Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] Security group highlights - December 2018

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] Security group highlights - December 2018


Chronological Thread 
  • From: gcbrowni <>
  • To:
  • Subject: Re: [Security-WG] Security group highlights - December 2018
  • Date: Tue, 8 Jan 2019 09:09:34 -0500
  • Ironport-phdr: 9a23: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

Yeah, I think we can work up that list. Adair, does that fit?

Not to pile on too much, but we’re even being UDP port 0 attacks in the analysis we’re doing in Deepfield Defender.  Much like 1918, etc, UDP port 0 is something that we should never see since its invalid. We’ll can that on the potential list also. I don’t want to go too far down that path, yet, but "that’s invalid" should be an easy call, especially since we see it in the wild. 

-G





On Jan 7, 2019, at 1:32 PM, David Farmer <> wrote:

Yes, please add the other stuff.

For IPv4, RFC1918 (Private-Use), RFC6598 (Shared Address Space), RFC3927 (Link-Local), RFC5737 (Documentation), 240.0.0.0/4 Reserved (Class E), 127.0.0.0/8 Loopback, 0.0.0.0/8 

For IPv6, RFC4193 (ULA), RFC3849  (Documentation), RFC6052 (Well-Known local NAT64), RFC8215 (other local NAT64), RFC6666 (Discard Prefix)

On Mon, Jan 7, 2019 at 11:01 AM gcbrowni <> wrote:
Well, unless we change the scope.

Let’s do 1918 and other "well known" bad source addresses. We can worry about "unassigned space" later.

How's that sound?


> On Jan 7, 2019, at 11:59 AM, Adair Thaxton <> wrote:
>
> I believe that only RFC1918 space is in scope for now.  Baby steps!
>
> Adair
>
>
> On 1/7/19 11:58 AM, Michael H Lambert wrote:
>> I fully agree with blocking RFC1918 addresses.  There are lots of other "static" bogon ranges, too, in both modern and legacy IP.  These include documentation and IANA-reserved addresses.  How aggressive should Internet2 (or connectors) be in blocking these in addition to RFC1918?
>>
>> Michael
>>
>>> On 7 Jan 2019, at 11:43, Brad Fleming <> wrote:
>>>
>>> I’m assuming RFC1918 IPs as the source, correct? Regardless of source or destination address I’m good with it. We shouldn’t be leaking that junk, if we are something is broken, and I don’t expect Internet2 or the greater community to deal with our failures. A publicly viewable counter on the firewall filter term could be useful; I could make one of our junior network team check the I2 counter every month to verify we don’t have an internal issue. I’d be fine if that instrumentation wasn’t added until later if I2 staff would like to move quickly on deploying filters but also want to gather more input from the community on exposing FW filter counters in this manner.
>>> --
>>> Brad Fleming
>>> Assistant Director for Technology
>>> Kansas Research and Education Network
>>>
>>>> On Jan 7, 2019, at 10:13 AM, Adair Thaxton <> wrote:
>>>>
>>>> I trust everyone had a nice break, and hasn't been driven up the wall by
>>>> bored children yet.  Our three-year-old reached the "why?" stage just in
>>>> time for break, so if you're still sane, I envy you!
>>>>
>>>>
>>>> - Internet2 is considering blocking all RFC1918 space at ingress links.
>>>> We do not expect this to affect cloud tunnel traffic, or any legitimate
>>>> traffic.  However, we all know the pitfalls of that last statement,
>>>> especially on our networks!  We plan to start by logging RFC1918 traffic
>>>> only, and then move to blocking it.  We also plan to offer opt-outs for
>>>> customers who need them.  We would welcome your input on this, for our
>>>> benefit as well as for the benefit of other customers.
>>>>
>>>>
>>>> - Check your routing tables!
>>>> https://twitter.com/InternetIntel/status/1080466509292621829
>>>>
>>>>
>>>> - Hat tip to researchers at the University of Maryland!
>>>> https://www.theregister.co.uk/2019/01/03/recaptcha_voice_challenge/
>>>>
>>>>
>>>> - A lot of it, as it turns out.
>>>> http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-is-fake.html
>>>>
>>>>
>>>> Happy new year, everybody!
>>>>
>>>> Adair
>>>
>>



--
===============================================
David Farmer              
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================

Attachment: smime.p7s
Description: S/MIME cryptographic signature




Archive powered by MHonArc 2.6.19.

Top of Page