Re: Worms versus Bots

2004-05-13 Thread Paul Jakma

On Tue, 11 May 2004, Chris Woodfield wrote:

 I stand corrected, they're out there. I'm advised that 3com has a
 on-NIC firewall product as well.
 
 However, at $299 and $329 respectively, I don't anticipate wide
 adoption in the consumer market...

This is all silly.. there's no reason operating systems cant be
(collectively) immune to automated worms.

regards,
-- 
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
Indomitable in retreat; invincible in advance; insufferable in victory.
-- Winston Churchill, on General Montgomery


RE: Worms versus Bots

2004-05-12 Thread Michel Py

 Chris Woodfield wrote:
 I stand corrected, they're out there. I'm advised that
 3com has a on-NIC firewall product as well.
 However, at $299 and $329 respectively, I don't anticipate
 wide adoption in the consumer market...

No danger, as it is not worth jack as a standalone product; requires a
centralized server to tell it what to do. Not for the consumer market in
the first place.

Even for the corporate market, $300 + the server + managing the whole
enchilada == to much $$$ per port.

Michel.




RE: Worms versus Bots

2004-05-12 Thread Michel Py

 Jonathan M. Slivko
 Uh... they have. It's called a Snapgear card :)

Same as the 3com card, this is not for the consumer market. First, the
consumer is generally afraid of opening the PC. Second, it costs many
times more than a Linksys or other el-cheapo external box.

Michel.




Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
I think running two separate computers is a wee bit of overkill...

A better solution would be a NIC with a built-in SI firewall...manageable from a host 
app, but physically separate from the OS running on the PC.

-C

On Thu, May 06, 2004 at 09:49:37PM +0300, Petri Helenius wrote:
 
 [EMAIL PROTECTED] wrote:
 
 
 you can easily fit an entire router into a PC's slimline
 case and the router can include a complete SI Firewall
 capability. The PC BIOS will allow the initial SI Firewall
 config to be done before booting the PC.
  
 
 
 They got to it before you did; http://www.giwano.com/
 
 Pete
 


pgp0.pgp
Description: PGP signature


Re: Worms versus Bots

2004-05-11 Thread Valdis . Kletnieks
On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:

 A better solution would be a NIC with a built-in SI firewall...manageable from a host
 app, but physically separate from the OS running on the PC.

Gaak.  No. ;)

What's the point of a firewall, if the first piece of malware that does manage
to sneak in (via a file-sharing program, or a webpage that installs malware, or
an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
tell the firewall Shield DOWN!?



pgp0.pgp
Description: PGP signature


Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
Simple solution...build the on-NIC firewall to not use uPnP, or at least require 
a password before changing rulesets. :)

Seriously, this is such a stupidly simple solution that I'm amazed no one's attempted 
to make a product out of it yet. 

-C

On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
 On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
 
  A better solution would be a NIC with a built-in SI firewall...manageable from a 
  host
  app, but physically separate from the OS running on the PC.
 
 Gaak.  No. ;)
 
 What's the point of a firewall, if the first piece of malware that does manage
 to sneak in (via a file-sharing program, or a webpage that installs malware, or
 an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
 tell the firewall Shield DOWN!?
 




pgp0.pgp
Description: PGP signature


RE: Worms versus Bots

2004-05-11 Thread Jonathan M. Slivko

Uh... they have. It's called a Snapgear card :)
-- Jonathan

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Chris Woodfield
Sent: Tuesday, May 11, 2004 12:42 PM
To: [EMAIL PROTECTED]
Cc: Petri Helenius; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Worms versus Bots

Simple solution...build the on-NIC firewall to not use uPnP, or at least
require 
a password before changing rulesets. :)

Seriously, this is such a stupidly simple solution that I'm amazed no one's
attempted 
to make a product out of it yet. 

-C

On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
 On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
 
  A better solution would be a NIC with a built-in SI
firewall...manageable from a host
  app, but physically separate from the OS running on the PC.
 
 Gaak.  No. ;)
 
 What's the point of a firewall, if the first piece of malware that does
manage
 to sneak in (via a file-sharing program, or a webpage that installs
malware, or
 an ooh! Shiny! email attachment) just does the network Plug-N-Play call
to
 tell the firewall Shield DOWN!?
 





Re: Worms versus Bots

2004-05-11 Thread Rick Ernst


While following the thread, I did a bit of Googling, then browsing 3Com's
site:

http://www.3com.com/products/en_US/detail.jsp?tab=featurespathtype=purchasesku=3CRFW200B

On-NIC firewall w/remote management.


On Tue, 11 May 2004, Chris Woodfield wrote:

:Simple solution...build the on-NIC firewall to not use uPnP, or at least require
:a password before changing rulesets. :)
:
:Seriously, this is such a stupidly simple solution that I'm amazed no one's attempted
:to make a product out of it yet.
:
:-C
:
:On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
: On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
:
:  A better solution would be a NIC with a built-in SI firewall...manageable from a 
host
:  app, but physically separate from the OS running on the PC.
:
: Gaak.  No. ;)
:
: What's the point of a firewall, if the first piece of malware that does manage
: to sneak in (via a file-sharing program, or a webpage that installs malware, or
: an ooh! Shiny! email attachment) just does the network Plug-N-Play call to
: tell the firewall Shield DOWN!?
:
:
:
:



Re: Worms versus Bots

2004-05-11 Thread Chris Woodfield
I stand corrected, they're out there. I'm advised that 3com has a on-NIC firewall 
product as well.

However, at $299 and $329 respectively, I don't anticipate wide adoption in the 
consumer market...

-C

On Tue, May 11, 2004 at 12:49:05PM -0400, Jonathan M. Slivko wrote:
 
 Uh... they have. It's called a Snapgear card :)
 -- Jonathan
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Chris Woodfield
 Sent: Tuesday, May 11, 2004 12:42 PM
 To: [EMAIL PROTECTED]
 Cc: Petri Helenius; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: Worms versus Bots
 
 Simple solution...build the on-NIC firewall to not use uPnP, or at least
 require 
 a password before changing rulesets. :)
 
 Seriously, this is such a stupidly simple solution that I'm amazed no one's
 attempted 
 to make a product out of it yet. 
 
 -C
 
 On Tue, May 11, 2004 at 12:21:29PM -0400, [EMAIL PROTECTED] wrote:
  On Tue, 11 May 2004 11:38:33 EDT, Chris Woodfield said:
  
   A better solution would be a NIC with a built-in SI
 firewall...manageable from a host
   app, but physically separate from the OS running on the PC.
  
  Gaak.  No. ;)
  
  What's the point of a firewall, if the first piece of malware that does
 manage
  to sneak in (via a file-sharing program, or a webpage that installs
 malware, or
  an ooh! Shiny! email attachment) just does the network Plug-N-Play call
 to
  tell the firewall Shield DOWN!?
  
 
 
 


pgp0.pgp
Description: PGP signature


Re: Worms versus Bots

2004-05-06 Thread Michael . Dillon

 Microsoft is expected to recommend that the average Longhorn PC 
feature a
 dual-core CPU running at 4 to 6GHz; a minimum of 2 gigs of RAM; up to a
 terabyte of storage; a 1 Gbit, built-in, Ethernet-wired port and an 
802.11g
 wireless link; and a graphics processor that runs three times fasterthan 
those
 on the market today.

How about a PC that has *NO* externally accessible network 
connectivity, not even wireless. But it does have an internal
100baseTx Ethernet port that uses a non-standard connector.
And it also includes a router unit running off the same
power supply as the PC but otherwise completely independent.
This router is connected to the non-standard Ethernet
interface of the PC and supplies 2 externally accessible 
Ethernet ports and an 802.11g wireless capability. The
components for this stuff are small enough these days that
you can easily fit an entire router into a PC's slimline
case and the router can include a complete SI Firewall
capability. The PC BIOS will allow the initial SI Firewall
config to be done before booting the PC.

And even if there is an SI Firewall on the broadband
router serving the home, it's still worthwhile to
protect Mom's PC from worm infestations brought into
the home by junior's unsafe Internet practices.

I know Microsoft would hate the idea of a Windows
PC running Linux on an in-box firewall router
but it seems like poetic justice in a way.

--Michael Dillon


Re: Worms versus Bots

2004-05-06 Thread Iljitsch van Beijnum
On 5-mei-04, at 0:26, Rob Nelson wrote:
If the person doesn't continue to do acls/nat/firewalls, they'll just 
get infected after the next hole is discovered. And yes, there are 
plenty of holes that a firewall/nat box won't fix. Still, better than 
the user only doing Windows Update on the day of install and never 
having a firewall...
I object to the idea that requiring a software firewall inside a host 
is a reasonable thing to do. Why on earth would I want to run an 
insecure service and then have a filter to keep it from being used? 
Either I really want to run the service, and then the firewall gets in 
the way, or I don't need the service to be reachable, so I shouldn't 
run it. System services should only be available over the loopback 
address. Now obviously this is way too simple for some OS builders, but 
we shouldn't accept their ugly hacks as best current practice.



Re: Worms versus Bots

2004-05-06 Thread Valdis . Kletnieks
On Thu, 06 May 2004 11:45:23 +0200, Iljitsch van Beijnum said:
 I object to the idea that requiring a software firewall inside a host 
 is a reasonable thing to do. Why on earth would I want to run an 
 insecure service and then have a filter to keep it from being used?

You object to it, I object to it... but the fact remains that 95% of the
user-accessible CPUs (not counting the embedded market) are running software
that you have to do unreasonable things in order to make it anywhere near safe
to use

 Either I really want to run the service, and then the firewall gets in 
 the way, or I don't need the service to be reachable, so I shouldn't 
 run it. System services should only be available over the loopback 
 address. Now obviously this is way too simple for some OS builders, but 
 we shouldn't accept their ugly hacks as best current practice.

Best Current Practice is *so* divergent from Currently Deployed Practice
that there's little or no common ground.




pgpSVKairOayc.pgp
Description: PGP signature


RE: Worms versus Bots

2004-05-06 Thread David Schwartz


 On Thu, 6 May 2004 [EMAIL PROTECTED] wrote:

  connectivity, not even wireless. But it does have an internal
  100baseTx Ethernet port that uses a non-standard connector.
  And it also includes a router unit running off the same
  power supply as the PC but otherwise completely independent.

 Urg, a horrible idea. Why not just make the software on the host
 secure?

Because then you would have to limit the ability to modify the software to
only those trusted not to affect network security. It's the same answer as
the answer to why not run everything as root?

DS



Re: Worms versus Bots

2004-05-06 Thread Petri Helenius
[EMAIL PROTECTED] wrote:
you can easily fit an entire router into a PC's slimline
case and the router can include a complete SI Firewall
capability. The PC BIOS will allow the initial SI Firewall
config to be done before booting the PC.
 

They got to it before you did; http://www.giwano.com/
Pete


Re: Worms versus Bots

2004-05-05 Thread Matthew Crocker

Its not manufacturers who did not caught up (in fact they did and offer
very inexpensive personal dsl routers goes all the way to $20 range), 
its
DSL providers who still offer free dsl modem (device at least twice 
more
expensive then router) and free network card and complex and 
instructions
on how to set this all up on each different type of pc. No clue at all
that it would be only very marginally more expensive for them to 
integrate
features of such small nat router into dsl modem and instead of 
offering
PPPoverEthernet it could just offer NAT and DHCP and make it so much 
simpler
for many of those lusers with only light computer skills to set this 
all up.

Agreed,
 We require a NAT device or true firewall on all DSL customer 
connections.  We sell cheap Linksys boxes to customers or they can 
upgrade to a SonicWall.  We don't use an Integrated modem/router 
because most of them are junk.

You won't find a single Windows/Linux/Mac machine directly connected to 
our DSL network.   I still like PPPoE for customer authentication 
because I can place individual packet filters or re-assign users to 
different contexts based on username/password authentication.  
PPPoE/NAT is a good combination.  Couple that with 3 levels of virus 
scanning on our mail server has reduced the effects of virus and worm 
spread inside the networks we control.  We still get viruses  worms to 
hit but it is at a more manageable rate.  We are not a large provider 
by any means but I try my hardest to provide a solid network and 
protect the Internet from my users as much as possible.  If only the 
users would not shop solely on price I would be all set :/

-Matt

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]



RE: Worms versus Bots

2004-05-05 Thread Michel Py

 Matthew Crocker wrote:
 We require a NAT device or true firewall on all DSL
 customer connections. We sell cheap Linksys boxes
 to customers or they can upgrade to a SonicWall.

This makes a lot of sense to me. It's not a
silver bullet, but it does help.

 I still like PPPoE for customer authentication
 because I can place individual packet filters or
 re-assign users to different contexts based on
 username/password authentication. PPPoE/NAT is a
 good combination.

Tends to be a non-issue now, but it's a lot easier to deal with PPPoE on
the Linksys than have the customer install a more or less crummy PPPoE
client on their PC. The cost of dealing with one customer that trashed
their PC installing an early PPPoE client (with the help of helpdesk :-(
is worth ten Linksys.

Michel.



Re: Worms versus Bots

2004-05-05 Thread Jeff Workman

--On Wednesday, May 05, 2004 6:04 AM -0400 Matthew Crocker 
[EMAIL PROTECTED] wrote:

We have all been through this before.  Linux out of the box is generally
no more secure than Windows.  Linux can also be misconfigured and hacked.
The reason why you don't see as many linux virus/worms is because there
aren't as many linux desktops.  Once Linux becomes a real player in the
residential desktop OS market you'll see more and more worms/viruses
running around because of it.  Now, I love Linux,  I have 30 linux
servers in production but it isn't the be all, end all to mass user
security.
In the past this may have been true, it's been my experience that most 
modern Linux distributions have adopted (more or less) the approach that 
OpenBSD has: Leave services turned off by default. In fact, a typical 
RedHat workstation installation goes a step further by not even installing 
a lot of services by default.  Sure, Joe Sixpack can still install 
everything and uncomment everything from /etc/inetd.conf[1] and get himself 
pwned, but I don't think we have to worry much about your average computer 
user doing this.

-J
[1] Actually since RedHat uses xinetd, it involves a little more work to 
turn _everything_ on.

--
Jeff Workman | [EMAIL PROTECTED] | http://www.pimpworks.org


RE: Worms versus Bots

2004-05-04 Thread Edward B. Dreger

MP Date: Mon, 3 May 2004 20:53:50 -0700
MP From: Michel Py


MP  but in our ISP office I setup new win2000 servers and first
MP  thing I do is download all the patches. I've yet to see the
MP  server get infected in the 20-30 minutes it takes to finish
MP
MP It can happen in 5 or 10 minutes (I've seen it) but only if
MP all of the following conditions are met simultaneously:

I've not confirmed, but a client told us that some MS patches are
carried by Akamai.


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



RE: Worms versus Bots

2004-05-04 Thread William S. Duncanson

Until recently, I believe that Microsoft's download servers were managed by
Akamai.

-- 
William S. Duncanson
[EMAIL PROTECTED]  

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Edward B. Dreger
 Sent: Tuesday, May 04, 2004 2:23
 To: Michel Py
 Cc: william(at)elan.net; Rob Thomas; NANOG
 Subject: RE: Worms versus Bots
 
 
 MP Date: Mon, 3 May 2004 20:53:50 -0700
 MP From: Michel Py
 
 
 MP  but in our ISP office I setup new win2000 servers and first
 MP  thing I do is download all the patches. I've yet to see the
 MP  server get infected in the 20-30 minutes it takes to finish
 MP
 MP It can happen in 5 or 10 minutes (I've seen it) but only if
 MP all of the following conditions are met simultaneously:
 
 I've not confirmed, but a client told us that some MS patches are
 carried by Akamai.
 
 
 Eddy
 --
 EverQuick Internet - http://www.everquick.net/
 A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
 Bandwidth, consulting, e-commerce, hosting, and network building
 Phone: +1 785 865 5885 Lawrence and [inter]national
 Phone: +1 316 794 8922 Wichita
 _
   DO NOT send mail to the following addresses :
   [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
 Sending mail to spambait addresses is a great way to get blocked.
 



RE: Worms versus Bots

2004-05-04 Thread Eric Krichbaum

True, but this isn't just an XP issue.  Look at how many ppl are still
infected with Code Red/Nimda/Slammer/etc.  A Windows 2000 box doesn't
fair any better.  Heck, I still see Happy99.


Eric


-Original Message-
From: Buhrmaster, Gary [mailto:[EMAIL PROTECTED] 
Sent: Monday, May 03, 2004 11:28 PM
To: Eric Krichbaum; [EMAIL PROTECTED]
Subject: RE: Worms versus Bots

Microsoft has said Windows XP SP2 will have the firewall turned on by
default, and that they have considered
reissuing the installation CD's such that a new installation will have
the firewall enabled to deal with just this problem.  I do not know the
current state of the consideration, but to me it seems reasonable that
Microsoft should at least make the offer of a new CD (to anyone who has
a valid XP license key?)  No, many people will not request a new CD, but
then many people never apply patches either.  I think this is a horse
and water problem.  

Gary 

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf 
 Of Eric Krichbaum
 Sent: Monday, May 03, 2004 8:13 PM
 To: [EMAIL PROTECTED]
 Subject: FW: Worms versus Bots
 
 
 I see times more typically in the 5 - 10 second range to infection.  
 As a test, I unprotected a machine this morning on a single T1 to get 
 a sample.  8 seconds.  If you can get in 20 minutes of downloads 
 you're luckier than most.
 
 Eric
 
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf 
 Of william(at)elan.net
 Sent: Monday, May 03, 2004 11:49 PM
 To: Sean Donelan
 Cc: Rob Thomas; NANOG
 Subject: Re: Worms versus Bots
 
 
 On Mon, 3 May 2004, Sean Donelan wrote:
 
  On Mon, 3 May 2004, Rob Thomas wrote:
   ] Just because a machine has a bot/worm/virus that didn't
 come with
   a ] rootkit, doesn't mean that someone else hasn't had their way
 with it.
  
   Agreed.
  
  Won't help.  What's the first thing people do after
 re-installing the
  operating system (still have all the original CDs and keys
 and product
 
  activation codes and and and)? Connect to the Internet to
 download the
 
  patches. Time to download patches 60+ minutes.
  Time to  infection 5 minutes. 
 
 Its possible its a problem on dialup, but in our ISP office I setup 
 new win2000 servers and first thing I do is download all the patches. 
 I've yet to see the server get infected in the 20-30 minutes it takes 
 to finish it
 (Note: I also disable IIS just in case until everything is patched..).
 
 Similarly when settting up computers for several of my relatives (all 
 have dsl) I've yet to see any infection before all updates are 
 installed.
 
 Additional to that many users have dsl router or similar device and 
 many such beasts will provide NATed ip block and act like a firewall 
 not allowing outside servers to actually connect to your home 
 computer.
 On this point it would be really interested to see what percentage of 
 users actually have these routers and if decreasing speed of 
 infections by new virus (is there real numbers to show it decreased?) 
 have anything to do with this rather then people being more carefull 
 and using antivirus.
 
 Another option if you're really afraid of infection is to setup proxy 
 that only allows access to microsoft ip block that contains windows 
 update servers
 
 And of course, there is an even BETTER OPTION then all the above - 
 STOP USING WINDOWS and switch to Linux or Free(Mac)BSD ! :)
 
  Patches are Microsoft's
  intellectual property and can not be distributed by anyone without 
  Microsoft's permission.
 I don't think this is quite true. Microsoft makes available all 
 patches as indidual .exe files. There are quite many of these updates 
 and its really a pain to actually get all of them and install updates 
 manually.
 But I've never seen written anywhere that I can not download these 
 .exe files and distribute it inside your company or to your friends as

 needed to fix the problems these patches are designed for.
  
  The problem with Bots is they aren't always active.  That
 makes them
  difficult to find until they do something.
 As opposed to what, viruses?
 Not at all! Many viruses have period wjhen they are active and 
 afterwards they go into sleep mode and will not active until some 
 other date!
 
 Additionally bot that does not immediatly become active is good thing 
 because of you do weekly or monthly audits (any many do it like that) 
 you may well find it this way and deal with it at your own time, 
 rather then all over a sudden being awaken 3am and having to clean up 
 infected system.
 
 --
 William Leibzon
 Elan Networks
 [EMAIL PROTECTED]
 
 
 



Re: Worms versus Bots

2004-05-04 Thread Stephen J. Wilcox

On Mon, 3 May 2004, william(at)elan.net wrote:

 Its possible its a problem on dialup, but in our ISP office I setup new 
 win2000 servers and first thing I do is download all the patches. I've yet 
 to see the server get infected in the 20-30 minutes it takes to finish it
 (Note: I also disable IIS just in case until everything is patched..). 

The frequency of scans is such that I'd say you have been lucky. 

Some worms also weight scans by IP (ie they can the local /16 more than the 
local /8 more than the /0).. in which case if you're a large ISP dialup 
customer you stand a higher chance of infection 

Steve




Re: Worms versus Bots

2004-05-04 Thread chuck goolsbee

  In other words: if one is stupid, one gets worm'ed or bot'ed.
However, up to 90% of the users *are* stupid:
http://www.silicon.com/software/security/0,39024655,39118228,00.htm
Any network security scheme that fails to either (a) lower the stupidity rate
or (b) deliver a system that will protect that 90% from themselves is doomed.

There's only so much stupidity you can compensate for;
there comes a point where you compensate for so much
stupidity that it starts to cause problems for the
people who actually think in a normal way.
--Bill Dickson, digital.forest tech support
Which leads to the logical conclusion:
We may be looking at a move back towards the WebTV appliance model (which
would thrill the media conglomerates to no end).
=)
Seriosuly though, the Internet might be a better place for it. After 
all, 90% of those stupid people just want email and HTTP.

--chuck



Re: Worms versus Bots

2004-05-04 Thread Laurence F. Sheldon, Jr.
chuck goolsbee wrote:
However, up to 90% of the users *are* stupid:

Seriosuly though, the Internet might be a better place for it. After 
all, 90% of those stupid people just want email and HTTP.
Do we have a pointer to a rigorous study that indicates either
assertion?
Or is it possible there are other explanations?
What will be do when they figure out that paying us to let them hurt
themselves is a sub-optimal use of their money?
--
Requiescas in pace o email
Ex turpi causa non oritur actio
http://members.cox.net/larrysheldon/



Re: Worms versus Bots

2004-05-04 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Laurence F. Sheldon, Jr. writes:

chuck goolsbee wrote:

 However, up to 90% of the users *are* stupid:


 Seriosuly though, the Internet might be a better place for it. After 
 all, 90% of those stupid people just want email and HTTP.

Do we have a pointer to a rigorous study that indicates either
assertion?

Or is it possible there are other explanations?


Don Norman has argued quite eloquently that it's a technology and human 
factors failure -- see, for example,
http://www.interesting-people.org/archives/interesting-people/200312/msg00105.html
(reprinted from RISKS Digest).

Now, I'm not saying that it's easy to get things like this right, and 
I've argued loudly against the notion that auto-patching is a sane 
approach.  But if we deny that there's a problem except for stupid 
people, we're not likely to find a solution.


--Steve Bellovin, http://www.research.att.com/~smb




Re: Worms versus Bots

2004-05-04 Thread Laurence F. Sheldon, Jr.
Steven M. Bellovin wrote:

However, up to 90% of the users *are* stupid:

Or is it possible there are other explanations?
Don Norman has argued quite eloquently that it's a technology and human 
factors failure -- see, for example,
http://www.interesting-people.org/archives/interesting-people/200312/msg00105.html
(reprinted from RISKS Digest).

Now, I'm not saying that it's easy to get things like this right, and 
I've argued loudly against the notion that auto-patching is a sane 
approach.  But if we deny that there's a problem except for stupid 
people, we're not likely to find a solution.
That last sentence is the point I was trying to get to.
After all, nearly half the people here are below the average for
intelligence.
--
Requiescas in pace o email
Ex turpi causa non oritur actio
http://members.cox.net/larrysheldon/



Re: Worms versus Bots

2004-05-04 Thread chuck goolsbee
At 4:19 PM -0500 5/4/04, Laurence F. Sheldon, Jr. wrote:
chuck goolsbee wrote:
However, up to 90% of the users *are* stupid:
I didn't say that, I only quoted (Valdis Kletnieks) it... to which I 
replied that compensating for stupidity is a zero-sum game.


Seriosuly though, the Internet might be a better place for it. 
After all, 90% of those stupid people just want email and HTTP.
Do we have a pointer to a rigorous study that indicates either
assertion?
First of all, I was disagreeing with Valdis' assessment of 
stupidity... a more accurate term would be non-technical.

I have no rigorous study to point to sorry. But I will say virtually 
all the home users I have encountered are running Windows for the 
purpose of getting email and using the Web. That machine is usually 
in some unprotected, or already compromised state. I make 
similar/same suggestions to them that have already been stated here:
Nuke/pave, enable what security features are available in the OS, get 
a firewall, NAT, etc etc.

The prescription seems to be viewed to be as difficult as the disease 
it cures. Zero-sum.


So maybe they WOULD be better with a WebTV model.
Or a Macintosh.

Or is it possible there are other explanations?
Perhaps. I'm just reporting what I am seeing.

What will be do when they figure out that paying us to let them hurt
themselves is a sub-optimal use of their money?
How is WebTV doing these days? Since it is now Microsoft can their 
boxen get rooted/zombied/botted now too? I'll admit I never paid too 
much attention to WebTV.

Perhaps there is a market for safe Internet access... I don't know. 
But I suspect the barrier to entry is either making it work with the 
dominant platform, or asking the market take the leap to another 
platform. Both are unlikely. What I do know is that the dominant 
platform is inherently insecure, and many of its users, those 
non-technical folks I referred to... they seem to be mostly unaware 
of the danger they pose to themselves and everyone else on the 
Network.

--chuck



Re: Worms versus Bots

2004-05-03 Thread Rob Nelson
At 11:04 PM 5/2/2004, Sean Donelan wrote:
The antivirus vendors are bemoaning the fact the Sasser worm has been
slow to spread.  On the other hand, most of the vulnerable computers
seem to have already been taken over by one or more Bots days or weeks
before the worms arrived.
Other than the obvious, don't let a bot on get on your computer in
the first place, are there any opinions about the best anti-bot tools
for naive computer users?  The major virus vendors seem to be having
a bit of trouble dealing with bots, frequently recommending  manual
editing of files and use of regedit.  There is also a much longer
delay between the apperance of a new bot and updates to antivirus
packages.
One of my concerns is that it's easy to download an anti-virus package 
which will most likely delete (it seems that unless it's a VBA macro virus 
the files can never be cleaned!) some of the 100% worm or virus files. The 
trojan programs, bots, and spyware stick around. It would be a wonderful 
program that scanned for and cleaned up BOTH virus and bot files...

Rob Nelson
[EMAIL PROTECTED]


Re: Worms versus Bots

2004-05-03 Thread Mike Lewinski
Sean Donelan wrote:
Other than the obvious, don't let a bot on get on your computer in
the first place, are there any opinions about the best anti-bot tools
for naive computer users?  The major virus vendors seem to be having
a bit of trouble dealing with bots, frequently recommending  manual
editing of files and use of regedit.  There is also a much longer
delay between the apperance of a new bot and updates to antivirus
packages.
I personally stick with the BCP backup, reformat and reinstall from 
your original media. That goes for worms and bots.

Just because a machine has a bot/worm/virus that didn't come with a 
rootkit, doesn't mean that someone else hasn't had their way with it.

Then again, I've seen businesses who had sensitive client financial data 
on compromised systems completely ignore this advice, so it's generally 
given without much hope, esp. where the stakes are lower.


Re: Worms versus Bots

2004-05-03 Thread Rob Thomas

Hi, NANOGers.

] Just because a machine has a bot/worm/virus that didn't come with a
] rootkit, doesn't mean that someone else hasn't had their way with it.

Agreed.

A growing trend in the 0wnage category is the installation of
multiple bots on a single host.  This isn't intentional, but a
result of the multiple infection vectors bots employ.  Bot01
goes after open Win2K shares (TCP 445), and Bot02 comes along
and enters through Kuang2 (TCP 17300).

One of the more popular bots has at least 13 distinct scan and
sploit methods.  WebDav, NetBios, MSSQL, Beagle, Kuang2, and
the list goes on.

The record I've seen thus far was a host with 14 distinct and
active bots on it.  I'm guessing the LEDs on that cable modem
never blinked.

One bot, Coldlife, actually took advantage of this trend.  It
would hunt for certain bot configuration files on the host it
infected, and report the contents to the Coldlife botherd.
Ka-ching, another botnet stolen.  Things have evolved in a
distributed manner from this feature.

Thanks,
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);



Re: Worms versus Bots

2004-05-03 Thread Sean Donelan

On Mon, 3 May 2004, Rob Thomas wrote:
 ] Just because a machine has a bot/worm/virus that didn't come with a
 ] rootkit, doesn't mean that someone else hasn't had their way with it.

 Agreed.

Won't help.  What's the first thing people do after re-installing
the operating system (still have all the original CDs and keys and
product activation codes and and and)?

Connect to the Internet to download the patches. Time to download patches
60+ minutes.  Time to infection 5 minutes.  Patches are Microsoft's
intellectual property and can not be distributed by anyone without
Microsoft's permission.

Ok, so you order Microsoft's patch CD.  Unfortunately it only includes
patches through October 2003.

Microsoft is selling over 10 million Windows licenses every month.
Patches not included.


 The record I've seen thus far was a host with 14 distinct and
 active bots on it.  I'm guessing the LEDs on that cable modem
 never blinked.

The problem with Bots is they aren't always active.  That makes them
difficult to find until they do something.



Re: Worms versus Bots

2004-05-03 Thread william(at)elan.net

On Mon, 3 May 2004, Sean Donelan wrote:

 On Mon, 3 May 2004, Rob Thomas wrote:
  ] Just because a machine has a bot/worm/virus that didn't come with a
  ] rootkit, doesn't mean that someone else hasn't had their way with it.
 
  Agreed.
 
 Won't help.  What's the first thing people do after re-installing
 the operating system (still have all the original CDs and keys and
 product activation codes and and and)? Connect to the Internet to 
 download the patches. Time to download patches 60+ minutes.  
 Time to  infection 5 minutes. 

Its possible its a problem on dialup, but in our ISP office I setup new 
win2000 servers and first thing I do is download all the patches. I've yet 
to see the server get infected in the 20-30 minutes it takes to finish it
(Note: I also disable IIS just in case until everything is patched..). 

Similarly when settting up computers for several of my relatives (all 
have dsl) I've yet to see any infection before all updates are installed.

Additional to that many users have dsl router or similar device and many 
such beasts will provide NATed ip block and act like a firewall not 
allowing outside servers to actually connect to your home computer.
On this point it would be really interested to see what percentage of 
users actually have these routers and if decreasing speed of infections by 
new virus (is there real numbers to show it decreased?) have anything to 
do with this rather then people being more carefull and using antivirus.

Another option if you're really afraid of infection is to setup proxy that
only allows access to microsoft ip block that contains windows update servers

And of course, there is an even BETTER OPTION then all the above -
STOP USING WINDOWS and switch to Linux or Free(Mac)BSD ! :)

 Patches are Microsoft's
 intellectual property and can not be distributed by anyone without
 Microsoft's permission.
I don't think this is quite true. Microsoft makes available all patches as 
indidual .exe files. There are quite many of these updates and its really 
a pain to actually get all of them and install updates manually. But I've 
never seen written anywhere that I can not download these .exe files and 
distribute it inside your company or to your friends as needed to fix the 
problems these patches are designed for. 
 
 The problem with Bots is they aren't always active.  That makes them
 difficult to find until they do something.
As opposed to what, viruses?
Not at all! Many viruses have period wjhen they are active and afterwards
they go into sleep mode and will not active until some other date!

Additionally bot that does not immediatly become active is good thing 
because of you do weekly or monthly audits (any many do it like that) you 
may well find it this way and deal with it at your own time, rather then 
all over a sudden being awaken 3am and having to clean up infected system.

-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



RE: Worms versus Bots

2004-05-03 Thread Buhrmaster, Gary

Microsoft has said Windows XP SP2 will have the firewall
turned on by default, and that they have considered
reissuing the installation CD's such that a new installation
will have the firewall enabled to deal with just this
problem.  I do not know the current state of the 
consideration, but to me it seems reasonable that
Microsoft should at least make the offer of a new CD
(to anyone who has a valid XP license key?)  No, many
people will not request a new CD, but then many people
never apply patches either.  I think this is a horse 
and water problem.  

Gary 

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Eric Krichbaum
 Sent: Monday, May 03, 2004 8:13 PM
 To: [EMAIL PROTECTED]
 Subject: FW: Worms versus Bots
 
 
 I see times more typically in the 5 - 10 second range to 
 infection.  As
 a test, I unprotected a machine this morning on a single T1 to get a
 sample.  8 seconds.  If you can get in 20 minutes of downloads you're
 luckier than most.
 
 Eric
 
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of
 william(at)elan.net
 Sent: Monday, May 03, 2004 11:49 PM
 To: Sean Donelan
 Cc: Rob Thomas; NANOG
 Subject: Re: Worms versus Bots
 
 
 On Mon, 3 May 2004, Sean Donelan wrote:
 
  On Mon, 3 May 2004, Rob Thomas wrote:
   ] Just because a machine has a bot/worm/virus that didn't 
 come with 
   a ] rootkit, doesn't mean that someone else hasn't had their way
 with it.
  
   Agreed.
  
  Won't help.  What's the first thing people do after 
 re-installing the 
  operating system (still have all the original CDs and keys 
 and product
 
  activation codes and and and)? Connect to the Internet to 
 download the
 
  patches. Time to download patches 60+ minutes.
  Time to  infection 5 minutes. 
 
 Its possible its a problem on dialup, but in our ISP office I 
 setup new
 win2000 servers and first thing I do is download all the patches. I've
 yet to see the server get infected in the 20-30 minutes it takes to
 finish it
 (Note: I also disable IIS just in case until everything is 
 patched..). 
 
 Similarly when settting up computers for several of my relatives (all
 have dsl) I've yet to see any infection before all updates are
 installed.
 
 Additional to that many users have dsl router or similar 
 device and many
 such beasts will provide NATed ip block and act like a firewall not
 allowing outside servers to actually connect to your home computer.
 On this point it would be really interested to see what percentage of
 users actually have these routers and if decreasing speed of 
 infections
 by new virus (is there real numbers to show it decreased?) 
 have anything
 to do with this rather then people being more carefull and using
 antivirus.
 
 Another option if you're really afraid of infection is to setup proxy
 that only allows access to microsoft ip block that contains windows
 update servers
 
 And of course, there is an even BETTER OPTION then all the 
 above - STOP
 USING WINDOWS and switch to Linux or Free(Mac)BSD ! :)
 
  Patches are Microsoft's
  intellectual property and can not be distributed by anyone without 
  Microsoft's permission.
 I don't think this is quite true. Microsoft makes available 
 all patches
 as indidual .exe files. There are quite many of these updates and its
 really a pain to actually get all of them and install updates 
 manually.
 But I've never seen written anywhere that I can not download 
 these .exe
 files and distribute it inside your company or to your 
 friends as needed
 to fix the problems these patches are designed for. 
  
  The problem with Bots is they aren't always active.  That 
 makes them 
  difficult to find until they do something.
 As opposed to what, viruses?
 Not at all! Many viruses have period wjhen they are active and
 afterwards they go into sleep mode and will not active until some
 other date!
 
 Additionally bot that does not immediatly become active is good thing
 because of you do weekly or monthly audits (any many do it like that)
 you may well find it this way and deal with it at your own 
 time, rather
 then all over a sudden being awaken 3am and having to clean 
 up infected
 system.
 
 --
 William Leibzon
 Elan Networks
 [EMAIL PROTECTED]
 
 
 


RE: Worms versus Bots

2004-05-03 Thread Michel Py

 William wrote:
 but in our ISP office I setup new win2000 servers and first
 thing I do is download all the patches. I've yet to see the
 server get infected in the 20-30 minutes it takes to finish it

It can happen in 5 or 10 minutes (I've seen it) but only if all of the
following conditions are met simultaneously:
a) administrator's password blank (or something
   _really_ easy to guess)
b) public IP (no NAT)
c) no firewall
In other words: if one is stupid, one gets worm'ed or bot'ed.

 (Note: I also disable IIS just in case until
 everything is patched..).

Not a bad idea, but sometimes you don't have the choice of doing it
(with scripted installs or things like SBS). Besides, IIS is not the
main source of trouble on a machine that sits on the Internet
unprotected. I consider disabling IIS a second or third line of defense,
to be used after you implemented the steps not to get screwed in the
first place (which you described).

 Similarly when settting up computers for several of my
 relatives (all have dsl) I've yet to see any infection
 before all updates are installed.

Me too.


 Additional to that many users have dsl router or similar
 device and many such beasts will provide NATed ip block
 and act like a firewall not allowing outside servers to
 actually connect to your home computer.

Indeed. I have a $10 one that I use for installations (even when I
install from a trusted environment), because the danger does not come
only from the Internet, it can also come from your own LAN. By putting
the machine being installed alone on its own segment behind a NAT box,
you also shield yourself from crud that could be on the trusted network.

 On this point it would be really interested to see what
 percentage of users actually have these routers and if
 decreasing speed of infections by new virus (is there
 real numbers to show it decreased?) have anything to
 do with this rather then people being more carefull and
 using antivirus.

Difficult to measure, and here's why: recent worms are polymorphic and
propagate/replicate using many different mechanisms.  How do you make
the difference between a) a worm that arrived trough email and then
contaminated x machines on your LAN and b) a worm that arrived through a
vulnerability of IIS and then contaminated x machines on your LAN?

The trouble here is that if you had all the time in the world _and_ if
you did not have x users screaming, you could look at logs and such and
finally figure out which of the egg or the chicken was first. In a real
world, you clean the mess and when you are done you have to catch up
with all the stuff you did not do while cleaning, and you never know.

Michel.