well as common web based ports. If a client is smart enough to use other ports than port 80 and 443, then let them but otherwise we block them.

• Why?

• Most users are dumb… If they want to take responsibility for their internet connection the they can upgrade to a package that does not have a firewall on it.

• NAT

s

• Is not considered a security mechanism • But can be very effective assuming your router is secured

NETWORK SECURITY

m o

• Inbound Ports • 80,443,8080,8181,81-90, 21-25, 123, 53, 161, 135-139, 445, 110, 143, 8888 • Common inbound ports to block, both TCP and UDP • What about other ports • 8291 – WinBox

b o o h a

c .i

• Your business needs will be what you need to block • Separate your business with VLANs, place one subnet on for management, and no vlan for clients • Firewall at every router with rules that prevent network access to the management network from your clients IP addresses. • IP  Services on your MIkroTik – Turn off the ones you don’t use! Block management access to only your management network • Build a VPN to manage your network.

s

NETWORK SECURITY

m o

• Forwarding inside your network • Typically you consider the inside of your network more secure than the outside. • This is a bad idea, as attacks can come from anywhere • Secure your infrastructure, your wireless access points, and devices

b o o h a

c .i

• Place them on a VLAN so that you can access them easily enough. • Place firewall rules to prevent any client subnets from accessing them. • You SHOULD NOT be able to access client devices from the inside of your network

s

• Not without a secure VPN

• Do not forget about IPv6

• You need to secure your devices and client access devices

04. Teknik_Bertahan_dari_Serangan_DDOS_sahoobi.com.pdf ...

•DNS Amplification. •How does this work. • Attacker. • Uses his botnet -- Collection of workstations/devices that. he has control of. • Sends Spoofed IP packets to ...

870KB Sizes 0 Downloads 249 Views

Recommend Documents

1720-04-04
Aug 1, 2017 - effective August 12, 1986. (For history prior to August 12, 1986 see pages (iii)-(i).) Amendment filed. March 22, 1990; effective June 26, 1990.

sac - 04-04-2013.pdf
... the Support Center Specialists to address academic and personal concerns,. including how to locate quality child care. 4. Is it possible to get more computers, ...

HIN 04-04-2017.pdf
ye®®es Dehevee hetje-hetje mecee®eej oes lees yeeyee mecePes 3en keÌ3ee mee|Jeme keÀj jns nQ~ yeeyee ye®®eeW keÀes nj neuele. ceW Tb®e heo ...

04-04-17.pdf
Page 1 of 2. By Emma Scott,. Emelia Skogstad. and Grace Isaacson. An ad-room was held to. begin the day today as students. and staff prepare for standard- ized testing of juniors to begin. Wednesday. On Wednesday, juniors. will take the S.D. Science

2009-04-04 3. Mitgliederversammlung.pdf
The Old Apostolic Church (Germany). Protokoll der 3. ... Andrea Schulz, Stephan Schulz,. Ruth Schulz, Ingolf ... Mitgliederversammlung.pdf. 2009-04-04 3.

04-04-16.pdf
ve. Whoops! There was a problem loading this page. Retrying... Whoops! There was a problem loading this page. Retrying... 04-04-16.pdf. 04-04-16.pdf. Open.

DF-04-04.pdf
Nombre: Ana María Sanabria Nombre: Héctor Cadavid Ramírez. RECTORÍA. Oficina de Planeación y Desarrollo Institucional. Área de Calidad y Mejoramiento.

WardsboroAct46-04-04-17.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... WardsboroAct46-04-04-17.pdf. WardsboroAct46-04-04-17.pdf.

DAILY CURRENT AFFAIRS-04-04-2018.pdf
Page 1 of 1. Visit:- http://www.ssscpsc.com/ . . . . Youtube/Exammedia. DAILY CURRENT AFFAIRS-04/04/2018. 1. SIDBI Virtual Assistant and Bankability Kit?

02-04-2017 to 25-04-2017 bhavita.pdf
AíÜòÜt...sŒæ { ́÷òœçÜÆŠæ, ̄éV>Æý‡$j ̄]l. {ç3¿¶æ$TMèlÓ yìl{X MýSâêÔ>Ë, ̄]lËÏVö...yýl. INTERNATIONAL. Norway is happiest country. in the world.

1974-04-04 - noise ordinance .pdf
Sign in. Page. 1. /. 1. Loading… Page 1 of 1. Page 1 of 1. 1974-04-04 - noise ordinance .pdf. 1974-04-04 - noise ordinance .pdf. Open. Extract. Open with.

Lotus Menu 2017-04-04.pdf
Apr 4, 2017 - Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Lotus Menu 2017-04-04.pdf. Lotus Menu ...

04/04/14 Letter Philadelphia Family Division Courtroom M Judge ...
04/04/14 Letter Philadelphia Family Division Courtroom M Judge Joseph Fernandes: Lift bench warrants in Continuance Order of March 18, 2014 against mother and grandmother of Grayson Grinage as your Continuance Order is the Judicial Legal Malpractice

1660-02-04
Jun 29, 2017 - (h) The name, address, age, or date of birth, telephone number, vessel operating experience, and boating safety training of the operator making ...

0250-04-08
Jun 1, 2017 - (a) The safety, welfare and best interests of the youth in the care of the ... (6) Facilities shall provide their services in an ethical and .... (3) The facility administrator shall approve a list of articles and ..... (b) Incoming mai

04-06 ...
pelo Tribunal Europeu dos Direitos Humanos. Page 3 of 27. 04-06-2014ImunidadejurisdicionalEstadoDespedimentocozinheiraembaixada - VA.pdf.

0400-60-04
Apr 17, 2017 - SMALL BUSINESS ENERGY LOAN PROGRAM ... (2) This chapter sets forth the rules for the submission, acceptance, review, and ... intended to reduce energy consumption or allow the use of an alternative energy source.

1680-04-02
Oct 1, 2017 - Authority: T.C.A. §§ 4-3-2303(2), 10-7-503, 10-7-503(g), and 10-7-506. Administrative History: Original rule filed February 26, 2007; effective May 12, 2007. Repeal filed July 17, 2017; effective October. 15, 2017. 1680-04-02-.02 REPE

1660-02-04
Jun 1, 2017 - (1) The operator of a vessel shall immediately notify the Tennessee Wildlife Resources Agency and, shall provide the information listed in Rule ...

Adolf Hitler Part 04 of 04.pdf
Sign in. Page. 1. /. 139. Loading… Page 1 of 139. Page 1 of 139. Page 2 of 139. Page 2 of 139. Page 3 of 139. Page 3 of 139. Adolf Hitler Part 04 of 04.pdf.

2018 04 04 Quarter Horse Committee Agenda.pdf
Apr 4, 2018 - Update on hair testing. 4. Discussion on QH weights. 5. American Quarter Horse Association Issues/Report - Janet. VanBebber. --. Page 1 of 1.

2011-04-04 Diari de Tarragona.pdf
Page 1 of 1. 2011-04-04 Diari de Tarragona.pdf. 2011-04-04 Diari de Tarragona.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying 2011-04-04 Diari ...