-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Your Memcached instance may be publicly accessible #211
Comments
TITLE
TL;DR FAQ It is important to disable UDP connections to your Memcached service in order to secure your [DEVICE] from amplification attacks. You can do this by blocking port 11211 which UDP uses in the CODE BLOCK (?)
Change the Then restart:
|
Again, this might be a good one to do an article on! |
Change title: Memcached instance may be publicly accessible |
whoops, thank you |
This isn't really relevant here. Also, it isn't true that UDP is vulnerable to this. The attack used was due to a number of factors, but the tl;dr for context was that you could send X bytes and have the server send X*N bytes to a spoofed address. More context here Anyway, we should probably recommend that they switch to TCP and disable UDP (unless they need UDP for some reason) as the remedy. |
FAQ We recommend disabling UDP connections to your Memcached service in favour of TCP connections to secure your [DEVICE] from amplification attacks. You can do this by blocking port 11211 which UDP uses in the |
Let me rewrite this - Memcached is a popular caching server. By default, Memcached enables TCP and UDP protocols for communication. Early in 2018, an exploit in Memcached's UDP communication was discovered. Using this exploit, an attacker was able to use a publicly exposed Memcached server to relay a payload and attack a 3rd party server/service, leading to large scale attacks across the internet. We recommend disabling UDP connections to your Memcached service in favor of TCP connections to secure your server(s) from these attacks. You can do this by disabling UDP connections in Mamcache'd config file (often |
Your Memcached instance may be accessible remotely. This is likely due to use of a default configuration. Disable UDP connections and traffic by blocking port 11211. Alternatively, reconfigure Memcached to only listen on localhost. ^ does that make sense in its current form? |
Feel free to re-format it. I just wanted to reformat parts of it (e.g calling it a server and not service etc). |
Happy with that. Should we keep the code block separate by the way? Separated in the main text I wrote above but we can merge it into the FAQ if you feel it fits better there |
let's keep the code block in the "FAQ" section as you did.
See above. But let's either update the top block or post a new complete post with all the changes. |
TITLE TL;DR FAQ Memcached is a popular caching server. By default, many Memcached configurations will listen on all interfaces. This may be desirable in some configurations (e.g. when you have other services on the network that needs to talk to Memcached). In that case, we recommend that you create a firewall policy that only allows these servers to access Memcached. If however you only use Memcached locally, we recommend that you reconfigure Memcached to only listen on the loopback (localhost) interface. We also recommend that you disable UDP (and just use TCP) in Memcached as in early in 2018, an exploit in Memcached's UDP communication was discovered. Using this exploit, an attacker was able to use a publicly exposed Memcached server to relay a payload and attack a 3rd party server/service, leading to large scale attacks across the internet. To make these changes, edit your Mamcached's config file (often `/etc/sysconfig/memcached`) and make sure to have the following under your 'OPTIONS' section: ``` * The '-l 127.0.0.1' means that Memcached will only listen on the loopback interface (i.e. only accessible from within the server) When done, restart the server by running: ``` Code Snippet None for now. |
We detected that a Memcached instance on {devices} may be accessible remotely. Consider either blocking port 11211 through the WoTT firewall management tool, or re-configure Memcached to only listen on localhost.
part of #198
The text was updated successfully, but these errors were encountered: