Community discussions

MikroTik App
 
byzon
newbie
Topic Author
Posts: 30
Joined: Fri Mar 24, 2006 8:09 pm

Help me please

Fri Mar 24, 2006 8:19 pm

Hello all , before to begin sorry for the very bad english .. I have a very strange traffic and i was trying alot of things to stop it , but its still runing i have these messeges from snort , on my gateway after the mikrotik router..
[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:31.190495 213.91.129.37 -> 192.168.195.74
ICMP TTL:253 TOS:0xC0 ID:35535 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.74:12762 -> 69.199.66.39:6881
UDP TTL:123 TOS:0x0 ID:46383 IpLen:20 DgmLen:126
Len: 98
** END OF DUMP

[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:31.735533 213.91.129.37 -> 192.168.195.74
ICMP TTL:253 TOS:0xC0 ID:35539 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.74:12762 -> 219.154.178.106:18000
UDP TTL:123 TOS:0x0 ID:46397 IpLen:20 DgmLen:126
Len: 98
** END OF DUMP

[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:32.236979 213.91.129.37 -> 192.168.195.66
ICMP TTL:253 TOS:0xC0 ID:35545 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.66:7288 -> 82.40.214.33:32733
UDP TTL:124 TOS:0x0 ID:2515 IpLen:20 DgmLen:130
Len: 102
** END OF DUMP

[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:32.834753 213.91.129.37 -> 192.168.195.74
ICMP TTL:253 TOS:0xC0 ID:35547 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.74:12762 -> 84.166.93.156:7719
UDP TTL:123 TOS:0x0 ID:46452 IpLen:20 DgmLen:126
Len: 98
** END OF DUMP

[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:33.342658 213.91.129.37 -> 192.168.195.112
ICMP TTL:253 TOS:0xC0 ID:35549 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.112:61565 -> 82.128.186.85:34503
UDP TTL:124 TOS:0x0 ID:47638 IpLen:20 DgmLen:49
Len: 21
** END OF DUMP

[**] [119:7:1] (http_inspect) IIS UNICODE CODEPOINT ENCODING [**]
03/25-00:30:33.976166 192.168.193.244:4064 -> 195.149.248.151:80
TCP TTL:127 TOS:0x0 ID:29224 IpLen:20 DgmLen:481 DF
***AP*** Seq: 0x4A249D01 Ack: 0x2E1FEF93 Win: 0xFF3C TcpLen: 20

[**] [1:485:4] ICMP Destination Unreachable Communication Administratively Prohibited [**]
[Classification: Misc activity] [Priority: 3]
03/25-00:30:34.035747 213.91.129.37 -> 192.168.195.74
ICMP TTL:253 TOS:0xC0 ID:35551 IpLen:20 DgmLen:56
Type:3 Code:13 DESTINATION UNREACHABLE: ADMINISTRATIVELY PROHIBITED,
PACKET FILTERED
** ORIGINAL DATAGRAM DUMP:
192.168.195.74:12762 -> 142.163.162.111:61746
UDP TTL:123 TOS:0x0 ID:46497 IpLen:20 DgmLen:126
Len: 98
** END OF DUMP
I have added allot of rules in my Mikrotik RouterOs like
/ip firewall filter
add chain=input connection-state=established action=accept comment=";;; accept established connection packets"
add chain=input connection-state=related action=accept comment=";;; accept related connection packets"
add chain=input connection-state=invalid action=drop comment=";;; drop invalid packets"
add chain=input protocol=tcp dst-port=80 connection-limit=50,0 action=drop comment=";;; limit total http connections to 50"
add chain=input protocol=tcp psd=21,3s,3,1 action=drop comment=";;; detect and drop port scan connections"
add chain=input protocol=tcp connection-limit=3,32 src-address-list=black_list action=tarpit comment=";;; suppress DoS attack"
add chain=input protocol=tcp connection-limit=10,32 action=add-src-to-address-list address-list=black_list address-list-timeout=1d comment=";;; detect DoS attack"
add chain=input dst-address-type=!local action=drop comment=";;; drop all that is not to local"
add chain=input src-address-type=!unicast action=drop comment=";;; drop all that is not from unicast"
add chain=input protocol=icmp action=jump jump-target=ICMP comment=";;; jump to chain ICMP"
add chain=input action=jump jump-target=services comment=";;; jump to chain services"
add chain=input action=log log-prefix="input" comment=";;; LOG"
add chain=input action=drop ;;; comment="drop everything else"
add chain=ICMP protocol=icmp icmp-options=0:0-255 limit=5,5 action=accept comment=";;; 0:0 and limit for 5pac/s"
add chain=ICMP protocol=icmp icmp-options=3:3 limit=5,5 action=accept comment=";;; 3:3 and limit for 5pac/s"
add chain=ICMP protocol=icmp icmp-options=3:4 limit=5,5 action=accept comment=";;; 3:4 and limit for 5pac/s"
add chain=ICMP protocol=icmp icmp-options=8:0-255 limit=5,5 action=accept comment=";;; 8:0 and limit for 5pac/s"
add chain=ICMP protocol=icmp icmp-options=11:0-255 limit=5,5 action=accept comment=";;; 11:0 and limit for 5pac/s"
add chain=ICMP protocol=icmp action=drop comment=";;; Drop everything else"
add chain=services src-address=127.0.0.1 dst-address=127.0.0.1 action=accept comment=";;; accept localhost"
add chain=services protocol=tcp dst-port=20-21 action=accept comment=";;; allow ftp"
add chain=services protocol=tcp dst-port=22 action=accept comment=";;; allow sftp, ssh"
add chain=services protocol=tcp dst-port=23 action=accept comment=";;; allow telnet"
add chain=services protocol=tcp dst-port=80 action=accept comment=";;; allow http, webbox"
add chain=services protocol=tcp dst-port=8291 action=accept comment=";;; Allow winbox"
add chain=services protocol=udp dst-port=20561 action=accept comment=";;; allow MACwinbox"
add chain=services src-address=192.168.194.200 protocol=tcp dst-port=7828 action=accept comment=";;; ..."
add chain=services protocol=tcp dst-port=2000 action=accept comment=";;; Bandwidth server"
add chain=services protocol=udp dst-port=5678 action=accept comment=";;; MT Discovery Protocol"
add chain=services protocol=tcp dst-port=53 action=accept comment=";;; allow DNS request"
add chain=services protocol=udp dst-port=53 action=accept comment=";;; Allow DNS request"
add chain=services protocol=udp dst-port=1701 action=accept comment=";;; allow L2TP"
add chain=services protocol=tcp dst-port=1723 action=accept comment=";;; allow PPTP"
add chain=services protocol=gre action=accept comment=";;; allow PPTP and EoIP"
add chain=services protocol=ipencap action=accept comment=";;; allow IPIP"
add chain=services protocol=udp dst-port=1900 action=accept comment=";;; UPnP"
add chain=services protocol=tcp dst-port=2828 action=accept comment=";;; UPnP"
add chain=services protocol=udp dst-port=67-68 action=accept comment=";;; allow DHCP"
add chain=services protocol=tcp dst-port=8080 action=accept comment=";;; allow Web Proxy"
add chain=services protocol=tcp dst-port=123 action=accept comment=";;; allow NTP"
add chain=services protocol=tcp dst-port=161 action=accept comment=";;; allow SNMP"
add chain=services protocol=tcp dst-port=443 action=accept comment=";;; allow https for Hotspot"
add chain=services protocol=tcp dst-port=1080 action=accept comment=";;; allow Socks for Hotspot"
add chain=services protocol=udp dst-port=500 action=accept comment=";;; allow IPSec connections"
add chain=services protocol=ipsec-esp action=accept comment=";;; allow IPSec"
add chain=services protocol=ipsec-ah action=accept comment=";;; allow IPSec"
add chain=services protocol=tcp dst-port=179 action=accept comment=";;; Allow BGP"
add chain=services protocol=udp dst-port=520-521 action=accept comment=";;; allow RIP"
add chain=services protocol=ospf action=accept comment=";;; allow OSPF"
add chain=services protocol=udp dst-port=5000-5100 action=accept comment=";;; allow BGP"
add chain=services protocol=tcp dst-port=1720 action=accept comment=";;; allow Telephony"
add chain=services protocol=udp dst-port=1719 action=accept comment=";;; allow Telephony"
add chain=services protocol=vrrp action=accept comment=";;; allow VRRP"
add chain=virus protocol=tcp dst-port=135-139 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment=";;; Drop Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment=";;; Drop Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment=";;; Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment=";;; ________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment=";;; ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment=";;; ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment=";;; screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment=";;; hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment=";;; cichlid"
add chain=virus protocol=tcp dst-port=1433-1434 action=drop comment=";;; Worm"
add chain=virus protocol=tcp dst-port=2745 action=drop comment=";;; Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment=";;; Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment=";;; Drop Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment=";;; Drop Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment=";;; Drop MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment=";;; Drop Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment=";;; Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment=";;; Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment=";;; Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment=";;; Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment=";;; Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment=";;; Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment=";;; Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment=";;; Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment=";;; Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment=";;; Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment=";;; Drop PhatBot, Gaobot"
add chain=forward connection-state=established action=accept comment=";;; accept established packets"
add chain=forward connection-state=related action=accept comment=";;; accept related packets"
add chain=forward connection-state=invalid action=drop comment=";;; drop invalid packets"
add chain=forward src-address-type=!unicast action=drop comment=";;; drop all that is not from unicast"
add chain=forward in-interface=internet src-address-list=not_in_internet action=drop comment=";;; drop data from bogon IP's"
add chain=forward in-interface=!internet dst-address-list=not_in_internet action=drop comment=";;; drop data to bogon IP's"
add chain=forward protocol=icmp action=jump jump-target=ICMP comment=";;; jump to chain ICMP"
add chain=forward action=jump jump-target=virus comment=";;; jump to virus chain"
add chain=forward action=accept comment=";;; Accept everything else"
add chain=output connection-state=invalid action=drop comment=";;; drop invalid packets"
add chain=output connection-state=related action=accept comment=";;; accept related packets"
add chain=output connection-state=established action=accept comment=";;; accept established packets"

Port Scanners

/ip firewall filter add chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="Port scanners to list " disabled=no
/ip firewall filter add chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP FIN Stealth scan"
/ip firewall filter add chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/FIN scan"
/ip firewall filter add chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="SYN/RST scan"
/ip firewall filter add chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="FIN/PSH/URG scan"
/ip firewall filter add chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="ALL/ALL scan"
/ip firewall filter add chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w comment="NMAP NULL scan"
/ip firewall filter add chain=input src-address-list="port scanners" action=drop comment="dropping port scanners" disabled=no
But still i have the same messeges , how can i stop this traffic ?
Thks all !
 
User avatar
andrewluck
Forum Veteran
Forum Veteran
Posts: 700
Joined: Fri May 28, 2004 9:05 pm
Location: Norfolk, UK

Fri Mar 24, 2006 8:55 pm

This is a really impressive set of firewall rules. However, my feeling is that you're looking at this from the wrong angle. The single rule that really worries me is this one:
add chain=forward action=accept comment=";;; Accept everything else"
Whatever happened to the prime rule of secure computing - Default Deny?

What you're accepting is that anything you haven't thought of, or, some new attack that comes along is allowed access to your network. This is really proved by your current problem. You're hunting around trying to close a loop hole somewhere; but where? Finding out can be difficult and the damage may already be done.

Start with two rules in the input chain: one that allows management access from your workstation, the other denies everything else. Put one rule in the forward chain: Deny everything.

Then, define the traffic that is ligitimately allowed to cross or enter your router and add rules to allow it.

This will build a far simpler, easier to manage and secure solution.

Regards

Andrew

Who is online

Users browsing this forum: EagleNN, sindy and 115 guests