[186633] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: de-peering for security sake

daemon@ATHENA.MIT.EDU (Joe Abley)
Sat Dec 26 11:14:29 2015

X-Original-To: nanog@nanog.org
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <567EADA8.2090307@satchell.net>
Date: Sat, 26 Dec 2015 11:14:25 -0500
To: Stephen Satchell <list@satchell.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Dec 26, 2015, at 10:09, Stephen Satchell <list@satchell.net> wrote:

> My gauge is volume of obnoxious traffic.  When I get lots of SSH probes from a /32, I block the /32.

... without any knowledge of how many end systems are going to be affected.

A significant campus or provider user base behind a NAT is likely to
have more infections in absolute terms, which means more observed bad
behaviour. It also means more end-systems (again, in absolute terms)
that represent collateral damage.

> When I get lots of SSH probes across a range of a /24, I block the /24.

[...]

> When I see that the bad traffic has caused me to block multiple /24s, I will block the entire allocation.

Your network, your rules. But that's not the way I would manage things
if I thought my job was to optimise and maximise connectivity between
my users and the Internet.

With respect to ssh scans in particular -- disable all forms of
password authentication and insist upon public key authentication
instead. If the password scan log lines still upset you, stop logging
them.


Joe

home help back first fref pref prev next nref lref last post