Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread Simon Waters
On Tuesday 21 Feb 2006 06:41, you wrote: I've seen more than one estimate that most computers *are* infected by at least one piece of malware/spyware/etc, (including numbers as high as 90%) I've seen 95% quoted - certainly my experience if you go looking for malware in recent Windows desktop

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael . Dillon
Oh geez, here we go again... Search the archives and read until you're content. It's a non-thread. This horse isn't only dead, it's not even a grease spot on the road any more. Are you saying that the problem of spreading worms and botnets is fading? Where do you get your data on this? I

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael . Dillon
How do you get the unwashed masses of ISPs to join the choir so you can preach to them? Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the user's machine. This

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread Jim Segrave
On Tue 21 Feb 2006 (04:15 +0200), Gadi Evron wrote: Christopher L. Morrow wrote: it's also not just a 'i got infected over the net' problem... where is that sean when you need his nifty stats :) Something about no matter what you filter grandpa-jones will find a way to click on the nekkid

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread Gadi Evron
Simon Waters wrote: I've seen 95% quoted - certainly my experience if you go looking for malware in recent Windows desktop machines using IE and Outlook it is pretty much a certainty you'll find it. Most of these tools I was using didn't detect the Sony Rootkit, or other malware, so this will

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Gadi Evron
[EMAIL PROTECTED] wrote: How do you get the unwashed masses of ISPs to join the choir so you can preach to them? Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread John Curran
At 12:26 PM +0100 2/21/06, Jim Segrave wrote: The philosophical discussion aside (latest one can be found under zotob port 445 nanog on Google), presenting some new technologies that shows this *can* be done changes the picture. http://www.quarantainenet.nl/ From the web site: Only a

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael . Dillon
Offer them a free windows infection blocker program that imposes the quarantine itself locally on the user's machine. This program would use stealth techniques to hide itself in the user's machine, just like viruses do. As the defense is local to the user's machine, the attacker can

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael . Dillon
How do you differentiate this infection from the ones they've been preached to to avoid? The same way that people currently differentiate bad software from good software before they install something on their machines. --Michael Dillon

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Jason Frisvold
On 2/21/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the user's machine. This program would use stealth techniques

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Gadi Evron
[EMAIL PROTECTED] wrote: If AV software can protect itself this way, why would anyone build an infection blocker using any less protection? AV software can *try* and protect itself in this and other ways, but that is OT to NANOG. I don't mind discussing it in private though if software

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael . Dillon
When enough votes have been collected, the registry sends the shutdown signal to the end user, thus triggering the blocker program to quarantine the user. Isn't there a risk of DoS though? What's to prevent someone from spoofing those signals and shutting down other users? The

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread John Curran
At 7:45 AM -0500 2/21/06, John Curran wrote: From the web site: Only a selected set of web sites will remain available, for example Microsoft update and the websites of several anti-virus software companies. The quarantine server tells users what is going on and how this problem can be

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread Jess Kitchen
On Tue, 21 Feb 2006, Gadi Evron wrote: Hi Simon, this is indeed a Windows problem due to Microsoft being a mono-culture in our desktop world. Still, there are botnets constructed from other OS's as well. Also, CC servers are mostly *nix machines. Does 'mostly *nix' hold true of the

Re: and here are some answers [was: Quarantine your infected users spreading malware]

2006-02-21 Thread Jim Segrave
On Tue 21 Feb 2006 (08:45 -0500), John Curran wrote: At 7:45 AM -0500 2/21/06, John Curran wrote: From the web site: Only a selected set of web sites will remain available, for example Microsoft update and the websites of several anti-virus software companies. The quarantine server

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Bill Nash
On Tue, 21 Feb 2006, [EMAIL PROTECTED] wrote: Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the user's machine. This program Offering them free software won't

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Jason Frisvold
On 2/21/06, Bill Nash [EMAIL PROTECTED] wrote: If you're talking about a compulsory software solution, why not, as an ISP, go back to authenticated activity? Distribute PPPOE clients mated with common anti-spyware/anti-viral tools. Pull down and update signatures *every time* the user logs

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Valdis . Kletnieks
On Tue, 21 Feb 2006 13:05:35 GMT, [EMAIL PROTECTED] said: How do you differentiate this infection from the ones they've been preached to to avoid? The same way that people currently differentiate bad software from good software before they install something on their machines. If

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Valdis . Kletnieks
On Tue, 21 Feb 2006 10:42:20 EST, Jason Frisvold said: On 2/21/06, Bill Nash [EMAIL PROTECTED] wrote: If you're talking about a compulsory software solution, why not, as an ISP, go back to authenticated activity? Distribute PPPOE clients mated with common anti-spyware/anti-viral tools.

Re: Quarantine your infected users spreading malware

2006-02-21 Thread PC
No, just $24/month (or whatever it is now) for the whole service. You go to a keyword and it does a web based installation widget. It is free as long as you remain a subscriber. I'm not familiar with how this works in AOL land.. Does the end-user need to subscribe to anything other than

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Larry Smith
On Tuesday 21 February 2006 10:26, Jason Frisvold wrote: On 2/21/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Oddly enough, AOL and several other large providers seem to have no problems advertising some variant on 'free A/V software'. Key words there.. Large Provider .. I don't think

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Bill Nash
On Tue, 21 Feb 2006, [EMAIL PROTECTED] wrote: If you're talking about a compulsory software solution, why not, as an ISP, go back to authenticated activity? Distribute PPPOE clients mated with common anti-spyware/anti-viral tools. Pull down and update signatures *every time* the user logs in,

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Bill Nash
On Tue, 21 Feb 2006, Jason Frisvold wrote: On 2/21/06, Bill Nash [EMAIL PROTECTED] wrote: If you're talking about a compulsory software solution, why not, as an ISP, go back to authenticated activity? Distribute PPPOE clients mated with common anti-spyware/anti-viral tools. Pull down and

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Jason Frisvold
On 2/21/06, Bill Nash [EMAIL PROTECTED] wrote: Big deal. You're talking about volume licensing at that point, and offering vendors an opportunity to compete to get on every desktop in your customer base. That's a big stick to negotiate with, especially if you're an Earthlink or AOL. Agreed.

Re: Quarantine your infected users spreading malware

2006-02-21 Thread James
On Tue, Feb 21, 2006 at 07:17:38AM +0200, Gadi Evron wrote: [EMAIL PROTECTED] wrote: On Mon, 2006-02-20 at 23:40:48 +0200, Gadi Evron proclaimed... [snip] I'll update on these as I find out more on: http://blogs.securiteam.com This write-up can be found here:

anybody here from verizon's e-mail department?

2006-02-21 Thread Paul Vixie
last week i became unable to send mail to verizon users: Diagnostic-Code: X-Postfix; host relay.verizon.net[206.46.232.11] said: 550 You are not allowed to send mail:sv18pub.verizon.net (in reply to MAIL FROM command) (the above was from me trying to ask [EMAIL

Maximun effective range of an excuse is... [Was: Re: Quarantine your i nfected users spreading malware]

2006-02-21 Thread Fergie
QED: ATT/SBC also does this for their DSL subscribers... - ferg -- Larry Smith [EMAIL PROTECTED] wrote: The problem with discussing AOL and large provider in the same sentence is that the complete AOL (connection, desktop, tools, etc) function are AOL controlled (walled garden) so they have

Re: anybody here from verizon's e-mail department?

2006-02-21 Thread Martin Hannigan
last week i became unable to send mail to verizon users: Diagnostic-Code: X-Postfix; host relay.verizon.net[206.46.232.11] said: 550 You are not allowed to send mail:sv18pub.verizon.net (in reply to MAIL FROM command) (the above was from me trying to ask [EMAIL

Re: anybody here from verizon's e-mail department?

2006-02-21 Thread Randy Bush
i'd hate to think that i've simply sent too many why-are-you-spamming-me complaints and have been blacklisted. Now, can someone forward this to Paul? I am pleasantly residening in his killfile, according to his last response to my email. are you suggesting that paul might be hoist by his own

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Scott Weeks
- Original Message Follows - From: [EMAIL PROTECTED] Oh geez, here we go again... Search the archives and read until you're content. It's a non-thread. This horse isn't only dead, it's not even a grease spot on the road any more. Are you saying that the problem of spreading

Re: MLPPP over MPLS

2006-02-21 Thread Bill Stewart
I've also heard a variety of comments about difficulties in getting Cisco MLPPP working in MPLS environments, mostly in the past year when our product development people weren't buried in more serious problems (:--) I've got the vague impression that it was more buggy for N2 than N=2. There are

RE: anybody here from verizon's e-mail department?

2006-02-21 Thread Wayne Gustavus (nanog)
First, I'm not on the mail team, so I can't help you directly. Second, your best bet is to attempt contact thru the following web form: www.verizon.net/whitelist - Wayne ___ Wayne Gustavus, CCIE #7426 IP

Re: MLPPP over MPLS

2006-02-21 Thread Hyunseog Ryu
Since PPP doesn't have any way to identify different PVC from physical circuit, MLPPP can not be used for sub-interface required field. For example, if you want to use different VLAN id with dot1q or Frame Relay DLCI, you can not use it with MPLS. Since our customer requires to use multiple

Re: MLPPP over MPLS

2006-02-21 Thread Hyunseog Ryu
Overall, MLPPP may work fine with MPLS as long as you have single virtual circuit from each physical circuit. Such as T1 channel from Channelized DS3... But you have to use sub-interface (logical interface) other than sub-channel from channeliezed circuit, you may have some problem. If you

Re: a radical proposal (Re: protocols that don't meet the need...)

2006-02-21 Thread Bill Stewart
I looked at some of these models back in ~2000, but the dotcom boom ended and I didn't get laid off from my day job, so I didn't go trolling for venture capitalists, and my employer sold off their cable companies - since then, the market economics have changed a lot, and routers have started to

Re: Quarantine your infected users spreading malware

2006-02-21 Thread Vicky Røde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Bill Nash wrote: On Tue, 21 Feb 2006, [EMAIL PROTECTED] wrote: Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the

RE: anybody here from verizon's e-mail department?

2006-02-21 Thread Dennis Dayman
No, but I have forwaded this to the abuse team I used to work in. Some of them are also on Z. Normally this is because the MAIL FROM: failed or rejected sender verfication. -Dennis

RE: anybody here from verizon's e-mail department?

2006-02-21 Thread Dennis Dayman
Second, your best bet is to attempt contact thru the following web form: www.verizon.net/whitelist Good one Wayne! Wasn't that only for all those who were blocked last Christmas even other than ARIN IP space? ;) I sent an email to the mail team and CC'd Paul. Good to see you bud! -Dennis

Re: anybody here from verizon's e-mail department?

2006-02-21 Thread Suresh Ramasubramanian
On 2/22/06, Dennis Dayman [EMAIL PROTECTED] wrote: No, but I have forwaded this to the abuse team I used to work in. Some of them are also on Z. Normally this is because the MAIL FROM: failed or rejected sender verfication. Which probably means Paul is blocking whatever server Verizon is