Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Rich Kulawiec
On Fri, Jul 29, 2016 at 08:58:23PM +0700, Roland Dobbins wrote:
> The AUP, the TOS, and the RFP are the most powerful security tools any
> network operator has at their disposal - assuming they've invested some time
> and effort in crafting them, and in ensuring they can be enforced.

This.  A hundred times this.

And keep in mind that these tools are not just to protect your operation;
they're to protect the Internet *from* your operation.

---rsk


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Roland Dobbins


On 29 Jul 2016, at 20:34, J. Oquendo wrote:


Because someone breaking AUPs and TOS is not enough.


The AUP, the TOS, and the RFP are the most powerful security tools any 
network operator has at their disposal - assuming they've invested some 
time and effort in crafting them, and in ensuring they can be enforced.


---
Roland Dobbins 


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread J. Oquendo
On Fri, 29 Jul 2016, Naslund, Steve wrote:

> What he said.  If I am given a court order and follow it, I can't get sued 
> when I knock you off the Internet.
> 
> Steven Naslund

Because someone breaking AUPs and TOS is not enough. "Hey
I know you broke every rule in the book. Forget that for
now I am not a judge, feel free to DDoS, steal someone's
life savings with your malware/phishing. You're fine by
me until a judge tells me otherwise." -- Smart answer

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

"Where ignorance is our master, there is no possibility of
real peace" - Dalai Lama

0B23 595C F07C 6092 8AEB  074B FC83 7AF5 9D8A 4463
https://pgp.mit.edu/pks/lookup?op=get&search=0xFC837AF59D8A4463


RE: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Naslund, Steve
What he said.  If I am given a court order and follow it, I can't get sued when 
I knock you off the Internet.

Steven Naslund

>-Original Message-
>From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Bush
>Sent: Friday, July 29, 2016 8:04 AM
>To: chris
>Cc: North American Network Operators' Group
>Subject: Re: EVERYTHING about Booters (and CloudFlare)

> great quote from the reporter "why do you need a court order to do the 
> right thing?"

>because i am not judge and jury.  we leave that to network technicians.

>randy


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Randy Bush
> great quote from the reporter "why do you need a court order to do the
> right thing?"

because i am not judge and jury.  we leave that to network technicians.

randy


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Saku Ytti
On 28 July 2016 at 19:27, chris  wrote:
> They don't discriminate, anyone can be a customer
> https://www.youtube.com/watch?v=T4GfoSZ_sDc
>
> great quote from the reporter "why do you need a court order to do the
> right thing?"

Only failure here is accepting interview request from FOX. Who obvious
just want to be sensational rather than have an actual discussion.

-- 
  ++ytti


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Randy Bush
>> They don't discriminate, anyone can be a customer
>> https://www.youtube.com/watch?v=T4GfoSZ_sDc
> 
> Holy crap that girl was painful to listen to!

missed the girl.  all i saw was prince and a fox 'news' woman.  it was
pretty much like reading nanog.

randy


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Scott Weeks


--- tknch...@gmail.com wrote:

They don't discriminate, anyone can be a customer
https://www.youtube.com/watch?v=T4GfoSZ_sDc

great quote from the reporter "why do you need a 
court order to do the right thing?"
--


Holy crap that girl was painful to listen to!

scott


RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread bzs

The difference between everyone posting here and for example the
intellectual property folks like RIAA is the latter has organization
and money.

As I said earlier one thing that organization and money has done is
defined, with some precision, where the boundaries are. It's a moving
target but that's a lot better than nothing.

And money for lobbyists etc to go to govts and courts to impress them
with their point of view and even get it written into law and
precedents.

It's not perfect, nothing is, but when someone puts up a music sharing
service with a million recordings none authorized in Lower Slobbovia
they usually manage to get it shut down (that happens, ok not Lower
Slobbovia exactly.)

Something else they get is budget assigned to law enforcement agencies
to pursue those commercial violations.

I remember speaking early on to someone in an FBI office about spam
and related, this was probably ca 2000, and he completely sympathized
but said sorry, the FBI has no budget to pursue such things.

Like many very nice people you think LEAs pursue crimes merely because
they are crimes. That the money to do so just appears on demand
because IT'S A CRIME! Book 'em Dan-o!

Hah! I'll repeat that. Hah!

These are commercial crimes not terrorism or kidnapping or murder or
tearing those labels off mattresses.

Much more difficult to get on LEAs radar.

On the darker side be careful what you wish for.

You won't personally be defining these boundaries. People like
lobbyists and policy wonks and legislators will. People this
hypothetical organization hires and those influenced by those
hires. People who can spend full time wordsmithing all this and
getting attention.

It takes very active involvement to steer good intentions to good
results and not just end up with scattershot gibberish or worse
overbearing laws which do more harm than good.

And that all takes organization and money and involvement not postings
on NANOG except inasmuch as they might lead to organization and money
etc.

It's possible and maybe even desirable but what I see here ain't it.

-- 
-Barry Shein

Software Tool & Die| b...@theworld.com | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD   | 800-THE-WRLD
The World: Since 1989  | A Public Information Utility | *oo*


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Randy Bush
>> Actually, as someone pointed out, it might well be conspiracy - which
>> is criminal.
> looking forward to the court case, if it's really important it'll
> happen shortly, right?

we don't need no flippin' court.  we can lynch 'em right here.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Miles Fidelman

On 7/28/16 11:56 AM, Niels Bakker wrote:

* mfidel...@meetinghouse.net (Miles Fidelman) [Thu 28 Jul 2016, 17:42 
CEST]:

[...]
Now if Cloudflare were to actively suggest that folks use vBooter to 
test systems, as a way to boost sales for Cloudflare - that would 
certainly be an interesting test case for RICO


CloudFlare is doing nothing of the sort, and it's kind of vile for you 
to suggest otherwise, even ostensibly by way of floating it as a 
hypothetical.




Well, I don't know - if I were in the business of selling security 
services, I'd probably suggest that potential customers do some 
penetration and stress testing of their systems.  And that seems pretty 
legitimate.


For that matter - "here are some tools you can use to test your systems" 
also strikes me as pretty legitimate.


On the other hand - one might argue that publishing something like "How 
to Launch a 65Gbps DDoS, and How to Stop One" 
https://blog.cloudflare.com/65gbps-ddos-no-problem/ - pushes the limits 
a bit - depending on how much detailed "how-to" information one 
provides, and how much one presents oneself as the solution.


Granted, that there's a lot of value in education - I certainly want to 
know the various ways folks might attack our systems, and the various 
ways we might defend ourselves.  But there are limits - not just legal 
ones, but, as others have pointed out, ethical ones and ones of good 
taste.  The CERT draws its lines one place; on the other hand, Symantec 
publishes white papers that give some rather in depth analyses of 
specific viruses - there for the googling. Cloudflare certainly comes 
closer to one line than the other.


Opinions vary as to the ethics, taste, and legality of publishing 
detailed how-to information - there's certainly enough out there from 
sources with ill intent (including rather nasty libraries and tools that 
require little technical expertise to utilize) - so I tend to favor more 
details.


When one directly ties detailed how-to information, with product/service 
sales - now that strikes me as begging to be the target of some 
interesting test cases.  In Cloudflare's case - telling people how to 
attack a site, hosting free & openly available tools that can support 
such an attack, and selling services to mitigate the attack - now that's 
a test case just waiting to happen.  "How to Launch a 65Gbps DDoS, and 
How to Stop One" seems like an open invitation to ambulance chasers and 
aggressive prosecutors.


Miles Fidelman

--
In theory, there is no difference between theory and practice.
In practice, there is.   Yogi Berra



RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve

The best analogy to real world would be to look at CloudFare as an arms dealer. 
 They don't start the war but they sure enable it.  The governments probably 
don't care who you sell arms to until their goat gets gored and then they are 
coming for you.  Believe me they have more than enough laws on the books to 
find one that applies to just about any circumstance they want.  In that world, 
legal and illegal don’t matter as much as who likes you and who doesn't.

Steven Naslund
Chicago IL


RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve
No, as I said earlier, I am of the opinion that these networks get swept up 
once they go too big and hit something that law enforcement really cares about 
(read: embarrassed by).  At that point they get everyone.  You and I and our 
customers can't do much of anything until that point unless the service 
provider community gets aggravated enough to go to war with them.   Thing is no 
one knows who is Senator Xs friend or has someone with enough pull to get a 
response.  Eventually they all trip over one of those mines.

Steven Naslund
Chicago IL

>-Original Message-
>From: Phil Rosenthal [mailto:p...@isprime.com] 
>Sent: Thursday, July 28, 2016 11:57 AM
>To: Naslund, Steve
>Cc: nanog@nanog.org
>Subject: Re: EVERYTHING about Booters (and CloudFlare)
>
>Are you of the opinion that the victim of a DDoS attack who is not a 
>multi-billion-dollar corporation would actually receive help from the FBI as a 
>result of a DDoS attack?
>In the past, I have been told that the dollar-threshold for the FBI to even 
>consider looking at a case was at least $2M in damages. This was 10 years ago, 
>and I can't imagine the threshold has gone down.
>
>-Phil


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Phil Rosenthal
Are you of the opinion that the victim of a DDoS attack who is not a 
multi-billion-dollar corporation would actually receive help from the FBI as a 
result of a DDoS attack?
In the past, I have been told that the dollar-threshold for the FBI to even 
consider looking at a case was at least $2M in damages. This was 10 years ago, 
and I can't imagine the threshold has gone down.

-Phil

> On Jul 28, 2016, at 12:51 PM, Naslund, Steve  wrote:
> 
> It is not beyond the realm of law enforcement to run down the entire chain of 
> events all the way back to the “whodunit” and “howdunit”.  It is pretty 
> amazing what they can figure out when they put their minds to it and don’t 
> underestimate what they can learn by getting someone in the hot seat under 
> the bare light bulb.  They also have lots of informants.
> 
> Victim complaints don’t matter a bit to these guys, it will take the guys in 
> the windbreakers kicking in the doors one of these days.
> 
> Steven Naslund
> Chicago IL
> 
>> On Thu, Jul 28, 2016 at 12:20 PM, Phil Rosenthal 
>> mailto:p...@isprime.com>> wrote:
>> Keep in mind also, the victims of these DDoS attacks do not know which 
>> "booter" service was paid to attack them. The packets do not have "Stress 
>> test provided by vBooter" in them. The attack packets do not ?>come from the 
>> booter's or Cloudflare's IP addresses, they come from secondary victims -- 
>> compromised servers, PC's infected with malware, and abused DNS/NTP [and a 
>> few other protocols] reflectors.
>> 
>> It is impossible for a victim to submit a complaint to Cloudflare stating "I 
>> was attacked by someone paying vBooter", because they do not know which of 
>> the numerous "booter" services was responsible.
>> 
>> -Phil



RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve
It is not beyond the realm of law enforcement to run down the entire chain of 
events all the way back to the “whodunit” and “howdunit”.  It is pretty amazing 
what they can figure out when they put their minds to it and don’t 
underestimate what they can learn by getting someone in the hot seat under the 
bare light bulb.  They also have lots of informants.

Victim complaints don’t matter a bit to these guys, it will take the guys in 
the windbreakers kicking in the doors one of these days.

Steven Naslund
Chicago IL

>On Thu, Jul 28, 2016 at 12:20 PM, Phil Rosenthal 
>mailto:p...@isprime.com>> wrote:
>Keep in mind also, the victims of these DDoS attacks do not know which 
>"booter" service was paid to attack them. The packets do not have "Stress test 
>provided by vBooter" in them. The attack packets do not ?>come from the 
>booter's or Cloudflare's IP addresses, they come from secondary victims -- 
>compromised servers, PC's infected with malware, and abused DNS/NTP [and a few 
>other protocols] reflectors.
>
>It is impossible for a victim to submit a complaint to Cloudflare stating "I 
>was attacked by someone paying vBooter", because they do not know which of the 
>numerous "booter" services was responsible.
>
>-Phil


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread chris
They don't discriminate, anyone can be a customer
https://www.youtube.com/watch?v=T4GfoSZ_sDc

great quote from the reporter "why do you need a court order to do the
right thing?"

On Thu, Jul 28, 2016 at 12:20 PM, Phil Rosenthal  wrote:

> Keep in mind also, the victims of these DDoS attacks do not know which
> "booter" service was paid to attack them. The packets do not have "Stress
> test provided by vBooter" in them. The attack packets do not come from the
> booter's or Cloudflare's IP addresses, they come from secondary victims --
> compromised servers, PC's infected with malware, and abused DNS/NTP [and a
> few other protocols] reflectors.
>
> It is impossible for a victim to submit a complaint to Cloudflare stating
> "I was attacked by someone paying vBooter", because they do not know which
> of the numerous "booter" services was responsible.
>
> -Phil
> > On Jul 28, 2016, at 12:12 PM, Naslund, Steve 
> wrote:
> >
> > Miles is right.  Their thinly veiled "stress tester" thing is not going
> to be much of a defense.  They must not have very good legal counsel.  Here
> is the issue.  Stress testing is perfectly legal as long as I am:
> >
> >   a) Stress testing my own stuff
> >   b) Stress testing your stuff WITH YOUR CONSENT
> >
> > Selling a product or service that is unsafe can lead to serious civil
> consequences.  For example, I sell you roach killer and don't warn you that
> it will also kill every other living thing in your home, I am going to get
> sued and lose badly.
> >
> > Let's say I am running a demolition company that offers to knock down
> any house for a price.  Don't you think I have a responsibility to verify
> that you own the house you just asked me to knock down?   (by the way, this
> has happened in the real world -wrong address on paperwork- and the
> demolition company was held liable) Obviously I have that responsibility
> and obviously the same rules would apply to any service that can
> potentially damage someone's property.
> >
> > Steven Naslund
> > Chicago IL
> >
> >> Let's see:
> >>
> >> Vbooter (on their home page) claims:
> >> "#1 FREE WEBBASED SERVER STRESSER"
> >> "Using vBooter you can take down home internet connections, websites
> and game servers such us Minecraft, XBOX Live, PSN and many more."
> >> "You don't have to pay anything in order to use this stresser! In
> addition there are NO limits if you are a free user."
> >
> >> So they're advertising a free service that explicitly offers DDoS
> capabilities.
> >
> >> Now - with the caveat that I'm not a lawyer, and I'm talking from a US
> perspective only - as a sometimes hosting provider who pays attention to
> our legal liabilities, and >who's had one of our boxes compromised and used
> to vector a DDoS against a gaming site
> >
> >> 1.  DDoS is clearly illegal under multiple statutes - most notably the
> Computer Fraud and Abuse Act - see
> https://www.justice.gov/sites/default/files/criminal-
> >ccips/legacy/2015/01/14/ccmanual.pdf
> >> - for a Justice Dept. memo on "Prosecuting Computer Crimes."  When
> coupled with threats, requests for payoffs, etc. - it expands into lots of
> other crimes (e.g., >extortion).  And that's before one starts attacking
> Government-owned computer systems.
> >>
> >> 2. One might infer that, while "stress testing" is a legitimate and
> useful service - under specific circumstances, vBooter's tools might also
> fall under laws regarding >being an accomplice to a criminal act, aiding &
> abetting, "burglar's tools," etc., and more generally "creating a public
> nuisance."
> >>
> >> 3. There are also various (mostly state) laws against the sale of
> burglar's tools (e.g., sale of a lockpick to someone who's not a
> professional locksmith).  I expect some >of those laws might apply.
> >>
> >> 4. All of those certainly could be applied to vBooter.org.  Whether
> Cloudflare is liable for anything would seem to depend on whether
> Cloudflare is complicit in the use >of vBooter's use for criminal purposes,
> or promoting it's use therefore.  Hosting would certainly fall into that
> category - and while, I have no direct knowledge that >Cloudflare hosts
> vBooter, they do provide nameservice, and their web server's IP address is
> in a network block registered to Cloudflare - that would seem to establish
> >complicity.  Now if Cloudflare were to actively suggest that folks use
> vBooter to test systems, as a way to boost sales for Cloudflare - that
> would certainly be an >interesting test case for RICO (akin to McAfee
> encouraging folks to write and release viruses).
> >>
> >> As to whether "Nothing is going to happen" - I expect something WILL
> happen, when somebody big, with a good legal department, gets hit by a
> really damaging DDoS attack, >and starts looking for some deep pockets to
> sue.  Or, if somebody attacks the wrong Government computer and the FBI, or
> DoD, or DHS get ticked off.
> >>
> >> It will make for very good theater - at least for anyone not direc

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Phil Rosenthal
Keep in mind also, the victims of these DDoS attacks do not know which "booter" 
service was paid to attack them. The packets do not have "Stress test provided 
by vBooter" in them. The attack packets do not come from the booter's or 
Cloudflare's IP addresses, they come from secondary victims -- compromised 
servers, PC's infected with malware, and abused DNS/NTP [and a few other 
protocols] reflectors.

It is impossible for a victim to submit a complaint to Cloudflare stating "I 
was attacked by someone paying vBooter", because they do not know which of the 
numerous "booter" services was responsible.

-Phil
> On Jul 28, 2016, at 12:12 PM, Naslund, Steve  wrote:
> 
> Miles is right.  Their thinly veiled "stress tester" thing is not going to be 
> much of a defense.  They must not have very good legal counsel.  Here is the 
> issue.  Stress testing is perfectly legal as long as I am:
> 
>   a) Stress testing my own stuff
>   b) Stress testing your stuff WITH YOUR CONSENT
> 
> Selling a product or service that is unsafe can lead to serious civil 
> consequences.  For example, I sell you roach killer and don't warn you that 
> it will also kill every other living thing in your home, I am going to get 
> sued and lose badly.
> 
> Let's say I am running a demolition company that offers to knock down any 
> house for a price.  Don't you think I have a responsibility to verify that 
> you own the house you just asked me to knock down?   (by the way, this has 
> happened in the real world -wrong address on paperwork- and the demolition 
> company was held liable) Obviously I have that responsibility and obviously 
> the same rules would apply to any service that can potentially damage 
> someone's property.
> 
> Steven Naslund
> Chicago IL
> 
>> Let's see:
>> 
>> Vbooter (on their home page) claims:
>> "#1 FREE WEBBASED SERVER STRESSER"
>> "Using vBooter you can take down home internet connections, websites and 
>> game servers such us Minecraft, XBOX Live, PSN and many more."
>> "You don't have to pay anything in order to use this stresser! In addition 
>> there are NO limits if you are a free user."
> 
>> So they're advertising a free service that explicitly offers DDoS 
>> capabilities.
> 
>> Now - with the caveat that I'm not a lawyer, and I'm talking from a US 
>> perspective only - as a sometimes hosting provider who pays attention to our 
>> legal liabilities, and >who's had one of our boxes compromised and used to 
>> vector a DDoS against a gaming site
> 
>> 1.  DDoS is clearly illegal under multiple statutes - most notably the 
>> Computer Fraud and Abuse Act - see 
>> https://www.justice.gov/sites/default/files/criminal->ccips/legacy/2015/01/14/ccmanual.pdf
>> - for a Justice Dept. memo on "Prosecuting Computer Crimes."  When coupled 
>> with threats, requests for payoffs, etc. - it expands into lots of other 
>> crimes (e.g., >extortion).  And that's before one starts attacking 
>> Government-owned computer systems.
>> 
>> 2. One might infer that, while "stress testing" is a legitimate and useful 
>> service - under specific circumstances, vBooter's tools might also fall 
>> under laws regarding >being an accomplice to a criminal act, aiding & 
>> abetting, "burglar's tools," etc., and more generally "creating a public 
>> nuisance."
>> 
>> 3. There are also various (mostly state) laws against the sale of burglar's 
>> tools (e.g., sale of a lockpick to someone who's not a professional 
>> locksmith).  I expect some >of those laws might apply.
>> 
>> 4. All of those certainly could be applied to vBooter.org.  Whether 
>> Cloudflare is liable for anything would seem to depend on whether Cloudflare 
>> is complicit in the use >of vBooter's use for criminal purposes, or 
>> promoting it's use therefore.  Hosting would certainly fall into that 
>> category - and while, I have no direct knowledge that >Cloudflare hosts 
>> vBooter, they do provide nameservice, and their web server's IP address is 
>> in a network block registered to Cloudflare - that would seem to establish 
>> >complicity.  Now if Cloudflare were to actively suggest that folks use 
>> vBooter to test systems, as a way to boost sales for Cloudflare - that would 
>> certainly be an >interesting test case for RICO (akin to McAfee encouraging 
>> folks to write and release viruses).
>> 
>> As to whether "Nothing is going to happen" - I expect something WILL happen, 
>> when somebody big, with a good legal department, gets hit by a really 
>> damaging DDoS attack, >and starts looking for some deep pockets to sue.  Or, 
>> if somebody attacks the wrong Government computer and the FBI, or DoD, or 
>> DHS get ticked off.
>> 
>> It will make for very good theater - at least for anyone not directly in the 
>> cross-hairs.
>> 
>> Miles Fidelman
> 



RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve
Miles is right.  Their thinly veiled "stress tester" thing is not going to be 
much of a defense.  They must not have very good legal counsel.  Here is the 
issue.  Stress testing is perfectly legal as long as I am:

a) Stress testing my own stuff
b) Stress testing your stuff WITH YOUR CONSENT

Selling a product or service that is unsafe can lead to serious civil 
consequences.  For example, I sell you roach killer and don't warn you that it 
will also kill every other living thing in your home, I am going to get sued 
and lose badly.

Let's say I am running a demolition company that offers to knock down any house 
for a price.  Don't you think I have a responsibility to verify that you own 
the house you just asked me to knock down?   (by the way, this has happened in 
the real world -wrong address on paperwork- and the demolition company was held 
liable) Obviously I have that responsibility and obviously the same rules would 
apply to any service that can potentially damage someone's property.

Steven Naslund
Chicago IL

>Let's see:
>
>Vbooter (on their home page) claims:
>"#1 FREE WEBBASED SERVER STRESSER"
>"Using vBooter you can take down home internet connections, websites and game 
>servers such us Minecraft, XBOX Live, PSN and many more."
>"You don't have to pay anything in order to use this stresser! In addition 
>there are NO limits if you are a free user."

>So they're advertising a free service that explicitly offers DDoS capabilities.

>Now - with the caveat that I'm not a lawyer, and I'm talking from a US 
>perspective only - as a sometimes hosting provider who pays attention to our 
>legal liabilities, and >who's had one of our boxes compromised and used to 
>vector a DDoS against a gaming site

>1.  DDoS is clearly illegal under multiple statutes - most notably the 
>Computer Fraud and Abuse Act - see 
>https://www.justice.gov/sites/default/files/criminal->ccips/legacy/2015/01/14/ccmanual.pdf
>- for a Justice Dept. memo on "Prosecuting Computer Crimes."  When coupled 
>with threats, requests for payoffs, etc. - it expands into lots of other 
>crimes (e.g., >extortion).  And that's before one starts attacking 
>Government-owned computer systems.
>
>2. One might infer that, while "stress testing" is a legitimate and useful 
>service - under specific circumstances, vBooter's tools might also fall under 
>laws regarding >being an accomplice to a criminal act, aiding & abetting, 
>"burglar's tools," etc., and more generally "creating a public nuisance."
>
>3. There are also various (mostly state) laws against the sale of burglar's 
>tools (e.g., sale of a lockpick to someone who's not a professional 
>locksmith).  I expect some >of those laws might apply.
>
>4. All of those certainly could be applied to vBooter.org.  Whether Cloudflare 
>is liable for anything would seem to depend on whether Cloudflare is complicit 
>in the use >of vBooter's use for criminal purposes, or promoting it's use 
>therefore.  Hosting would certainly fall into that category - and while, I 
>have no direct knowledge that >Cloudflare hosts vBooter, they do provide 
>nameservice, and their web server's IP address is in a network block 
>registered to Cloudflare - that would seem to establish >complicity.  Now if 
>Cloudflare were to actively suggest that folks use vBooter to test systems, as 
>a way to boost sales for Cloudflare - that would certainly be an >interesting 
>test case for RICO (akin to McAfee encouraging folks to write and release 
>viruses).
>
>As to whether "Nothing is going to happen" - I expect something WILL happen, 
>when somebody big, with a good legal department, gets hit by a really damaging 
>DDoS attack, >and starts looking for some deep pockets to sue.  Or, if 
>somebody attacks the wrong Government computer and the FBI, or DoD, or DHS get 
>ticked off.
>
>It will make for very good theater - at least for anyone not directly in the 
>cross-hairs.
>
>Miles Fidelman



RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve
There are not international cyber crime laws because there is no international 
law enforcement agency with the reach to enforce them and because most 
countries like things like sovereignty.  There is also an inherent conflict 
between private citizen hacking and state sponsored hacking and the line is 
sometimes blurry.  If a state sponsor is using a private DDoS network, what are 
the chances they are going to allow an investigation/arrest in that case?  
There are already enough laws on the books in most cases to handle this stuff, 
there just isn't the law enforcement resources/interest to pursue this.  

Companies like CloudFare generally end up in one of two states given my 
experience since the first public Internet became available.

1.  Various service providers get screwed with enough and eventually retaliate 
by messing with CloudFare's connectivity/peering/availability to the point that 
CloudFare becomes an unviable platform for the nefarious services.  This 
happened in the original spam wars with regularity.  As soon as CloudFare 
becomes inconvenient or too visible to law enforcement, they move on to the 
next provider and enough legit business is scared away that CloudFare dies on 
the vine.

2.  Eventually one of the nefarious services messes around with something large 
enough to create big law enforcement interest (a successful hit on a critical 
national resource) at which point they cut all the intergovernmental red tape 
and take out everyone including the hacker, the server farm, the hosting 
company, and anyone else involved.  Remember that they don't necessarily have 
to prove a criminal case to shut your business down.  All they really have to 
do is get a judge to order a seizure of enough of your gear to shut you down 
for a period of time that sends all your other business out the door.  Note 
that I don't support/not support that tactic but it's a fact that it works.  
Sure, you can try to defend yourself but how deep are your legal pockets?  The 
US Justice Department has shown time and again that they can wipe out large 
swaths of nefarious operators when they care enough to do so.  They have also 
shown the ability to cross international border to do so.  They put some 
serious dents in Pirate Bay and Anonymous.  They don't kill them permanently 
but it doesn't matter to the guys sitting in prison for years.

Steven Naslund
Chicago IL






Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Niels Bakker

* mfidel...@meetinghouse.net (Miles Fidelman) [Thu 28 Jul 2016, 17:42 CEST]:
[...]
Now if Cloudflare were to actively suggest that folks use vBooter to 
test systems, as a way to boost sales for Cloudflare - that would 
certainly be an interesting test case for RICO


CloudFlare is doing nothing of the sort, and it's kind of vile for 
you to suggest otherwise, even ostensibly by way of floating it as 
a hypothetical.



-- Niels.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Miles Fidelman

On 7/28/16 11:04 AM, Paras Jha wrote:


Nothing is going to happen. Cloudflare will continue to turn a blind eye
towards abusive customers, and even downright allow customers to HTTP scan
from their network without batting an eyelash. The mere act of scanning
isn't illegal, but it shows the kind of mindset that they have.


Let's see:

Vbooter (on their home page) claims:
"#1 FREE WEBBASED SERVER STRESSER"
"Using vBooter you can take down home internet connections, websites and 
game servers such us Minecraft, XBOX Live, PSN and many more."
"You don't have to pay anything in order to use this stresser! In 
addition there are NO limits if you are a free user."


So they're advertising a free service that explicitly offers DDoS 
capabilities.


Now - with the caveat that I'm not a lawyer, and I'm talking from a US 
perspective only - as a sometimes hosting provider who pays attention to 
our legal liabilities, and who's had one of our boxes compromised and 
used to vector a DDoS against a gaming site


1.  DDoS is clearly illegal under multiple statutes - most notably the 
Computer Fraud and Abuse Act - see
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf 
- for a Justice Dept. memo on "Prosecuting Computer Crimes."  When 
coupled with threats, requests for payoffs, etc. - it expands into lots 
of other crimes (e.g., extortion).  And that's before one starts 
attacking Government-owned computer systems.


2. One might infer that, while "stress testing" is a legitimate and 
useful service - under specific circumstances, vBooter's tools might 
also fall under laws regarding being an accomplice to a criminal act, 
aiding & abetting, "burglar's tools," etc., and more generally "creating 
a public nuisance."


3. There are also various (mostly state) laws against the sale of 
burglar's tools (e.g., sale of a lockpick to someone who's not a 
professional locksmith).  I expect some of those laws might apply.


4. All of those certainly could be applied to vBooter.org.  Whether 
Cloudflare is liable for anything would seem to depend on whether 
Cloudflare is complicit in the use of vBooter's use for criminal 
purposes, or promoting it's use therefore.  Hosting would certainly fall 
into that category - and while, I have no direct knowledge that 
Cloudflare hosts vBooter, they do provide nameservice, and their web 
server's IP address is in a network block registered to Cloudflare - 
that would seem to establish complicity.  Now if Cloudflare were to 
actively suggest that folks use vBooter to test systems, as a way to 
boost sales for Cloudflare - that would certainly be an interesting test 
case for RICO (akin to McAfee encouraging folks to write and release 
viruses).


As to whether "Nothing is going to happen" - I expect something WILL 
happen, when somebody big, with a good legal department, gets hit by a 
really damaging DDoS attack, and starts looking for some deep pockets to 
sue.  Or, if somebody attacks the wrong Government computer and the FBI, 
or DoD, or DHS get ticked off.


It will make for very good theater - at least for anyone not directly in 
the cross-hairs.


Miles Fidelman


--
In theory, there is no difference between theory and practice.
In practice, there is.   Yogi Berra



Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Alexander Maassen
Sigh, another long thread that goes nowhere in the end and simply dies a
dull dead. So let's add my 2ct donation into it.

First of all, CF like any other carrier/provider/hoster/whatever only
cares about the bucks, nothing else, you all do to, so that should be
clear enough. Them actually booting customers just because some other
instance (except through govermential powers) wants them to is not done,
as it would decrease the income. Period. Same goes for ISP's blocking
access to resources. They will simply switch to another provider and or
try to find workarounds for it (see pirate bay and the alikes). Thats like
mopping the floor while the fire sprinklers are still on.

Second, CF indeed offers DDoS mitigation, but only on their heavy paid
plans, if you also want the netflow logs of the attacks etc, it will cost
you extra. If you are on a free plan, and your assigned gw gets ddossed,
and they figure out you are the target, they drop the 'protection' by
simply changing dns to it's real values and letting the attacker know:
don't dos us if you want to hit that site, use the real endpoint IP
instead and you will hit them directly. (Been there with DroneBL, and as
soon as I figured out they do that, dropped them immediately). In the end,
you are better off at hosters like OVH/Foonet and such as they learned
from the IRC age where it was common to nuke clients/bnc's in order to
hijack nicknames/channels when the network didn't have channel/nick
services.

Third, for those who do not know it yet, CF only acts as an intermediate
RELAY that provides a method of attempting to identify bad asses, nothing
more. And the badasses they also relay for? Testpigs and informational
source! (Keep your friends close, your enemies closer?).

Hell, aren't some of the best security advisors former hackers? At least
the ones I know used to be. And I rather have some decent hacker in my
team, keeping me updated with the stuff thats going on in the scene, then
some million dollar company trying to sell you crap that is always behind
the facts. Oh, and I am talking about real hackers, not those
scriptkiddies using ready made tools thinking they are god.

Fourth, and I see it in this mail as well and a lot of others: The
Jurisdictional issues. Why aren't there any international Cyber Crime laws
yet? We all do need to enforce crap like DMCA (which the
music/entertainment industry is responsible for), EU Cookie Law (which
should have been handled through the browsers and not force it upon the
websites) and it's inbread stupid derivates, but everyone, despite acting
out international by it's presence on a global spanning network, is still
hiding behind his/her's organizations local law. Kinda stupid, don't you
agree ?

Kind regards,

Alexander Maassen
Maintainer DroneBL

On Thu, July 28, 2016 4:41 pm, Paul WALL wrote:
> I'm sorry, but this entire discussion is predicated on half-truths and
nonsense spewing out of the CF team.  It's a shame too, as they're
usually great community minded folks who are well respected around here.
>
> No matter how you define the CloudFlare service, that they can claim
ignorance due to "common carrier" passthrough is preposterous,
> especially given their purported knowledge of what's going on.
> Likewise if the booter sites were connected to any other CDN,
> WAF/proxy, public cloud provider, etc.  Call it what you want, but at
the end of the day, they're providing connectivity and keeping the
storefront online.  Want the problem stopped?  Easy, stop it at the
source by denying them service.  Every service provider (or its
> upstream at some point) has an AUP which prevents the service from being
used for illegal purposes.  Telling NANOG members that they don't
understand the nature of the CF service, and that they should somehow
get a pass, is dishonest.
>
> That they're keeping these criminals online at the requirement of the
FBI?  Anyone who's actually worked with law enforcement can tell you
that the first rule of fight club is to NOT talk about it, especially if
you're under gag order.  A more likely story is they're just doing this
for the attention, and basking in it, kind of like a certain blog post
suggesting they pioneered the practice of configuring hosts with LACP
for throughput and HA.
>
> If Justin/Matthew/Martin/etc. are listening, I implore you to do the
right thing and stop providing service to criminals.  Full stop, without
caving in to your very talented marketing department.  And to everyone
else, I'd ask you to do what you think is right, and treat CloudFlare's
anycasted IP blocks as you would any other network
> harboring criminal activity and security risk to the detriment of your
customers.   (Is Team CYMRU listening?)  Much like the original spam
problem in the 90s, the collateral damage might be annoying at first,
but the end will justify the means.
>
> Drive Slow (like a souped up Supra),
> Paul Wall
>
> On Wed, Jul 27, 2016 at 10:48 PM, Randy Bush  wrote:
>>> They just lost al

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Adrian
On Wednesday 27 July 2016 07:58:49 Paras Jha wrote:
> Hi Justin,
> 
> I have submitted abuse reports in the past, maybe from 2014 - 2015, but I
> gave up after I consistently did not even get replies and saw no action
> being taken. It is the same behavior with other providers who host malware
> knowingly. I appreciate you coming out onto the list though, it's nice to
> see that CF does maintain a presence here.
> 

I am not seeing Justin's replies hitting my mailbox, only snipets of quotes 
and replies... but my experience to date with CloudFlare has been exactly the 
same, no response or action of any kind to abuse reports.

...Searching... here is an example. Banco do Brasil "you must update your 
details" phishing fraud using compromised hosts. Example email and for details 
neccessary to confirm sent to ab...@cloudflare.com on 7/17. Ten days later and 
the compromised CloudFlare-fronted site is still up and still running. Would 
there be any confusion if the following abuse report (plus attached original 
email) arrived in your mailbox?


Phishing / Fraud / Compromised server

Phishing URL:
http://www.rua.edu.kh/joomla/tecno/porta-bb2.com.jpg/

Redirects to:
http://fonecomercial.com.br/admin/wip.php/index.php

Redirects to:
http://app.flipedition.com/css/www2.bb.com.br.jpg/

Compromised server:
www.rua.edu.kh - 203.189.134.18
fonecomercial.com.br - 104.27.148.36  104.27.149.36
app.flipedition.com - 62.75.219.22



Any guesses who 104.27.148.36 104.27.149.36 is? PlusServer.de (62.75.219.22) 
terminated the final destination compromised pages within 12 hours... The 
others are still up. Some providers actively monitor and take control of 
reported abuses. Some providers actively ignore reported abuses.




Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Rich Kulawiec
On Wed, Jul 27, 2016 at 03:09:51PM +, Steve Mikulasik wrote:
> I am sure a lawyer would see it very differently, [...]

For what it's worth I agree, but I'm not an attorney (and neither
are most of us), so I'll write from the perspective of an operator.

The healthy functioning of the Internet community relies on mutual
cooperation.  It always has.  Part of that cooperation is ensuring
that one's own operation, whether it's a single server or a worldwide
collection of data centers, is not an operational hazard to the rest
of the Internet.  That is our first, our primary, our over-arching
responsibility at all times.  Understanding it, embracing it, and
practicing it is something required of all of us.

This isn't a question of what's legal and what's not -- after all,
that varies by jurisdiction and it's a moving target and the machinery
of jurisprudence moves a few orders of magnitude more slowly than
does Internet technology.  It's a question of what's right.  We should
all know that hosting spammers or phishers, DoS-attackers or carders,
or anyone/anything like that is wrong.  (Yes, there are gray areas where
reasonable people can differ about what's right/wrong.  But these
are not among them.)  We should all be doing everything we
can to avoid giving them services, and if we fail in that, if they
get by our screening, we should be cutting them off the moment we're
aware of their presence, and banning them permanently, AND informing
other operators in order to forestall their relocation.

This doesn't require legal involvement: it requires ToS that stipulate
it, and if, in 2016, any service *doesn't* have ToS that stipulate these
things: you need to get new attorneys and fix that today.

It also requires having a functioning abuse@ address (per RFC 2142
and decades of best practices) that connects to a functioning abuse
department that is empowered to investigate and act on everything
that shows up there.  In a better world, this wouldn't be necessary:
abuse sources/sinks/facilitators would already know of their own
involvement and nobody would need to tell them.  But we don't live
in that world and in some cases, it's arguably difficult to tell
even for very diligent operators.  So if third parties are doing you
the incredibly gracious favor of reporting abuse to you, thus making
*your* job easier despite the fact that *your* operation is making
their job harder...you should listen.  You should investigate.  You
should say thank you.  You should report the outcome.

This isn't hard.  It's really not.  (And to those who say "we get too
many abuse complaints", there is a very simple fix for that: stop
facilitating so much abuse.  The complaints will drop proportionately.)

The alternative to this is an Internet of escalating attacks and abuse --
which is where we find ourselves after a few decades of incompetence
and negligence (those who can't be bothered) and deliberate support
(those who choose to take dirty money and cash in on abuse).  It's already
pretty bad, which is why there are now entire sectors built on mitigating
it.  We can either continue to light stacks of money on fire (and that's
one of the smaller costs of this) trying to stave this off or we can
do what we should have been doing all along: be *personally* responsible
for what our technology is doing.  No excuses.  No stonewalling.  No blowoffs
with a nod to the legal department.  Just step up and do the right thing
for the good of the community -- because without that community, even
the biggest, richest operation is of no importance and value whatsoever.

---rsk


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Paras Jha
Nothing is going to happen. Cloudflare will continue to turn a blind eye
towards abusive customers, and even downright allow customers to HTTP scan
from their network without batting an eyelash. The mere act of scanning
isn't illegal, but it shows the kind of mindset that they have.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Paul WALL
I'm sorry, but this entire discussion is predicated on half-truths and
nonsense spewing out of the CF team.  It's a shame too, as they're
usually great community minded folks who are well respected around
here.

No matter how you define the CloudFlare service, that they can claim
ignorance due to "common carrier" passthrough is preposterous,
especially given their purported knowledge of what's going on.
Likewise if the booter sites were connected to any other CDN,
WAF/proxy, public cloud provider, etc.  Call it what you want, but at
the end of the day, they're providing connectivity and keeping the
storefront online.  Want the problem stopped?  Easy, stop it at the
source by denying them service.  Every service provider (or its
upstream at some point) has an AUP which prevents the service from
being used for illegal purposes.  Telling NANOG members that they
don't understand the nature of the CF service, and that they should
somehow get a pass, is dishonest.

That they're keeping these criminals online at the requirement of the
FBI?  Anyone who's actually worked with law enforcement can tell you
that the first rule of fight club is to NOT talk about it, especially
if you're under gag order.  A more likely story is they're just doing
this for the attention, and basking in it, kind of like a certain blog
post suggesting they pioneered the practice of configuring hosts with
LACP for throughput and HA.

If Justin/Matthew/Martin/etc. are listening, I implore you to do the
right thing and stop providing service to criminals.  Full stop,
without caving in to your very talented marketing department.  And to
everyone else, I'd ask you to do what you think is right, and treat
CloudFlare's anycasted IP blocks as you would any other network
harboring criminal activity and security risk to the detriment of your
customers.   (Is Team CYMRU listening?)  Much like the original spam
problem in the 90s, the collateral damage might be annoying at first,
but the end will justify the means.

Drive Slow (like a souped up Supra),
Paul Wall

On Wed, Jul 27, 2016 at 10:48 PM, Randy Bush  wrote:
>> They just lost all respect from here. Would someone from USA please
>> report these guys to the feds? What they are doing is outright
>> criminal.
>
> hyperbole.  it is not criminal.  you just don't happen to like it.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Aaron
If you believe someone is doing something illegal than you should report 
it to law enforcement.  Their job is to investigate and bring charges if 
they feel they are warranted.  You do not have to be from the USA to 
report a crime in the USA.


Here is a list with contact info for the FBI's field offices: 
https://www.fbi.gov/contact-us/field-offices


FBI Headquarters: https://www.fbi.gov/contact-us/fbi-headquarters

List of overseas offices for those of you not in the US that want to 
talk to someone local: https://www.fbi.gov/contact-us/legal-attache-offices


Most network operators are not law enforcement or lawyers.

Aaron


On 7/28/2016 8:45 AM, Naslund, Steve wrote:

A DDoS attack is illegal.  In the United States it is considered as theft of 
service.  The legal construct used is that the DDoS attack is a theft of CPU 
cycles, compute resources, and power by other than the rightful owner for its 
intended purposes.

Steven Naslund
Chicago IL

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of 
valdis.kletni...@vt.edu
Sent: Thursday, July 28, 2016 4:30 AM
To: Miles Fidelman
Cc: nanog@nanog.org
Subject: Re: EVERYTHING about Booters (and CloudFlare)

On Wed, 27 Jul 2016 22:55:54 -0400, Miles Fidelman said:

On 7/27/16 10:48 PM, Randy Bush wrote:

They just lost all respect from here. Would someone from USA please
report these guys to the feds? What they are doing is outright
criminal.

hyperbole.  it is not criminal.  you just don't happen to like it.

Actually, as someone pointed out, it might well be conspiracy - which
is criminal.

In general, the conspiracy isn't criminal if the conspired act isn't criminal.
If you're trying to make a criminal conspiracy out of non-criminal acts, your 
best bet is probably finding a new way to abuse the RICO statutes.



--

Aaron Wendel
Chief Technical Officer
Wholesale Internet, Inc. (AS 32097)
(816)550-9030
http://www.wholesaleinternet.com




RE: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Naslund, Steve
A DDoS attack is illegal.  In the United States it is considered as theft of 
service.  The legal construct used is that the DDoS attack is a theft of CPU 
cycles, compute resources, and power by other than the rightful owner for its 
intended purposes.

Steven Naslund
Chicago IL

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of 
valdis.kletni...@vt.edu
Sent: Thursday, July 28, 2016 4:30 AM
To: Miles Fidelman
Cc: nanog@nanog.org
Subject: Re: EVERYTHING about Booters (and CloudFlare)

On Wed, 27 Jul 2016 22:55:54 -0400, Miles Fidelman said:
> On 7/27/16 10:48 PM, Randy Bush wrote:
> >> They just lost all respect from here. Would someone from USA please 
> >> report these guys to the feds? What they are doing is outright 
> >> criminal.
> > hyperbole.  it is not criminal.  you just don't happen to like it.
>
> Actually, as someone pointed out, it might well be conspiracy - which 
> is criminal.

In general, the conspiracy isn't criminal if the conspired act isn't criminal.
If you're trying to make a criminal conspiracy out of non-criminal acts, your 
best bet is probably finding a new way to abuse the RICO statutes.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Alain Hebert
Well,

I do not think feeding the trolls is a good exercise for a
representative of any company that is taking this subject seriously.

Don't you think?

-
Alain Hebertaheb...@pubnix.net   
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 07/28/16 09:07, Justin Paine via NANOG wrote:
> @Baldur
>
> "They just lost all respect from here. Would someone from USA please report
> these guys to the feds? What they are doing is outright criminal."
>
> I'm happy to put you in touch with an FBI agent if you have questions
> or concerns you'd like to discuss.
>
> 
> Justin Paine
> Head of Trust & Safety
> CloudFlare Inc.
> PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D
>
>
> On Thu, Jul 28, 2016 at 4:01 AM,   wrote:
>> On Thu, 28 Jul 2016 12:00:00 +0200, Baldur Norddahl said:
>>
>>> DDoS attacks using stolen resources and fake identities is not legal
>> Are you making a blanket statement that covers all jurisdictions on
>> the planet?
>>
>> For bonus points - is it more like "illegal as in murder", or "illegal
>> as in jaywalking"?  (Hint - which one will you get a DA to actually
>> press a case that almost certainly crosses jurisdictions, and may involve
>> extradition proceedings?)
>>
>>



Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Justin Paine via NANOG
@Baldur

"They just lost all respect from here. Would someone from USA please report
these guys to the feds? What they are doing is outright criminal."

I'm happy to put you in touch with an FBI agent if you have questions
or concerns you'd like to discuss.


Justin Paine
Head of Trust & Safety
CloudFlare Inc.
PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D


On Thu, Jul 28, 2016 at 4:01 AM,   wrote:
> On Thu, 28 Jul 2016 12:00:00 +0200, Baldur Norddahl said:
>
>> DDoS attacks using stolen resources and fake identities is not legal
>
> Are you making a blanket statement that covers all jurisdictions on
> the planet?
>
> For bonus points - is it more like "illegal as in murder", or "illegal
> as in jaywalking"?  (Hint - which one will you get a DA to actually
> press a case that almost certainly crosses jurisdictions, and may involve
> extradition proceedings?)
>
>


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Valdis . Kletnieks
On Thu, 28 Jul 2016 12:00:00 +0200, Baldur Norddahl said:

> DDoS attacks using stolen resources and fake identities is not legal

Are you making a blanket statement that covers all jurisdictions on
the planet?

For bonus points - is it more like "illegal as in murder", or "illegal
as in jaywalking"?  (Hint - which one will you get a DA to actually
press a case that almost certainly crosses jurisdictions, and may involve
extradition proceedings?)




pgp5bfulqWiij.pgp
Description: PGP signature


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Baldur Norddahl
On 28 July 2016 at 11:30,  wrote:

> In general, the conspiracy isn't criminal if the conspired act isn't
> criminal.
> If you're trying to make a criminal conspiracy out of non-criminal acts,
> your best bet is probably finding a new way to abuse the RICO statutes.
>

DDoS attacks using stolen resources and fake identities is not legal and it
is not free speech. Moreover it is illegal just as it is illegal for me to
smash your car.

Cloudflare are saying they are not smashing any cars. Cloudflare will
however act as couriers, provide anonymity and protect anyone that does
smash cars. Also Cloudflare sells "protection" against car smashing.

But all this is just free speech - sorry no, this is not any better than
what the mafia guys are doing in bad parts of the town.

Regards,

Baldur


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-28 Thread Valdis . Kletnieks
On Wed, 27 Jul 2016 22:55:54 -0400, Miles Fidelman said:
> On 7/27/16 10:48 PM, Randy Bush wrote:
> >> They just lost all respect from here. Would someone from USA please
> >> report these guys to the feds? What they are doing is outright
> >> criminal.
> > hyperbole.  it is not criminal.  you just don't happen to like it.
>
> Actually, as someone pointed out, it might well be conspiracy - which is
> criminal.

In general, the conspiracy isn't criminal if the conspired act isn't criminal.
If you're trying to make a criminal conspiracy out of non-criminal acts,
your best bet is probably finding a new way to abuse the RICO statutes.


pgp2kiYIWckmL.pgp
Description: PGP signature


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Christopher Morrow
On Thu, Jul 28, 2016 at 3:55 AM, Miles Fidelman 
wrote:

>
>
> On 7/27/16 10:48 PM, Randy Bush wrote:
>
>> They just lost all respect from here. Would someone from USA please
>>> report these guys to the feds? What they are doing is outright
>>> criminal.
>>>
>> hyperbole.  it is not criminal.  you just don't happen to like it.
>>
>
> Actually, as someone pointed out, it might well be conspiracy - which is
> criminal.


looking forward to the court case, if it's really important it'll happen
shortly, right?


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Miles Fidelman



On 7/27/16 10:48 PM, Randy Bush wrote:

They just lost all respect from here. Would someone from USA please
report these guys to the feds? What they are doing is outright
criminal.

hyperbole.  it is not criminal.  you just don't happen to like it.


Actually, as someone pointed out, it might well be conspiracy - which is 
criminal.


Miles Fidelman

--
In theory, there is no difference between theory and practice.
In practice, there is.   Yogi Berra



Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Randy Bush
> They just lost all respect from here. Would someone from USA please
> report these guys to the feds? What they are doing is outright
> criminal.

hyperbole.  it is not criminal.  you just don't happen to like it.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Paras Jha
I am not a lawyer and I don't pretend to be, but I believe

> the gamer who ticked off another gamer and got DDoSed doesn't
> have the knowledge, time, or resources to file a claim that will actually
> accomplish anything, and nobody else can file the claim on their behalf.

I believe a class action lawsuit would sidestep this. Don't quote me on
that though, I may be wrong.

On Wed, Jul 27, 2016 at 10:04 PM, Paras Jha 
wrote:

> He's right, conspiracy to commit X is a valid criminal charge, at least in
> the US. Conspiracy to commit fraud, theft, murder, racketeering, etc are
> all "sister charges" of charges of ones actually carried out.
>



-- 
Regards,
Paras

President
ProTraf Solutions, LLC
Enterprise DDoS Mitigation


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Paras Jha
He's right, conspiracy to commit X is a valid criminal charge, at least in
the US. Conspiracy to commit fraud, theft, murder, racketeering, etc are
all "sister charges" of charges of ones actually carried out.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Mark Andrews

In message <31450.1469667...@turing-police.cc.vt.edu>, valdis.kletni...@vt.edu 
writes:
> On Thu, 28 Jul 2016 10:48:47 +1000, Mark Andrews said:
> 
> > As soon as a transaction takes place, conspiricy to harm  by
> > .  If the DoS actually occurs you can add additional charges for
> > the actual actions.
> 
> If the claim is that a law has been broken, you have to show that  is
> actually a crime in the jurisdiction involved.  If it's a civil claim, in
> general only  will have standing to actually file suit.  That's a big chun
> k
> of the problem - the gamer who ticked off another gamer and got DDoSed doesn'
> t
> have the knowledge, time, or resources to file a claim that will actually
> accomplish anything, and nobody else can file the claim on their behalf.

There have always been plenty of laws to cover DoS attacks.  You
don't need "with a computer" in the law.  You just need to apply
existing laws.

> > This is no different conceptually to hiring a thug to take a baseball
> > bat to a place.  You can be charged for consipiricy to commit a
> > crime even if the crime does not occur.
> 
> Bringing a baseball bat to a place isn't usually in and of itself
> illegal. Thug A may bring a bat to someplace, but absent evidence that
> Thug B will then use said bat for nefarious purposes, you're still left
> with nothing. You have to draw *all* the dots, Mark. :)

It's the hiring that triggers the conspircy.  The crime has been
committed the moment there is agreement to perform the act.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Valdis . Kletnieks
On Thu, 28 Jul 2016 10:48:47 +1000, Mark Andrews said:

> As soon as a transaction takes place, conspiricy to harm  by
> .  If the DoS actually occurs you can add additional charges for
> the actual actions.

If the claim is that a law has been broken, you have to show that  is
actually a crime in the jurisdiction involved.  If it's a civil claim, in
general only  will have standing to actually file suit.  That's a big chunk
of the problem - the gamer who ticked off another gamer and got DDoSed doesn't
have the knowledge, time, or resources to file a claim that will actually
accomplish anything, and nobody else can file the claim on their behalf.

> This is no different conceptually to hiring a thug to take a baseball
> bat to a place.  You can be charged for consipiricy to commit a
> crime even if the crime does not occur.

Bringing a baseball bat to a place isn't usually in and of itself
illegal. Thug A may bring a bat to someplace, but absent evidence that
Thug B will then use said bat for nefarious purposes, you're still left
with nothing. You have to draw *all* the dots, Mark. :)


pgpsM_PSac81b.pgp
Description: PGP signature


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Mark Andrews

In message <23235.1469666...@turing-police.cc.vt.edu>, valdis.kletni...@vt.edu 
writes:
> On Wed, 27 Jul 2016 11:21:02 -0700, Dan Hollis said:
> > On Wed, 27 Jul 2016, b...@theworld.com wrote:
> > > There isn't even general agreement on whether (or what!) Cloudfare is
> > > doing is a problem.
> >
> > aiding and abetting. at the very least willful negligence.
> 
> aiding and abetting of what, *exactly*?  You can't accuse somebody of
> it until (as Barry Shein pointed out) you have a workable definition of
> what exactly you're talking about.  Similarly, "willful negligence" in most
> places requires you to draw a dotted line between the alleged negligent
> action, and some claimed damage or loss on your part - of a form that
> a court can provide a remedy for.

As soon as a transaction takes place, conspiricy to harm  by
.  If the DoS actually occurs you can add additional charges for
the actual actions.

This is no different conceptually to hiring a thug to take a baseball
bat to a place.  You can be charged for consipiricy to commit a
crime even if the crime does not occur.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Valdis . Kletnieks
On Wed, 27 Jul 2016 11:21:02 -0700, Dan Hollis said:
> On Wed, 27 Jul 2016, b...@theworld.com wrote:
> > There isn't even general agreement on whether (or what!) Cloudfare is
> > doing is a problem.
>
> aiding and abetting. at the very least willful negligence.

aiding and abetting of what, *exactly*?  You can't accuse somebody of
it until (as Barry Shein pointed out) you have a workable definition of
what exactly you're talking about.  Similarly, "willful negligence" in most
places requires you to draw a dotted line between the alleged negligent
action, and some claimed damage or loss on your part - of a form that
a court can provide a remedy for.


pgpr0W03uaLdW.pgp
Description: PGP signature


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Justin Paine via NANOG
>From our side:

 abuse@ reports generates an auto reply indicating where our reporting
form is located.

Reports at our reporting form generate an auto reply confirming we
received the report. All reports filed via the form are reviewed by a
human and at a minimum passed on to
the responsible hosting provider so they are aware and they can follow their
policies to address with their customer.


Justin Paine
Head of Trust & Safety
CloudFlare Inc.
PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D


On Wed, Jul 27, 2016 at 10:35 AM, Christopher Morrow
 wrote:
>
> On Wed, Jul 27, 2016 at 10:58 AM, Paras Jha 
> wrote:
>>
>> I consistently did not even get replies
>
>
> This is a common 'complaint' point for abuse senders. I often wonder why.
> What is a reply supposed to do or tell you?


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Justin Paine via NANOG
Law enforcement (US or international) knows how to contact us if they
have an inquiry to make. We also publish a Transparency
Report that covers those legal inquiries:
https://www.cloudflare.com/transparency/


Justin Paine
Head of Trust & Safety
CloudFlare Inc.
PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D


On Wed, Jul 27, 2016 at 9:32 AM, Steve Atkins  wrote:
>
>> On Jul 27, 2016, at 9:17 AM, Baldur Norddahl  
>> wrote:
>>
>> Den 27. jul. 2016 17.12 skrev "Steve Mikulasik" :
>>>
>>> Disclaimer: I have a ton of respect for Clouldflare and what they do on
>> the internet.
>>
>> They just lost all respect from here. Would someone from USA please report
>> these guys to the feds? What they are doing is outright criminal.
>
> They can monitor (passively or actively) all access to the sites they host, 
> even
> the ones that use SSL, and they often use their close working relationship 
> with
> law enforcement to explain why they don't terminate bad actors on their 
> network.
>
> You can probably assume that "the feds" are intimately aware of what they're 
> doing.
>
> Cheers,
>   Steve
>


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Justin Paine via NANOG
Hi Paras,

I covered the booter topic in a previous reply on a different (though
basically the same) thread. By "non-existent" you mean we are
processing thousands of reports per week. If you have something to
report you can certainly do so at cloudflare.com/abuse. We'd be more
than happy to process your report also.

Thanks,
Justin


Justin Paine
Head of Trust & Safety
CloudFlare Inc.
PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D


On Wed, Jul 27, 2016 at 7:37 AM, Paras Jha  wrote:
> Hi Jair,
>
> This list is really interesting.
>
> From just a preliminary test, more than half of these domains are hiding
> behind Cloudflare, and OVH has a sizable fraction too. I suppose it's
> inevitable, given that both are known for having non-existent abuse
> departments.
>
> Regards
>
> On Wed, Jul 27, 2016 at 9:49 AM, Jair Santanna 
> wrote:
>
>> Hi folks,
>>
>> A friend forward me your topic about Booters and CloudFlare. Then I
>> decided to join the NANOG list. The *answer* for the first question about
>> CloudFlare and Booters is at: https://www.youtube.com/watch?v=wW5vJyI_HcU
>> (minute 45:55) given by the _CloudFlare CEO_ in the blackhat2013.
>>
>> I investigate Booters since 2013 and I know many (if not all) the possible
>> aspects about this DDoS-as-a-Service phenomenon. A summary of my entire
>> research (or large part of that) can be watched at
>> https://tnc16.geant.org/web/media/archive/3A (from minute 22:53). On top
>> of that, I developed an algorithm to find Booters and publicly share such
>> list (http://booterblacklist.com/). My main goal with this initiative is
>> to convince people to blacklist and keep on track the users that access
>> Booters (that potentially perform attacks)
>>
>> If you have any question about any aspect of the entire phenomenon don't
>> hesitate to contact me. By the way, I want to help deploy the booters
>> blacklist worldwide and help prosecutors to shutdown this bastards. I have
>> many evidences!
>>
>> Cheers,
>>
>> Jair Santanna
>> jairsantanna.com
>>
>>
>>
>>
>
>
> --
> Regards,
> Paras
>
> President
> ProTraf Solutions, LLC
> Enterprise DDoS Mitigation


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread niels=nanog

* goe...@sasami.anime.net (Dan Hollis) [Wed 27 Jul 2016, 20:21 CEST]:

On Wed, 27 Jul 2016, b...@theworld.com wrote:
There isn't even general agreement on whether (or what!) Cloudfare 
is doing is a problem.


aiding and abetting. at the very least willful negligence.


I hope the armchairs y'all are lawyering from are comfortable


-- Niels.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Dan Hollis

On Wed, 27 Jul 2016, b...@theworld.com wrote:

There isn't even general agreement on whether (or what!) Cloudfare is
doing is a problem.


aiding and abetting. at the very least willful negligence.

-Dan


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread bzs

This is why policy, as painful as it is to produce, is useful.

There isn't even general agreement on whether (or what!) Cloudfare is
doing is a problem.

Which is why interested parties need to get together and agree on some
sort of policy regarding this and similar things.

Or not and just let it go.

That policy could, at least in theory, be attached to peering
agreements, BGP agreements, address allocations, etc as contracts as a
means of enforcement. And if necessary presented to law enforcement or
courts as clearly defined violations of GAAP.

It may not be a law per se but it's the sort of thing a court case
might use, say in a civil damages suit or even law enforcement action,
to establish that defendant's behavior exhibited reckless disregard
and so on.

As an analogy you can't accuse someone of mayhem if no one can be
bothered to write down what mayhem might be and why the defendant
should have known their actions were mayhemic.

-- 
-Barry Shein

Software Tool & Die| b...@theworld.com | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD   | 800-THE-WRLD
The World: Since 1989  | A Public Information Utility | *oo*


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Ken Chase
Because replying admits knowledge and creates a papertrail thereof. Esp.
w.r.t. copyright infringement takedown notices etc.

(or also because said providers are innundated with such requests because they
don't actually care as it's all part of their profit centre.)

/kc


On Wed, Jul 27, 2016 at 01:35:09PM -0400, Christopher Morrow said:
  >On Wed, Jul 27, 2016 at 10:58 AM, Paras Jha 
  >wrote:
  >
  >> I consistently did not even get replies
  >
  >
  >This is a common 'complaint' point for abuse senders. I often wonder why.
  >What is a reply supposed to do or tell you?

-- 
Ken Chase - m...@sizone.org 



Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Christopher Morrow
On Wed, Jul 27, 2016 at 10:58 AM, Paras Jha 
wrote:

> I consistently did not even get replies


This is a common 'complaint' point for abuse senders. I often wonder why.
What is a reply supposed to do or tell you?


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Rich Kulawiec
On Wed, Jul 27, 2016 at 10:37:21AM -0400, Paras Jha wrote:
> From just a preliminary test, more than half of these domains are hiding
> behind Cloudflare, and OVH has a sizable fraction too. I suppose it's
> inevitable, given that both are known for having non-existent abuse
> departments.

Here's the list sorted by DNS provider.  (Of course the DNS provider isn't
necessarily the hoster.)  This list omits domains which don't seem to have
NS records at the moment.

above.com   bootr.org
above.com   formalitystresser.com
above.com   masterboot.net
above.com   olympusstresser.org
above.com   renegade-products.net
above.com   royalbooter.de
arubadns.cz hyperstresser.com
arubadns.nethyperstresser.com
axc.nl  umbstresser.net
bodis.com   vbooter.com
bookmyname.com  evilbooter.net
cloudflare.com  alphastress.com
cloudflare.com  anonymous-stresser.net
cloudflare.com  aurastresser.com
cloudflare.com  beststresser.com
cloudflare.com  boot4free.com
cloudflare.com  booter.eu
cloudflare.com  booter.org
cloudflare.com  booter.xyz
cloudflare.com  bullstresser.com
cloudflare.com  buybooters.com
cloudflare.com  cnstresser.com
cloudflare.com  connectionstresser.com
cloudflare.com  crazyamp.me
cloudflare.com  critical-boot.com
cloudflare.com  cstress.net
cloudflare.com  cyberstresser.org
cloudflare.com  darkstresser.info
cloudflare.com  darkstresser.net
cloudflare.com  databooter.com
cloudflare.com  ddos-fighter.com
cloudflare.com  ddos-him.com
cloudflare.com  ddos.city
cloudflare.com  ddosbreak.com
cloudflare.com  ddosclub.com
cloudflare.com  ddostheworld.com
cloudflare.com  defcon.pro
cloudflare.com  destressbooter.com
cloudflare.com  destressnetworks.com
cloudflare.com  diamond-stresser.net
cloudflare.com  diebooter.com
cloudflare.com  diebooter.net
cloudflare.com  down-stresser.com
cloudflare.com  downthem.org
cloudflare.com  exitus.to
cloudflare.com  exostress.in
cloudflare.com  free-boot.xyz
cloudflare.com  freebooter4.me
cloudflare.com  freestresser.xyz
cloudflare.com  grimbooter.com
cloudflare.com  heavystresser.com
cloudflare.com  hornystress.me
cloudflare.com  iddos.net
cloudflare.com  inboot.me
cloudflare.com  instabooter.com
cloudflare.com  ipstresser.co
cloudflare.com  ipstresser.com
cloudflare.com  jitterstresser.com
cloudflare.com  k-stress.pw
cloudflare.com  layer-4.com
cloudflare.com  layer7.pw
cloudflare.com  legionboot.com
cloudflare.com  logicstresser.net
cloudflare.com  mercilesstresser.com
cloudflare.com  mystresser.com
cloudflare.com  netbreak.ec
cloudflare.com  netspoof.net
cloudflare.com  networkstresser.com
cloudflare.com  neverddos.com
cloudflare.com  nismitstresser.net
cloudflare.com  onestress.com
cloudflare.com  onestresser.net
cloudflare.com  parabooter.com
cloudflare.com  phoenixstresser.com
cloudflare.com  pineapple-stresser.com
cloudflare.com  powerstresser.com
cloudflare.com  privateroot.fr
cloudflare.com  purestress.net
cloudflare.com  quantumbooter.net
cloudflare.com  quezstresser.com
cloudflare.com  ragebooter.net
cloudflare.com  rawlayer.com
cloudflare.com  reafstresser.ga
cloudflare.com  restricted-stresser.info
cloudflare.com  routerslap.com
cloudflare.com  sharkstresser.com
cloudflare.com  signalstresser.com
cloudflare.com  silence-stresser.com
cloudflare.com  skidbooter.info
cloudflare.com  spboot.net
cloudflare.com  stormstresser.net
cloudflare.com  str3ssed.me
cloudflare.com  stressboss.net
cloudflare.com  stresser.club
cloudflare.com  stresser.in
cloudflare.com  stresser.network
cloudflare.com  stresser.ru
cloudflare.com  stresserit.com
cloudflare.com  synstress.net
cloudflare.com  titaniumbooter.net
cloudflare.com  titaniumstresser.net
cloudflare.com  topstressers.com
cloudflare.com  ts3booter.net
cloudflare.com  unseenbooter.com
cloudflare.com  vbooter.org
cloudflare.com  vdos-s.com
cloudflare.com  webbooter.com
cloudflare.com  webstresser.co
cloudflare.com  wifistruggles.com
cloudflare.com  xboot.net
cloudflare.com  xr8edstresser.com
cloudflare.com  xtreme.cc
cloudflare.com  youboot.net
cloudns.net bemybooter.eu
crazydomains.com

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Steve Atkins

> On Jul 27, 2016, at 9:17 AM, Baldur Norddahl  
> wrote:
> 
> Den 27. jul. 2016 17.12 skrev "Steve Mikulasik" :
>> 
>> Disclaimer: I have a ton of respect for Clouldflare and what they do on
> the internet.
> 
> They just lost all respect from here. Would someone from USA please report
> these guys to the feds? What they are doing is outright criminal.

They can monitor (passively or actively) all access to the sites they host, even
the ones that use SSL, and they often use their close working relationship with
law enforcement to explain why they don't terminate bad actors on their network.

You can probably assume that "the feds" are intimately aware of what they're 
doing.

Cheers,
  Steve



RE: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Baldur Norddahl
Den 27. jul. 2016 17.12 skrev "Steve Mikulasik" :
>
> Disclaimer: I have a ton of respect for Clouldflare and what they do on
the internet.

They just lost all respect from here. Would someone from USA please report
these guys to the feds? What they are doing is outright criminal.

Regards

Baldur


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Dovid Bender
As was mentioned in the BlackHat video the DDOS providers don't like
competition and they try to take each other out which is they they nee to
be on clouadfare. If they were all kicked off of Cloudfare then they would
all take each other out leaving no need for clouydfare's DDOS sevices. So
by hosting these companies they are ensuring that they will have business.

(I have no evidence to this. Just a theory..)



On Wed, Jul 27, 2016 at 11:09 AM, Steve Mikulasik  wrote:

> I am sure a lawyer would see it very differently, I could see someone
> looking at this like racketeering. They get paid to provide a service to
> defend against DDoS, well knowingly hosting people who conduct DDoS
> attacks. Cloudflare profits from both the victims and the criminals. If
> Cloudflare isn't acting in good faith to shut down these sites when they
> receive evidence they are bad actors, they could find themselves in a bit
> of trouble.
>
> At this point Cloudflare would know that these bad actors are hosted on
> their service since we know many Cloudflare employees subscribe to the
> NANOG list, and the list of bad actors would now show up in their email
> server, ready for legal discovery.
>
> Disclaimer: I have a ton of respect for Clouldflare and what they do on
> the internet.
>
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Bush
> Sent: Wednesday, July 27, 2016 8:56 AM
> To: Paras Jha 
> Cc: NANOG list 
> Subject: Re: EVERYTHING about Booters (and CloudFlare)
>
> > I suppose it's inevitable, given that both are known for having
> > non-existent abuse departments.
>
> as the OP made pretty clear, it's not a matter of an abuse contact.
> it is the service not acting as a law enforcement agency and asking for a
> court order.  most large service providers operate in that way.
>
> randy
>
>


RE: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Steve Mikulasik
I am sure a lawyer would see it very differently, I could see someone looking 
at this like racketeering. They get paid to provide a service to defend against 
DDoS, well knowingly hosting people who conduct DDoS attacks. Cloudflare 
profits from both the victims and the criminals. If Cloudflare isn't acting in 
good faith to shut down these sites when they receive evidence they are bad 
actors, they could find themselves in a bit of trouble. 

At this point Cloudflare would know that these bad actors are hosted on their 
service since we know many Cloudflare employees subscribe to the NANOG list, 
and the list of bad actors would now show up in their email server, ready for 
legal discovery.

Disclaimer: I have a ton of respect for Clouldflare and what they do on the 
internet. 

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Bush
Sent: Wednesday, July 27, 2016 8:56 AM
To: Paras Jha 
Cc: NANOG list 
Subject: Re: EVERYTHING about Booters (and CloudFlare)

> I suppose it's inevitable, given that both are known for having 
> non-existent abuse departments.

as the OP made pretty clear, it's not a matter of an abuse contact.
it is the service not acting as a law enforcement agency and asking for a court 
order.  most large service providers operate in that way.

randy



Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread J. Oquendo
On Wed, 27 Jul 2016, Paras Jha wrote:

> Hi Justin,
> 
> I have submitted abuse reports in the past, maybe from 2014 - 2015, but I
> gave up after I consistently did not even get replies and saw no action
> being taken. It is the same behavior with other providers who host malware
> knowingly. I appreciate you coming out onto the list though, it's nice to
> see that CF does maintain a presence here.
> 

I for one am glad providers are on the case tackling DoS,
never ignoring abuse, and doing the best they can to
prevent these things:

https://www.linkedin.com/pulse/why-do-networking-providers-like-cybercriminals-so-much-j-oquendo

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

"Where ignorance is our master, there is no possibility of
real peace" - Dalai Lama

0B23 595C F07C 6092 8AEB  074B FC83 7AF5 9D8A 4463
https://pgp.mit.edu/pks/lookup?op=get&search=0xFC837AF59D8A4463


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Paras Jha
Hi Randy,

I've found the vast majority of large service providers to be very
receptive to abuse reports when they contain evidence and valid information.

Regards
Paras


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Paras Jha
Hi Justin,

I have submitted abuse reports in the past, maybe from 2014 - 2015, but I
gave up after I consistently did not even get replies and saw no action
being taken. It is the same behavior with other providers who host malware
knowingly. I appreciate you coming out onto the list though, it's nice to
see that CF does maintain a presence here.

Regards
Paras


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Randy Bush
> From just a preliminary test, more than half of these domains are
> hiding behind Cloudflare, and OVH has a sizable fraction too.

you mean are using cloudflare and ovh services.

> I suppose it's inevitable, given that both are known for having
> non-existent abuse departments.

as the OP made pretty clear, it's not a matter of an abuse contact.
it is the service not acting as a law enforcement agency and asking
for a court order.  most large service providers operate in that way.

randy


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Paras Jha
Hi Jair,

This list is really interesting.

>From just a preliminary test, more than half of these domains are hiding
behind Cloudflare, and OVH has a sizable fraction too. I suppose it's
inevitable, given that both are known for having non-existent abuse
departments.

Regards

On Wed, Jul 27, 2016 at 9:49 AM, Jair Santanna 
wrote:

> Hi folks,
>
> A friend forward me your topic about Booters and CloudFlare. Then I
> decided to join the NANOG list. The *answer* for the first question about
> CloudFlare and Booters is at: https://www.youtube.com/watch?v=wW5vJyI_HcU
> (minute 45:55) given by the _CloudFlare CEO_ in the blackhat2013.
>
> I investigate Booters since 2013 and I know many (if not all) the possible
> aspects about this DDoS-as-a-Service phenomenon. A summary of my entire
> research (or large part of that) can be watched at
> https://tnc16.geant.org/web/media/archive/3A (from minute 22:53). On top
> of that, I developed an algorithm to find Booters and publicly share such
> list (http://booterblacklist.com/). My main goal with this initiative is
> to convince people to blacklist and keep on track the users that access
> Booters (that potentially perform attacks)
>
> If you have any question about any aspect of the entire phenomenon don't
> hesitate to contact me. By the way, I want to help deploy the booters
> blacklist worldwide and help prosecutors to shutdown this bastards. I have
> many evidences!
>
> Cheers,
>
> Jair Santanna
> jairsantanna.com
>
>
>
>


-- 
Regards,
Paras

President
ProTraf Solutions, LLC
Enterprise DDoS Mitigation


EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread Jair Santanna

Hi folks,

A friend forward me your topic about Booters and CloudFlare. Then I 
decided to join the NANOG list. The *answer* for the first question 
about CloudFlare and Booters is at: 
https://www.youtube.com/watch?v=wW5vJyI_HcU (minute 45:55) given by the 
_CloudFlare CEO_ in the blackhat2013.


I investigate Booters since 2013 and I know many (if not all) the 
possible aspects about this DDoS-as-a-Service phenomenon. A summary of 
my entire research (or large part of that) can be watched at 
https://tnc16.geant.org/web/media/archive/3A (from minute 22:53). On top 
of that, I developed an algorithm to find Booters and publicly share 
such list (http://booterblacklist.com/). My main goal with this 
initiative is to convince people to blacklist and keep on track the 
users that access Booters (that potentially perform attacks)


If you have any question about any aspect of the entire phenomenon don't 
hesitate to contact me. By the way, I want to help deploy the booters 
blacklist worldwide and help prosecutors to shutdown this bastards. I 
have many evidences!


Cheers,

Jair Santanna
jairsantanna.com