Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Spam

Spamhaus Calls for Fining Operators of Insecure Servers 170

Barence writes "Anti-spam outfit Spamhaus has called on the UK government to fine those who are running Internet infrastructure that could be exploited by criminals. Those who leave open Domain Name Server resolvers vulnerable to attack should be fined, if they have previously received a warning, said chief information officer of Spamhaus, Richard Cox. When Spamhaus was hit by a massive distributed DDoS possibly the biggest ever recorded at more than 300Gbits/sec — open DNS resolvers were used to amplify the hit, which was aimed at one of the organization's upstream partners. 'Once they know it can be used for attacks and fraud, that should be an offense,' Cox said. 'You should be subject to something like a parking ticket... where the fine is greater than the cost of fixing it."
This discussion has been archived. No new comments can be posted.

Spamhaus Calls for Fining Operators of Insecure Servers

Comments Filter:
  • by LordKaT ( 619540 ) on Wednesday November 27, 2013 @11:33AM (#45538555) Homepage Journal

    Honestly, I used to love Spamhaus, but as the years wore on, I got into the IT world, and I had to interact with them I've come to really loathe them. A decent service, I guess, but every single person that is involved with them comes across like a whining child, and I hate ever having to interact with them.

  • As long... (Score:5, Insightful)

    by Anonymous Coward on Wednesday November 27, 2013 @11:37AM (#45538601)

    ...as server operators can fine Spamhaus for false positives.

  • by rabbit994 ( 686936 ) on Wednesday November 27, 2013 @11:45AM (#45538689)

    For ISPs to simply drop UDP packets that are outbound where source address is not inside their network. Is there some legit use for sending forged UDP packets?

  • Re:A similar case (Score:2, Insightful)

    by msauve ( 701917 ) on Wednesday November 27, 2013 @11:46AM (#45538693)
    Welcome to the new world. It's not the attacker's fault, either. He was abused as a child and bullied in school. Society made him steal from that car, it wasn't free will.
  • Punishment (Score:5, Insightful)

    by Anonymous Coward on Wednesday November 27, 2013 @11:46AM (#45538695)

    Funny how an organisation as Spamhouse, who is guilty of systematic depriving random and quite innocent internet users of connectivity -- and proud of it too -- , suddenly thinks that whomever interferes with their connectivity should be punished by law. Hypocrisy.

    Although I think their service does have its good points, their attitude makes me want to hurl.

  • by bws111 ( 1216812 ) on Wednesday November 27, 2013 @11:46AM (#45538701)

    How are they at all analogues? Emitted radiation can be directly measured, "vulnerability" can not.

  • by Shakrai ( 717556 ) * on Wednesday November 27, 2013 @11:51AM (#45538761) Journal

    That seems like misplaced blame to me. Any connectionless protocol that responds with larger packets than the inbound query can be used for a reflection attack, it's one of the items that comes up from time to time on the NTP Pool server admin's mailing list. We've seen a few attempts at using some of our servers in such attacks, there was a host that went around a few months ago that was sending about 60kbit/s worth of queries to several dozen servers in the pool, mine included. There are a few best practices you can use to mitigate this issue -- noquery with ntpd, firewall rate-limits for both NTP and DNS -- but you'll never actually solve the problem at the application level.

    The proper way to address reflection attacks is for network operators to set up rules that preclude forged packets from leaving their network. There's no reason the router solely responsible for 192.168.1.0/24 should be passing along outbound traffic with a source address of 172.25.1.15. A handful of progressive networks have made this change, but they're the exception, not the rule.

  • by bws111 ( 1216812 ) on Wednesday November 27, 2013 @11:52AM (#45538775)

    If your server is sending huge volumes of spam then it is actually doing something, not just sitting there being vulnerable. Fining someone for being involved in sending spam is completely different than fining someone because they could potentially be used to send spam.

  • by raymorris ( 2726007 ) on Wednesday November 27, 2013 @12:06PM (#45538925) Journal

    That sounds like an awful lot of trouble to avoid taking ten minutes to fix the configuration, or yum update for a correct default configuration. Do you also move to some third world country to avoid the law requiring working turn signals?

  • Re:I wonder... (Score:4, Insightful)

    by Talderas ( 1212466 ) on Wednesday November 27, 2013 @12:23PM (#45539133)

    The way I read the summary it sounded like Spamhaus was seeking revenge over being subjected to a DDoS and desiring to use government to enact it.

  • Fine Spamhaus! (Score:2, Insightful)

    by Anonymous Coward on Wednesday November 27, 2013 @01:09PM (#45539623)

    Agreed. I feel exactly the same way. Once you find out how Spamhaus is operated, you realize the Internet would be better off without them. They're a disgrace.

    Perhaps they should be fined for inattentive and reckless operation of an internet service, KNOWING it's being used to block mail, and KNOWING that their data is crap, full of spite listings and sources from which no abuse comes.

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...