<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP attacks - threshold-based blocks? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22717#M16606</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At this stage, it is wise to get packet captures and share the problem scenario and open the case. The logs would be analysed for the threat pattern and frequency and they can come up with a solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jan 2014 22:16:21 GMT</pubDate>
    <dc:creator>Phoenix</dc:creator>
    <dc:date>2014-01-22T22:16:21Z</dc:date>
    <item>
      <title>NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22712#M16601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Our campus has been getting a lot of NTP DDoS attacks of late.&amp;nbsp; While the simple solution would be to shut it down except for necessary systems, the problem (as per usual in public-sector) is that everyone seems to want to run something that uses it and complains if we start blocking. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the attacks, it's very easy to see the difference between a legitimate NTP query (1 or 2 packets) and an attack.&amp;nbsp;&amp;nbsp; My question is: Is there a way to define a threshold-based filter that will drop or block the attack as with brute-force type attacks?&amp;nbsp; That would solve all of the issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 15:44:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22712#M16601</guid>
      <dc:creator>aaronm</dc:creator>
      <dc:date>2014-01-22T15:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22713#M16602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/12442"&gt;aaronm&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can have a threshold based filter with respect to the sessions. In DOS protection profile we can set the Resource Protection to lets say 10 sessions, any traffic coming more than 10 sessions at a time is blocked and we can see the results in global counters.&lt;/P&gt;&lt;P&gt;This is purely used in scenarios where a specific traffic is bombarded. But if anything less than 10 sessions or 10 new packets it allows.&lt;/P&gt;&lt;P&gt;In the DOS rule we can configure the source and destination zone and source and destination IPs accordingly to narrow down right to the attacker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="dos-res.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11241_dos-res.PNG.png" /&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 18:24:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22713#M16602</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2014-01-22T18:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22714#M16603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm... that might work if I can create a firewall rule to limit such DoS protection to only the NTP traffic - applying that to the campus traffic as a whole would seriously break things.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 18:39:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22714#M16603</guid>
      <dc:creator>aaronm</dc:creator>
      <dc:date>2014-01-22T18:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22715#M16604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the DOS rule we have an option to specify the service. We can provide port 123 for NTP and that should help by not matching all other campus traffic and only NTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 20:15:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22715#M16604</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2014-01-22T20:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22716#M16605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - I was looking into it and that was the approach that I was going to try taking.&amp;nbsp; The catch is, we only want this applied on a per IP basis, not to all traffic using UDP 123, or again, with over 40K devices, that threshold would be overrun very quickly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be better if PAN could define a new brute-force vulnerability for NTP so that it could be setup with a configurable threshold, and then an action be picked as a result.&amp;nbsp; Until that happens though (or if it happens at all) the DoS method may be the only thing I have to use against it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 21:55:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22716#M16605</guid>
      <dc:creator>aaronm</dc:creator>
      <dc:date>2014-01-22T21:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22717#M16606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At this stage, it is wise to get packet captures and share the problem scenario and open the case. The logs would be analysed for the threat pattern and frequency and they can come up with a solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 22:16:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22717#M16606</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2014-01-22T22:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22718#M16607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NTP reflection attacks are occurring frequently these days. The safest approach is lock down who you obtain NTP from (I do this on my border router). Short of that, the other way to approach it is&amp;nbsp; create a threat exception action to block instead of alert:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4470" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;NTP Reserved Mode Denial of Service Vulnerability&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4471" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;ID&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;33273&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4472" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;NTP is prone to a DoS vulnerability while parsing certain crafted NTP requests.The vulnerability is due to the lack of proper checks in the NTP request, leading to an exploitable DoS. An attacker could exploit the vulnerability by sending a crafted NTP request. A successful attack could lead to remote DoS with the privileges of the server.&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4473" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;&lt;IMG class="jiveImage" src="https://ip1.i.lithium.com/9ac01f264987936479f6ff5270295b31dbff5c46/68747470733a2f2f3137322e31362e3136352e3130312f696d616765732f7468726561745f686967682e676966" /&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4474" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;CVE&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;CVE-2009-3563&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4475" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Bugtraq ID&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;37225&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4476" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Vendor ID&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P class="x-form-item" style="margin: 0 0 4px; font-family: tahoma, helvetica, arial, sans-serif; font-size: 11px; color: #222222; background-color: #ebedee;"&gt;&lt;LABEL class="x-form-item-label" for="ext-comp-4477" style="text-align: right !important; padding: 3px 3px 3px 0;"&gt;&lt;STRONG&gt;Reference&lt;/STRONG&gt;&lt;/LABEL&gt;&lt;/P&gt;&lt;DIV class="x-form-element" style="padding: 0 0 0 85px; font-family: Tahoma, Arial, Helvetica, sans-serif;"&gt;&lt;DIV class="x-form-display-field" style="padding: 4px 0 0;"&gt;&lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" style="color: #5396b8;" target="_blank"&gt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563&lt;/A&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 18:13:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22718#M16607</guid>
      <dc:creator>eDub</dc:creator>
      <dc:date>2014-01-27T18:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22719#M16608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...You can define a custom threat signature and specify the time attribute as described.&amp;nbsp; The custom signature can be completely new, or based on combination of existing threat signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/33824"&gt;Re: How to shun/block an IP address for a period of time&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 18:25:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22719#M16608</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2014-01-27T18:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22720#M16609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem with this signature is that it's not what's being triggered in this case.&amp;nbsp; In fact, none of the NTP vulnerabilities were getting triggered.&amp;nbsp; It showed up instead as traffic and application "NTP".&amp;nbsp; Blocking anything but legitimate is easier said than done here - being a university with a lot of scientists and research going on, it may take the security teams weeks or months to determine what is officially needed vs. wanted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 18:40:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22720#M16609</guid>
      <dc:creator>aaronm</dc:creator>
      <dc:date>2014-02-06T18:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: NTP attacks - threshold-based blocks?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22721#M16610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For a custom signature, only ever built one that used existing vulnerabilities.&amp;nbsp; Since those are not triggering in this case, how could I define a new one based simply on the fact that it is recognized as a NTP application?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 18:42:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-attacks-threshold-based-blocks/m-p/22721#M16610</guid>
      <dc:creator>aaronm</dc:creator>
      <dc:date>2014-02-06T18:42:21Z</dc:date>
    </item>
  </channel>
</rss>

