Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] Security group highlights - December 2018

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] Security group highlights - December 2018


Chronological Thread 
  • From: "Dale W. Carder" <>
  • To:
  • Subject: Re: [Security-WG] Security group highlights - December 2018
  • Date: Tue, 8 Jan 2019 16:28:41 -0600
  • Ironport-phdr: 9a23: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

Thus spake Adair Thaxton
()
on Mon, Jan 07, 2019 at 04:13:36PM +0000:
> I trust everyone had a nice break, and hasn't been driven up the wall by
> bored children yet.  Our three-year-old reached the "why?" stage just in
> time for break, so if you're still sane, I envy you!

My 3yr old is firmly planted in the "No." phase (default-deny is not a
bad security policy per se, but I am not going to tell her that).

> - Internet2 is considering blocking all RFC1918 space at ingress links. 
> We do not expect this to affect cloud tunnel traffic, or any legitimate
> traffic.  However, we all know the pitfalls of that last statement,
> especially on our networks!  We plan to start by logging RFC1918 traffic
> only, and then move to blocking it.  We also plan to offer opt-outs for
> customers who need them.  We would welcome your input on this, for our
> benefit as well as for the benefit of other customers.

It looks like our filters largely match this list (minus multicast) and
of course we have explicit bcp38 filters for downstream networks to only
allow their prefixes.
https://www.team-cymru.org/Services/Bogons/bogon-bn-nonagg.txt
For v6 we drop non 2000::/3 space and the documentation prefix. That
could probably be expanded to include 2001:0002::/48
Are there others?

> - Check your routing tables! 
> https://twitter.com/InternetIntel/status/1080466509292621829

:-( ESnet as well as folks from DOE and WAPA saw it and we were able
to get it shut down. It was also useful for us to figure out folks
who weren't following best practices and MANRS.

Dale



Archive powered by MHonArc 2.6.19.

Top of Page