Keith C. Perry on 29 Mar 2018 21:38:57 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Verizon router's security log fills up too frequently


George,

224.0.0.22 is a multicast address (IGMP) so its weird for the typical network to pass that traffic automatically but if you're not using it maybe VZ is (173.49.200.99 is your FIOS address).  Its probably something upstream from your local FIOS network since its inbound to you.  I would just drop that traffic so your logs don't fill up.

The second block... sounds like it is working for Missus computer though so maybe the first packet is triggering a rule that finds the packet invalid before it gets translated?  Seems benign.

The third block... probably more of the same.  The way this router logs things appears to be on the noisier side of things.

I know you are saying you can't just run out and get another router but I would strongly suggest eventually putting in your own router even if its and old computer that you add another NIC to (I know... now I'm saying get another NIC).  One should should never trust the edge of their network to your upstream provider.  The additional advantage of doing this is that you can put in the type of router you want with the resources you need.  You can remove or dumb down the VZ router filter rules and move the bulk of your work to your device.


~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ 
Keith C. Perry, MS E.E. 
Managing Member, DAO Tecrhnologies LLC 
(O) +1.215.525.4165 x2033 
(M) +1.215.432.5167 
www.daotechnologies.com

----- Original Message -----
From: george@georgesbasement.com
To: plug@lists.phillylinux.org
Cc: "George Langford" <george@georgesbasement.com>
Sent: Thursday, March 29, 2018 7:07:44 PM
Subject: [PLUG] Verizon router's security log fills up too frequently

Today I discovered rather belatedly that there is far too much activity
happening in the Security Log of my ActionTec Wireless Router, courtesy
Verizon FIOS. I've had it for a number of years, and in the past I've
never seen the activity that surfaced today when I checked it for no 
good
reason.

The Log File had filled up and stopped recording all the craziness that
has been happening since the Russians started messing around with our 
'Net.

Start rant:
Here's what's been eating up several hours a day for the past few 
months:
http://www.pinthetaleonthedonkey.com. The Russians are working toward a
granddaddy DOS attack. One set of brute force hits on WordPress 
weaknesses
escalated from 22 in a row in December to 44 in January to 89 in 
February;
I'm expecting much worse in the March raw access log ... They are 
perfecting
the timing of HEAD / HTTP requests to get to MyDomain.com at the same 
second
on the clock, with a view towards overwhelming some unsuspecting Windows
users when the Czar hacker activates Port 3389 on the participating 
servers.

Back to the router:

So I saved what there was and restarted the log ... only to be greeted 
with
another filled-up log in a couple of hours ... and again ... and again,
just today. Something has got to be changed.

And it's not the Russians who are leaving their tracks all over my 
router;
OK, maybe a few CloudFlare hits, a couple from Germany, one from 
Israel,one
from France, one Chinese, but the rest are from Google, Amazon, Akamai,
Adobe and lesser known US folks.

But the most hits are nuisance procedural hits purportedly having 
something
to do with the non-existent domain, 224.0.0.22. A Google search reveals
that it's the result of some programmers not coordinating their efforts
between competing applications. That glitch accounts for about 90% of 
the
entries in the Security Log, and they need to get dropped if we can't
make them go away in a less crude fashion.

The ActionTect router gets nice reviews for wireless FIOS, but there is
nowhere near enough storage for the Security Log. I can't just trot down
to MicroCenter and get a better one ...

Here's a snippet for a good 224.0.0.22 example:

Mar 29 16:19:33 2018	Inbound Traffic	Blocked - Spoofing protection	IGMP 
173.49.200.99->224.0.0.22 on eth1[repeated 31 times, last time on Mar 29 
16:20:03 2018]
Mar 29 16:07:46 2018	Firewall Info	Rate Limit	1 messages of type [12] 
Spoofing protection suppressed in 1 second(s)
Mar 29 16:07:45 2018	Inbound Traffic	Blocked - Spoofing protection	IGMP 
173.49.200.99->224.0.0.22 on eth1
Mar 29 16:07:45 2018	Firewall Info	Rate Limit	2 messages of type [12] 
Spoofing protection suppressed in 1 second(s)
Mar 29 16:07:13 2018	Inbound Traffic	Blocked - Spoofing protection	IGMP 
173.49.200.99->224.0.0.22 on eth1[repeated 31 times, last time on Mar 29 
16:07:44 2018]
Mar 29 15:37:14 2018	Firewall Info	Rate Limit	1 messages of type [12] 
Spoofing protection suppressed in 1 second(s)
Mar 29 15:37:13 2018	Inbound Traffic	Blocked - Spoofing protection	IGMP 
173.49.200.99->224.0.0.22 on eth1
Mar 29 15:37:13 2018	Firewall Info	Rate Limit	1 messages of type [12] 
Spoofing protection suppressed in 1 second(s)
Mar 29 15:37:11 2018	Inbound Traffic	Blocked - Spoofing protection	IGMP 
173.49.200.99->224.0.0.22 on eth1
Mar 29 15:37:11 2018	Firewall Info	Rate Limit	1 messages of type [12] 
Spoofing protection suppressed in 1 second(s)

Here's a snippet of some different activity:

Mar 29 17:53:10 2018	Inbound Traffic	Blocked - Packet invalid in 
connection	TCP 65.222.200.75:80->173.49.200.99:64642 on eth1
Mar 29 17:53:06 2018	Outbound Traffic	Blocked - First packet is 
Invalid	TCP 192.168.1.3:64636->23.52.143.66:443 on eth1
Mar 29 17:52:57 2018	Outbound Traffic	Blocked - First packet is 
Invalid	TCP 192.168.1.3:64635->23.52.143.66:443 on eth1
Mar 29 17:52:51 2018	Inbound Traffic	Blocked - Packet invalid in 
connection	TCP 23.52.143.66:443->173.49.200.99:64635 on eth1
Mar 29 17:52:01 2018	Outbound Traffic	Blocked - First packet is 
Invalid	TCP 192.168.1.3:64579->104.25.226.100:443 on eth1
Mar 29 17:45:52 2018	Inbound Traffic	Blocked - Packet invalid in 
connection	TCP 13.33.74.8:80->173.49.200.99:64560 on eth1[repeated 2 
times, last time on Mar 29 17:45:54 2018]
Mar 29 17:42:39 2018	Firewall Info	Rate Limit	1 messages of type [65] 
First packet is Invalid suppressed in 1 second(s)
Mar 29 17:42:38 2018	Outbound Traffic	Blocked - First packet is 
Invalid	TCP 192.168.1.3:64492->104.100.132.85:443 on eth1

The LAN address in the second snippet above is the Missus' laptop.

Here's a short snippet with a CloudFlare connection:

Mar 29 16:56:35 2018	Inbound Traffic	Blocked - Packet invalid in 
connection	TCP 104.16.50.134:443->173.49.200.99:64263 on eth1
Mar 29 16:56:14 2018	Outbound Traffic	Blocked - First packet is 
Invalid	TCP 192.168.1.3:64254->104.16.51.134:443 on eth1

where 104.16.50.134 and 104.16.51.134 is a typical CloudFlare domain 
IPv4
address pairing; but I didn't know the domain name until Google revealed
through Hurricane Electric that the pair represents two of the five IPv4
addresses assigned to peapod.com by the CloudFlare service ... and Mrs. 
L
just made an order through PeaPod for delivery of groceries ... so 
that's
clearly an innocent Firewall Security Log occurrence.

Is the Actiontec router just being paranoid ?

Thanks,
George Langford
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug