Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security The Internet Technology

Knocking Infected PCs Off the Internet 206

nk497 writes "Malware could block your access to the internet – but in some cases by those on the right side of the security fence, who are deploying tactics such as blocked ports, letters in the mail and PCs quarantined from the net to combat the most damaging threats. The DNS Changer clean up saw some PCs prevented from accessing the web. Should such tactics be used more often to prevent malware from spreading — or is that taking security a step too far?"
This discussion has been archived. No new comments can be posted.

Knocking Infected PCs Off the Internet

Comments Filter:
  • by Howitzer86 ( 964585 ) on Monday September 03, 2012 @02:57PM (#41215307)

    My local university does this. It's actually a pretty good idea if it's done right. Of course, the other side of the reality is that in addition to knocking infected computers off of the internet, my university also knocks off computers suspected of internet piracy. If you torrent anything on campus, even a legitimate download, you have to go to the Computing Services office to explain yourself and get it back online.

    Our internet service providers are often our media providers. Comcast, AT&T, Time Warner, etc, are all interested in the idea of controlling your access to things like that, and if they're given free range to scan your computer and knock them off the internet - they will certainly look for evidence of torrenting as well.

  • by fustakrakich ( 1673220 ) on Monday September 03, 2012 @02:59PM (#41215319) Journal

    This will be abused. Life is too short to list how and why. Let's just say that people will be knocked off (up?) for expressing something "offensive". Feel free to define that as you wish. The authorities and fanbois will.

  • by Revotron ( 1115029 ) on Monday September 03, 2012 @03:04PM (#41215349)
    ...In other unrelated news, when I had tuberculosis all the restaurants in my area kicked me out when they found me coughing on their salad bars. How dare they stifle my freedoms! Police state!
  • by someones ( 2687911 ) on Monday September 03, 2012 @03:15PM (#41215421)

    Why publically introduce censorship, if you can call it "computer infected by malware".
    'nuff said.

  • by SuperKendall ( 25149 ) on Monday September 03, 2012 @03:18PM (#41215433)

    The thing is, a malware infected system that is attacking other systems is broken - just usually in a way the user of that system does not notice.

    But broken it is, and all blocking/damaging the system does is make it apparent to the user of that system that it is broken, so that they can fix it (or buy a new system).

    It's yet another reason why backups are very important...

  • by girlintraining ( 1395911 ) on Monday September 03, 2012 @03:27PM (#41215507)

    My local university does this. It's actually a pretty good idea if it's done right. Of course, the other side of the reality is that in addition to knocking infected computers off of the internet,

    The problem is that detecting infected computers invariably requires some level of privacy intrusion, and possibly committing numerous felonies to probe the machine. That's why only large organizations do this; because they own all the machines and can dictate that policy. It's entirely another matter when the system isn't owned by you, and that's what's under discussion.

    The internet was designed to allow free and unfettered communication between any and all nodes. On the internet, every IP address was a peer to every other. But then corporations came, and they started walling things off, messing up the protocols, and trying to convert the internet to an asymetrical content distribution network to push their wares. And then the government came in and offered protection to that corruption of the network. Then other countries joined with the same pattern of uptake; And now countries are starting wars or engaging in war-like acts with each other, all to answer the question: Who will control the internet?

    Given that, the question of whether you should be able to attack and offline other nodes on the network, for whatever reason, comes down to whether you believe you should have the same rights on the network as groups, organizations, corporations, and governments. The internet itself doesn't care which side you take -- you're just another peer, and all the ideologies now warring over control of it are heaped on top of it.

    If you're an old school hacker, the answer is obvious. If you're a 20-something, you probably accept intellectual property, and the idea that the internet can be owned (as a collective entity, as membership to, not as individual components).

    As an old-schooler, I will only say this: The Native Americans believed land couldn't be owned. It's a fine ideal. But the other guys had guns, and it didn't matter who was right, only who was left.

  • Hell no. (Score:4, Insightful)

    by PopeRatzo ( 965947 ) on Monday September 03, 2012 @03:32PM (#41215545) Journal

    Let's not bullshit around here. The idea of kicking people off the Internet because of "malware" is about the opposite of security.

    We've already had the RIAA and MPAA try to portray any copied media as malware. There are hacks that will allow you to play you legitimately-purchased game without having to have the disk in the drive that are seen as malware by the major antivirus software.

    How many times over the years have you had to tell your antivirus software to ignore a false positive? What if you'd been thrown off the Internet every time that happened? How long before the big content providers start using this approach to create an ad hoc "two strikes" policy? Or "one strike"?

    Now how about if Comcast decides that if your system is kicked off the Internet for having "malware" that they won't let you use your broadband connection until they are allowed to scan your system remotely?

    Anything that smacks of this kind of centralized, or even potentially centralized control is bad news. Even if it's not centralized now, you know it will be if Comcast (and others) have their way.

    Look, just provide broadband to my house. I'll protect myself and you protect yourself. Unfortunately, the days of just getting "plain old broadband" to your house and then being left alone seem to be dwindling. More and more our use of the Internet is being monitored, tracked. How long before we're knocked off if we don't allow ads in our browsers? Maybe they'll declare ad-block to be "malware".

  • by Truekaiser ( 724672 ) on Monday September 03, 2012 @03:36PM (#41215565)

    Who defines what is malware if this happens.
    I have no doubt that if the isp in question is also a media company, programs that access the internet and are of their competitor's 'might' occasionally be flagged as malware.
    I can also see that alternative o.s.'s could theoretically be flagged as such.

    But above 'all' how could they determine if malware is installed simply from the isp side and without requiring special programs on their customer's pc's to access their services.

  • Dumb pipe (Score:4, Insightful)

    by Oceanplexian ( 807998 ) on Monday September 03, 2012 @03:40PM (#41215593) Homepage
    It really depends on where the "knocking off" happens. If the FBI knocks off some bot's C&C network, then it's fair game. If an ISP were to start blocking ports, addresses, etc, for "spam" reasons, it's the start a slippery slope. I've always been against sender-side spam mitigation for this exact reason.

    Yes, spam/bots are annoying as hell, but it's not the ISP's responsibility. Anything less threatens the very nature of the Internet as an open platform.
  • by pla ( 258480 ) on Monday September 03, 2012 @03:41PM (#41215599) Journal
    This will be abused.

    No kidding, it stuns me that anyone would even consider allowing this as a precedent.

    Two major problems, as I see it:

    First, how do you know my PC doesn't mean to send out thousands of emails an hour? That may come from an infection; I could works as a (semi-legitimate) spammer; or perhaps it just means I run a large listserv. How do you know that I don't mean to port-scan thousands of IPs per hour? That could come from an infection; I could work as a researcher collecting vulnerability statistics; or I might work as a consultant paid to do penetration testing for dozens of companies on an ongoing basis. Opting for a "solution" that would also block legitimate activity counts as a great big "no-no".

    Second, who gets to define "malware"? The major ISPs in the US would love to have even the thinnest possible excuse to outright ban P2P traffic; for an example, look at what happened to NNTP - Once considered a "must-have" ISP service, as soon as Cuomo gave them an out (on the basis of a mere 88 out of 80k groups), they all ditched their USENET servers ASAP. And aside from the opportunity to ban legitimate but undesirable traffic, try explaining to Grandma that the "coupon program" she keeps reinstalling can and will use her machine like a Columbian prostitute. Some people will choose to use spyware, even knowing that fact, for whatever service it provides them; should the ISPs have the right to tell a adult what they can and can't do online?


    All that said, I would still like to see it made legal to hunt down and painfully kill malware authors and spammers. Fix the problem at the source, not the destination.
  • by LourensV ( 856614 ) on Monday September 03, 2012 @03:53PM (#41215685)

    We don't let people drive unsafe cars on the roads, or connect non-FCC certified equipment to the telephone network, or fly uninspected airplanes over other people's rooftops, so why should we let infected computers onto the Internet?

    If it's clearly infected, you quarantine it and make sure all that can be accessed from that machine is instructions on how to remove the infection, updates for virus scanners, etc. Basic common sense.

  • by WaffleMonster ( 969671 ) on Monday September 03, 2012 @03:54PM (#41215695)

    Yes for all cases like DNS Changer the best thing to do is take any C&C systems offline and make no attempt to mitigate any side effects. LEA caused countless thousands to go on about their daily activities with compromised systems and not know about it. Shutting off the damn C&C would have immediatly caused these people to realize they were hacked or hire someone to determine the same. Instead continuing to run the DNS service hid this fact potentially unecessarily endangering people with compromised systems.

    Now if the question is should you deliberatly disconnect someone from the Internet if you don't like or suspect the packets they are sending the answer is hell no.

  • by icebike ( 68054 ) * on Monday September 03, 2012 @04:56PM (#41216167)

    What?

    That makes no sense, even at the level of basic english sentence structure, let alone in the real world.

  • by dreamchaser ( 49529 ) on Monday September 03, 2012 @09:30PM (#41218393) Homepage Journal

    You cannot stop spam without also stopping free speech, since both use the same methods to get their payload delivered. And at its heart, spam is just speech you don't want to hear, much like dissent is speech the government doesn't want to hear.

    There is no way for a computer to reliably distinguish the two, and the only people who can are also biased and have a vested interest in their own agenda.

    Bullshit. When spam is served up by compromising users PC's and running a botnet, which is how most spam is sent, it has nothing to do with free speech. Want to sent 1000 emails a day manually from your own PC? That's free speech.

    As for locking people out, I agree wholeheartedly. By now even mainstream media has run story after story that should open peoples' eyes to safe computing practices. If you get infected you should be cut off until you fix the problem.

Never test for an error condition you don't know how to handle. -- Steinbach

Working...