Re: Dealing with infected users (Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-29 Thread Petri Helenius
Vadim Antonov wrote:

It should be pointed put that the ISPs have their share of blame for the
quick-spreading worms, beause they neglected very simple precautions --
such as giving cutomers pre-configured routers or DSL/cable modems with
firewalls disabled by default (instead of the standard end-user, let only
outgoing connections thru configuration), and providing insufficient
information to end-users on configuring these firewalls.
 

And you´re willing to pay all the helpdesk persons helping these people 
to adjust their
configurations to accommodate for KaZaa, BitTorrent, Quake3, Counter 
Strike, etc?

It would be much easier and more centralized if the networking 
interfaces in operating systems
would not expose services by default. But were already went there.

Pete




ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Sean Donelan

On Thu, 28 Aug 2003, Steve Carter wrote:
 The rate-limiters have become more interesting recently, meaning they've
 actually started dropping packets (quite a lot in some cases) because of
 the widespread exploitation of unpatched windows machines.

Yep, the amount of ICMP traffic seems to be increasing on most backbones
due to worm activity.  It probably hasn't exceed HTTP yet, but it is
surpasssing many other protocols.  Some providers have seen ICMP increase
by over 1,000% over the last two weeks.

Unfortunately, the question sometimes becomes which packets do you care
about more?  Ping or HTTP?

Patch your Windows boxes. Get your neighbors to patch their Windows boxes.

Microsoft make a CD so people can fix their Windows machines before they
connect them to the network.




Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Steve Carter

* Sean Donelan said:
 
 On Thu, 28 Aug 2003, Steve Carter wrote:
  The rate-limiters have become more interesting recently, meaning they've
  actually started dropping packets (quite a lot in some cases) because of
  the widespread exploitation of unpatched windows machines.
 
 Yep, the amount of ICMP traffic seems to be increasing on most backbones
 due to worm activity.  It probably hasn't exceed HTTP yet, but it is
 surpasssing many other protocols.  Some providers have seen ICMP increase
 by over 1,000% over the last two weeks.

The results of our data collection is almost unbelievable.  I've had to
have it rechecked multiple times because I had a hard time even groking
the scale.  Like, dude, is your calculator broken?

It appears that the volume is still growing ... even with the widespread
publicity.  Those of us that are sourcing this traffic need to protect
ourselves and the community by rate limiting because the exploited are
not.

I agree with Wayne that we need to be smart (reads: very specific) about
how we rate limit during this event.  When the event is over we can go 
back to just a simple rate limit that protects us in a very general way 
until the next event jumps up.

private message
Yuh, Jay, I changed my tune ... you were right.
/private message

-Steve


Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Rachael Treu

Inline.
On Thu, Aug 28, 2003 at 12:01:16PM -0400, Sean Donelan said something to the effect of:
 
 On Thu, 28 Aug 2003, Steve Carter wrote:
  The rate-limiters have become more interesting recently, meaning they've
  actually started dropping packets (quite a lot in some cases) because of
  the widespread exploitation of unpatched windows machines.

 Yep, the amount of ICMP traffic seems to be increasing on most backbones
 due to worm activity.  It probably hasn't exceed HTTP yet, but it is
 surpasssing many other protocols.  Some providers have seen ICMP increase
 by over 1,000% over the last two weeks.

I fear that all this has been a conspiracy machinated by an amalgam of
coffee purveyors and aspirin/analgesic manufacturers.

This is most definitely true.  I work on GBLX's Internet Security team and 
had the dubious fortune of being the oncall engineer this week.  The sheer 
volume of icmp I've see just as a result of slurping traffic off customer 
interfaces, not peering points, related to security incident reports is 
staggering.

Facing facts, people are _not_ patching their stuff, in spite of pervasive
pleas and warnings from vendors and media geeks.

Many of the infected customers, presenting initially with symptoms of
circuit saturation and latency, are shocked to learn that they are in
effect DoSing themselves, and only then are they even mildly-motivated to 
seek out sub-par OS builds and patch their boxen.  While a rate limit 
doesn't do anything to restore link health to those customers, it prevents 
them from flooding the playground for the rest of us.

Others remain more or less clueless that they're throttling unholy
quantities of icmp (among other things) until a node threatens to go 
unstable and we start filtering and swinging traffic in a flurry of 
damage control, subsequently calling _them_ and asking that the issue be 
investigated.  Having a router reload or an upstream circuit become 
saturated is far more rigorous to the customers downstream than pruning 
back their capacity for icmp.

We are operating in an unusual time, where these solutions may seem less
than elegant, but are appropriate when overall network health and general
responsibility dictate that more aggressive praxes of risk mitigation be 
deployed.  When the din dies down to a more manageable roar, perhaps the 
caps can be re-evaluated.  In the interim, these measures are levied in the
name of customer/non-customer/device protection, and not enacted without
great thought to the impact on our customers and downstreams.

 
 Unfortunately, the question sometimes becomes which packets do you care
 about more?  Ping or HTTP?

Unfortunate ultimatum, but cheers.  It's true.  
 
 Patch your Windows boxes. Get your neighbors to patch their Windows boxes.

Simple, but brilliant.  Please.  

If I could find my friggin fairy dust, I'd conjure up a trojan that went 
out and reloaded infected hosts with a new OS.  Call it *poof*BSD perhaps?  
Just till this thing blows over... ;)

 
 Microsoft make a CD so people can fix their Windows machines before they
 connect them to the network.

And this is a great idea...
 

ymmv,
--ra

-- 
K. Rachael Treu rara at navigo dot com
..Fata viam invenient..
-- I am an employee of, but do not necessarily
   represent herein, Global Crossing, Ltd. --



Dealing with infected users (Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Mike Tancsa


We have been doing that.  During quiet times our Customer Service Reps 
(CSR) are calling infected users telling them

a) Their computer has been compromised. In its current state it can 
potentially be taken over by others or other users can look at the contents 
of their private files etc.
b) It is currently interfering with other users connections.  Particularly 
our DSL users can blast out at a fast enough rate to hamper dialup users.

If the user is not home (often broadband users leave their computers on) 
the CSRs leave a message stating the customer can call in any time they 
like and they will be reactivated. Once doing so, they need to clean their 
machine ASAP-- there are several FREE point and click tools now.

The majority comply and are understanding. I think the key is to emphasize 
that its in their best interest and that we did it for THEIR protection 
(i.e. someone can potentially take over your machine,look at your private 
files, delete things etc etc). Also emphasize that they need to be a 
responsible Internet participant --  e.g. how would they like it if another 
user was hampering their connection because that other user had a virus and 
we didnt get them to clean it up.  Give your CSRs a script or talking 
points to follow and it should be smooth for the most part.

---Mike

At 12:42 PM 28/08/2003 -0700, Dan Hollis wrote:

On Thu, 28 Aug 2003, Rachael Treu wrote:
 Facing facts, people are _not_ patching their stuff, in spite of pervasive
 pleas and warnings from vendors and media geeks.
There need to be more serious consequences for not patching. Like, having
their ports turned down until they decide that patching might not be such
a bad idea after all.
-Dan
--
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: Dealing with infected users (Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Dan Hollis

On Thu, 28 Aug 2003, Mike Tancsa wrote:
 The majority comply and are understanding.

and the rest?

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: Dealing with infected users (Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Mike Tancsa
At 01:57 PM 28/08/2003 -0700, Dan Hollis wrote:
On Thu, 28 Aug 2003, Mike Tancsa wrote:
 The majority comply and are understanding.
and the rest?
There will always be troublesome customers, but the VAST majority have been 
compliant.  If they dont want to comply to something as reasonable as this, 
they will go to my competitors who will then have to deal with the flood of 
abuse hate mail (I am calling the FBI if you dont fix this), retaliatory 
attacks, black listings etc etc... i.e. they will become a headache for my 
competitors.

Other sites who are large and dont necessarily have the resources to 
immediately find and kill the offending host (with sobig.f the headers will 
often show the NETBIOS name of the sending machine so its not THAT hard to 
find), we will add local rules to contain them for now until they have 
their IT consultants clean it up.

But like I said before, give your CSRs a script.  Explain to the customer 
how this is in their best interest... Most people are reasonable.  We have 
all talked to people who say things like, I have had 10 different ISPs and 
none have made me do something like this! I demand... remember to 
ask yourself, why have they gone through 10 different ISPs .

---Mike 



Re: Dealing with infected users (Re: ICMP traffic increasing on most backbones Re: GLBX ICMP rate limiting

2003-08-28 Thread Vadim Antonov


It should be pointed put that the ISPs have their share of blame for the
quick-spreading worms, beause they neglected very simple precautions --
such as giving cutomers pre-configured routers or DSL/cable modems with
firewalls disabled by default (instead of the standard end-user, let only
outgoing connections thru configuration), and providing insufficient
information to end-users on configuring these firewalls.

--vadim