Reflection DDoS Attacks Abusing RPC Portmapper 34
msm1267 writes: Attackers have figured out how to use Portmapper, or RPC Portmapper, in reflection attacks where victims are sent copious amounts of responses from Portmapper servers, saturating bandwidth and keeping websites and web-based services unreachable. Telecommunications and Internet service provider Level 3 Communications of Colorado spotted anomalous traffic on its backbone starting in mid-June almost as beta runs of attacks that were carried out Aug. 10-12 against a handful of targets in the gaming and web hosting industries. There are 1.1 million Portmapper servers accessible online, and those open servers can be abused to similar effect as NTP servers were two years ago in amplification attacks.
Who the FUCK leaves RPC open to the internet! (Score:3, Insightful)
See subject.
Re: (Score:2)
Retarded windows admins.
Actually, this is ONC RPC, originally developed by Sun, not DCE RPC, originally developed by Apollo, adopted by the OSF, and then adopted by Microsoft, but I guess there are Windows boxes offering NFS or some other ONC RPC-based service (or providing clients for those services and, for some unknown reason, running the portmapper even if they're not offering any such services, but I digress).
Re: (Score:3)
Actually, this is ONC RPC, originally developed by Sun, not DCE RPC, originally developed by Apollo, adopted by the OSF, and then adopted by Microsoft, but I guess there are Windows boxes offering NFS or some other ONC RPC-based service (or providing clients for those services and, for some unknown reason, running the portmapper even if they're not offering any such services, but I digress).
Gesundheit.
Re: (Score:1)
Lol. Firewall. You really are stretching the imagination there with a world where everyone who faces a machine to the Internet really has the know-how to do it properly.
You kill me.
You call that secure (Score:3, Funny)
Who the FUCK leaves RPC open to the internet!
You think you're secure. I only allow internet traffic once every seven minutes for six sec...NO CARRIER
Re: (Score:2)
Re: (Score:2)
TCP Port 110 or 143, but preferably 995 993. TCP Port 465 if you want any kind of email security. Though it is quite easy to read documentation and get all the ports that are needed internally and externally:
https://support.prolateral.com... [prolateral.com]
If it was Exchange RPC, I would say that the admins are morons, but I don't know anything about NIS RPC being used by these Unix systems.
Re: (Score:1)
debian linux
Re: (Score:3)
debian linux
My firewall runs Debian, and I'm not seeing any crazy outgoinNO CARRIER
It was a dark and stormy night (Score:2)
During that fateful September twenty five years ago. Oh, how I howl at the moon for the politeness and professionalism of CompuServe!
Filtering (Score:2)
Re:Filtering (Score:4, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Yes, though it might also break things for larger customers who have more than one ISP, whose IP ranges should at least ostensibly be advertised as routable through both networks. Mind you, that's a fairly small percentage of users out there, so yes, the default policy for such traffic should almost certainly be "drop".
Of course, you could do the port blocking at the ISP level and be done with it. IMO, an ISP should port filter everything into the ground by default; a customer should have to explicitly r
Re: (Score:2)
No. My ISP should be a big dumb pipe until I say otherwise. It shouldn't be touching my traffic, ever.
Re: (Score:2)
Your traffic, yes. The average user's traffic, no. The average computer user has Windows file sharing turned on for the root volume, with the relevant ports wide open to the outside world, and with an empty admin password.
Unfortunately, the vast majority of people are simply not equipped to protect their own networks, and need their ISPs to do it for them. As long as that is the case, network connections that allow unfiltered inbound traffic should be by request, not by default. If you know enough to a
Re: (Score:2)
The only annoyance I am aware of is if they need to restart their internal network, your DHCP lease may be invalidated and suddenly you no longer have Internet access until you clear your lease and negotiate a new one. It has happ
Should not be exposed to the Internet (Score:3)
If you're exposing any ports to the Internet that are not absolutely necessary for the general unknown public to communicate with you, you're an idiot.
Web ports? Yes, if necessary.
Email ports? Yes, if necessary.
VPN ports? Yes, if necessary.
Anything else just SHOULDN'T be. And certainly never anything along the lines of RPC, CIFS, etc.
Re: (Score:3)
Ye be wanting to use a cat9 cable for that me laddie.
Egress filtering (Score:3)
Re: (Score:1)
.. or ENTER their network. You should ALWAYS inspect and filter what your idiot customers send you.
Re: (Score:2)