Good Network Worms Made Simple 137
grabbag writes "Dave Aitel is pitching new technology to create "nematodes," or beneficial network worms for use in large businesses. The idea is to set up a new language and structure to create "strictly controlled" good worms on the fly. A research-type demo was given as the Hack in the Box conference where Aitel talked about a world where "strictly controlled" nematodes are used by ISPs, government organizations and large companies to show significant cost savings."
distributed processing (Score:5, Insightful)
Re:distributed processing (Score:2, Informative)
Re:distributed processing (Score:2, Insightful)
Re:distributed processing (Score:2)
The point is that programmers will make mistakes, and some of these worms will get out on the Internet. The stakes here are much higher than with regular software bugs. The author company/ies will be sued and the authors will be jailed. Intent is not a defence against unauthorised access to systems, at least not in Australia, and I don't imagine it would be in the USA either. Doubly so for corrupting/modifying data on without authorisation.
If a gover
Re:distributed processing (Score:3, Insightful)
You do. If you don't want people exploiting holes in your PC, then patch them yourself.
If you disagree you are entitled to try getting by without patching, instead suing those who take advantage of your PC for theft of resources, or some such, but isn't an ounce of prevention better than a pound of cure? It is surely cheaper to run apt-get update && apt-get upgrade nightly...
Re:distributed processing (Score:2, Insightful)
Re:distributed processing (Score:2)
Re:distributed processing (Score:2, Informative)
Re:distributed processing (Score:2)
Honestly though, I would be more worried about government worms, as those employees are much harder to fire for incompetance, and as a result will likely pay less attention to detail when crafting one of the
Re:distributed processing (Score:2, Insightful)
Should a person patch their systems? Yes. If they don't patch them, should that make it morally correct for someone else to damage or modify their property? No.
Re:distributed processing (Score:2)
Re:distributed processing (Score:2, Informative)
Correct me if I'm wrong, but isn't this the very thing that lead to the creation of the first worm? Some computer guys at Xerox PARC were looking for a way to distribute code/updates across a network, created a self-replicating program, then dubbed it "worm" after a John Brunner novel?
So, not only is this not new... this is just what a worm was supposed to do in the fisrt place.
Re:distributed processing (Score:2, Informative)
The first worms were thought experiments on breaching computer security put into practice by Fred Cohen. You're confused with 'Animal' though. Scroll down to 2 thirds [com.com] for a bit of backstory on that.
Problem (Score:5, Insightful)
Re:Problem (Score:2, Insightful)
Re:Problem (Score:1)
If you make "Nematodes" like this you surely should as well make a control mechanism so they spread nicely and without saturating the networks they're living on.
It's not like you're designing these things and then letting them to wantonly "infect" machines like their malign relatives.
Re:Problem (Score:1)
Re:Problem (Score:1)
Re:Problem (Score:1)
if the concept is proven to work well, then governments could maybe use worms such as these to patch up the machines of idiots who let their machines be turned into tools for spammers/zombies etc, which just clutter up the internet for everyone.
I wonder what less ethical administrations could abuse this system for? Anyway, tinfoil hat aside, I still don't understand why each PC can't periodically query the server to see if relevant updates are available and then download said updates without the user's
Re:Problem (Score:1)
Re:Problem (Score:1)
though I guess the bad ones could also patch up the exploits themselves and create easier ways for hackers to get into the systems.. but again a friendly automated system could be created to access machines via these backdoors and patch them up
And of course the malicious crackers will then create a worm to close that hole and replace it with another one - maybe one that requires special authentication to gain access to, locking out the white-hats. Cue all-out warfare, with network bandwidth being the v
Re:Problem (Score:2)
Who's offering a comprehensive system for doing this? Sure, MicroSoft offers silent system updates in their more recent OSes, but it's obvious that they aren't on top of all of the security holes in their products past and present. Users routinely turn off automatic updates (or never turn them on in the first place). Is MicroSoft planning on fixing all the zombied Windows 98 machines out
Re:Problem (Score:1)
Re:Problem (Score:2)
I'm just saying that while it's being done, we might as well encourage people to do it who *might* have some chance of doing the right thing.
When making worms is outlawed, only outlaws will make worms.
Re:Problem (Score:1)
Okay, but still have issues with this idea.
It proposes to waste even more bandwidth. It hopes that this worm will be able to cope with a multitude of differently configured systems (malicious worms don't care if they accidentally break something, including existing security solutions, but nematodes must be benign). It takes away people's control over their own machines (it's still unauthorized use and access of resources, and against the law in many countries). In addition, how will this solution cope wit
Re:Problem (Score:1)
That's a very good point.
Theoretically speaking, however, all this "nematode" idea is quite interesting
Re:Problem (Score:2)
Suppose, in addition to current automatic OS updates, a machine was placed on the network and listened for attacks. In response to a particular attack, it would send back a response to patch the vulnerability and clean the system.
That doesn't tie up network resources looking to see if machines need patched. It could be argued that until a security hole is exploited, it's not a liability.
Of cou
Re:Problem (Score:4, Insightful)
As these "nematodes" are supposed to be used only by large companies and ISPs, their owner already possesses the network, and thus can apply the exploits to valid targets only.
This is not such bad a concept -- with VERY few exceptions, nearly all networks are full to the brim with idiots. Setting policies can help, but often you have no real way to enforce them. Try telling your clients that that Weather Bug or M$ Outlook is not something they should be using... But if you use controlled exploits right, you can fix the problems without having to deal with just the symptoms.
Re:Problem (Score:2)
How is this any different then setting up a server responsible for pushing out patches? I thought the idea of a worm was to spread from computer to computer. If it stops after one hop, how is it a worm?
Re:Problem (Score:3, Insightful)
Smart worm = a framework. Think of an exploitation framework as merely a component of this worm framework.
Scanning - identify hosts within allowed networks.
Reporting - Hey, we found vulnerabilities XXXX
Exploiting - compromising those hosts
Reporting - Hey, we exploited vulnerabilities XXXX
Patching - Remediating the vulnerabilities on each host
Reporting - Hey, we patched vulnerabilities XXXX
Cleanup - Cleaning up everything
Scanm
Re:Problem (Score:2)
Re:Problem (Score:4, Interesting)
The same goes for system administrators. The corporate network is full of idiots who think they are great admins because they can install product x. Giving these idiots self-replicating code could cause great damage beyond your imagination. Most damaging worms are damaging because some rate limiting code is not coded correctly, or simply not understood by their creators.
Note to BOFH who is reading this with me: no i do not mean YOU.
Re:Problem (Score:2)
Re:Problem (Score:2)
And what about ISPs? And what about companies where bosses are not going to stand an admin telling them what to do? And what about organizations where admins are to "help people", not to "hinder work"?
Personally, I'm lucky to work in a company small enough that I can personally spank every person who does something bad -- and thanks to Microsoft's cooperation everyone knows damn well that they can't affo
Re:Problem (Score:1)
Whether you pull or push the security patch, the transfer bandwidth would be roughly the same. The problems come in with the "polling/spreading" attempts... eg. if
Re:Problem (Score:2)
Wow, that's a cool idea! Can some hacker please get on this right away?
They already do this. (Score:3, Funny)
However, Windows seems to be impervious to this. It just lies there with slime oozing between its legs. (Painst an attractive picture of the kind of fucker who spreads viri, worms and other creepy crawlies.)
Re:Problem (Score:2)
Re:Problem (Score:1)
A suggestion for a name. (Score:1)
How about Network Immune System"? Using "good worm" or "Nematode" will confuse the PHBs or worse alarm them.
Ex. NET ADMIN: "Boss, I want to put a good worm on the system."
PHB (Hearing only the worm part):"No fucking way! No worms on my system!"
And distinguish themselves how? (Score:3, Insightful)
Also, how does this chap expect to get these things to work on *nix environments? does he propose "benevolent" rootkits?
The unsuspecting user doesn't... (Score:2)
RFC 3514 (Score:3, Funny)
Of course, sooner or later, the good worms are going to turn into bad worms themselves and then we'll all be screwed.
Intelligent managed networks? (Score:4, Informative)
Be nice to have worms that watch for machines all the sudden opening ports that they never have before, all the sudden opening up multicast or what not, or even finding that bad machine sending out bad frames on the network.
I can see a lot of flexibility with this, particularly if they are written in some sort of open source scripting language. I guess what I'm getting at is that they could be sort of like an open source distributed IDS/IDP system.
Granted you can do all these things now with a mix of expensive monitoring tools and a lot of config work with tools like ethereal and mrtg and big brother/big sister, etc. But this might be an easier way to do the same thing.
neato
Worms infect a machine, then jump to the next. (Score:4, Insightful)
Why not just run the centralized scanning tools that you mentioned? Why would I want to infect my switches and routers with this? I already have SNMP. Spanning tree kicks in almost instantaniously. The only way a worm would do that would be if it had infected the problem machine (in which case, why not just run a firewall on it) or if it had infected your switchs/routers.
Why not just write the app to run on those in the first place? Why make it a worm? What "expensive" tools?
All you'd need is SNMP and the knowledge to setup your firewall correctly and a machine to receive the syslog messages from your firewall and parse them.
It's far more efficient to have the choke points do the monitoring than to have worms running around on your network.
Worms are only useful for spreading crap to machines you don't control. Once you have control there are so many more efficient ways to push code to them or monitor them.
Re:Worms infect a machine, then jump to the next. (Score:2)
I guess it depends on your environment.
The only way a worm would do that would be if it had infected the problem machine (in which case, why not just run a firewall on it) or if it had infected your switchs/routers. Why not just write the app to run on those in the first place? Why make it a worm?
Because if it's a worm I don't need to dedicate hardware to network monitoring
If your network is broken already ... (Score:2)
But if your environment is already broken, then why not fix it instead of trying to patch it with worms?
And when someone trips over the power cord? The purpose of dedicating hardware is so you can maintain that system at a higher level of availablity.
Having random workstations do the mon
No. (Score:2)
You aren't using a different set of tools. The worm is the transport mechanism to get the tools installed on the machines. The scanning/monitoring apps are the payload.
The worm infects a machine, installs the payload and then the payload does the work.
For a worm to run, the machines have to be open to attack by other machines on the network. In a correctly designed network, the workstations would be better s
The "worm" is only the transport mechanism. (Score:2)
All you're recommending is that instead of a secured network with a centralized management box, the network will be unsecured and a worm will install the same apps on random machines.
The transport mechanism is as "flexible" as it is going to get. Any machine, anywhere on your network can be infected if you let it.
Which just leaves the worm's payload which is the monitoring applications and improving them will not result in any i
Patch Servers Good, Worms Evil (Score:2)
But anything that can do, a well-behaved cleanly-managed patch server can do much better and you don't have to
"strictly controlled" == hubris (Score:4, Insightful)
It's a very worthy goal, but they need to be extremely careful in the coding. One accidental (or malicious) tweak and these worms could overwhelm network resources, DoS the system, or damage valid systems (autoimmune disease).
Re:"strictly controlled" == hubris (Score:2)
Speaking of that, the sandbox these nematodes run in has to be perfect, or else it's just another malware vector.
Nematodes must live at super-root level (Score:3, Insightful)
Exactly! But its worse than that because the nematodes must live outside the sandbox and inside the OS at the highest level of privilege. Catching and removing malware means running at a privilege higher than that of the malicious worms. Because malware tries (and succeeds) in attacking at user and admin levels, nematodes must operate even higher levels. Otherwise the malware can simply dea
Re:"strictly controlled" == hubris (Score:2)
For example, how do you 'control' a brilliant white-hat worm when the code is in the hands of a black-hat?
Wouldn't it be easier to fix things? (Score:5, Interesting)
Rather than constructing a framework around the idea of building "beneficial" worms that work through the same exploits as real worms, and having to respond to security problems by passing around a disinfectant worm by the same (newly dicovered) vectors as the bad worms roaming your network, wouldn't it be a lot easier to fix the operating systems, networks, and the policies applied to them, such that you don't have a malicious worm problem to begin with?
Re:Wouldn't it be easier to fix things? (Score:2)
Re:Wouldn't it be easier to fix things? (Score:1)
wouldn't it be a lot easier to fix the operating systems, networks, and the policies applied to them, such that you don't have a malicious worm problem to begin with?
If I understand your argument correctly, it also applies to patches. Problem being, "to err is human".
Re:Wouldn't it be easier to fix things? (Score:2)
1. find the vulnerability
2. write an exploit
3. write a patch
4. write a program that uses the exploit and applies the patch
5. test it
6. let it do its work
you would have to
1. find the vulnerability
2. write a patch
3. apply the patch using existing infrastructure
But hey, writing worms is cool! (at least, so think these "researchers")
See also my other post Fighting the Symptoms, Not the Problem [slashdot.org].
Re:Wouldn't it be easier to fix things? (Score:2)
Example: DoD.
Re:Wouldn't it be easier to fix things? (Score:1)
If you understand why they shrug their shoulders, you'll understand the serendipity we're trying to harness by building o
Yes, but... (Score:5, Funny)
Re:Yes, but... (Score:3, Insightful)
Re:Yes, but... (Score:1)
Re:Yes, but... (Score:1)
Re:Yes, but... (Score:2)
Produce? (Score:2, Informative)
Beneficial worm?? (Score:5, Insightful)
"Beneficial" according to what point of view? Does the owner of the system get any say in this? If he does, why do we need a worm instead of a normal program that can be voluntarily installed?
If not, then this is just a normal malware worm with added propaganda and spin.
Re:Beneficial worm?? (Score:2)
I do security fulltime. I often see flaws where an organization has a stated policy, and administrators have contravened that, or joe-user has. Or the infamous MS patch reversed a security update and reopened an old vulnerability.
Now, if the CIO of a cabinet level agency dictates that vulnerability XYZ will be remediated across his entire infrastructure and it does not happen by date X, his engineered worm can identify the host, p
Re:Beneficial worm?? (Score:2)
Bob (Score:3, Funny)
Re:Bob (Score:2)
Come on guys, lets think positively here (Score:2)
Mobile Agents (Score:1)
However, some of the (intuited) graph theory looks good, they walk, rather than bouncing backwards and forward to make 'star' shapes and consume resources locally rather than continually use network bandwidth. But all the problems of authentication, permission, capability remain. Don't put one of these on your network at home, kids!
New word, old idea. (Score:3, Interesting)
In my day we called the 'ants'. An idea created by some chap at BT over here in Blighty.
"Old idea,
New name,
15 minutes of fame."
and here is a link (Score:3, Informative)
Fighting the Symptoms, Not the Problem (Score:5, Insightful)
Re:Fighting the Symptoms, Not the Problem (Score:2)
Why?
Complexity/ignorance
You can remediate every vulnerability in existence and a mis-configuration will lead to a compromise. One wrong ruleset on an access control device and *BAM*. Owned.
To date, in all my security work, I have never seen a host that was hardened, lacking vulnerabilities, with proper permissions for everything, proper usage of least privilege, etc. It doesn't happ
Careful about this line, here. (Score:2, Offtopic)
programs wandering around computer systems doing good for people, I have two words:
Bonzai Buddy.
Re:Careful about this line, here. (Score:2)
If I could take Bonzi Buddy, stick it in a really small container and carefully chop bits off it with very small scissors, that would be very cool. I could produce a bizarre midget version. Without all the evil. Bonsai Buddy, yeah, that works.
Even better would be Banzai Buddy. Just a window sitter on top of your favourite editor, which watches and whenever you pull off a particularly nifty hack it waves its arms in the air and cheers you.
Re:I have two more words for you (Score:2)
the Sentinels will overtake the Nematodes (Score:2)
The true world will be revealed when the nematodes finally realize their place in society and are convinced
Nemmy and Clippy (Score:2)
Return of the Evil Bit? (Score:1, Funny)
All your bandwidth are blong to us (Score:1)
next project of this guy (Score:1)
Obligatory simpsons quote (Score:5, Funny)
Skinner: Well, I was wrong. The lizards are a godsend.
Lisa: But isn't that a bit short-sighted? What happens when we're overrun by lizards?
Skinner: No problem. We simply unleash wave after wave of Chinese needle snakes. They'll wipe out the lizards.
Lisa: But aren't the snakes even worse?
Skinner: Yes, but we're prepared for that. We've lined up a fabulous type of gorilla that thrives on snake meat.
Lisa: But then we're stuck with gorillas!
Skinner: No, that's the beautiful part. When wintertime rolls around, the gorillas simply freeze to death.
Welcome to the world of hype (Score:2)
This is not new. Distributed software agents are tried and true. We're using one [landesk.com], and it's working out rather well. Of course, there are countless shell scripts and such that provide similar utility. Ours happens to be able to propagate at our command.
Quarantine! (Score:2)
I propose that the ISPs install vulnerability and infection sniffers. When your
Whoa! (Score:2)
Well, do they have a plan for that?!
"The RISKS are obvious..." (Score:2)
I'll bet we could use some rabbits here in Australia.
Wow, this kudzu would be great for stablizing soil.
These "nematodes" could really be useful.
I've heard something like this before... (Score:2)
Yeah... let's automate/simplify remote execution of code under the guise that it'll only be "used for good" and "by the right people." 8P
A Biological analogue (Score:2)
What also happens is that the weakened vaccine is communicable. Some children who are not vaccinated catch the weakened virus from the children that are vaccinated, and the vast majority of them are also innoculated.
But a very small miniority of children who "catch" the weakened virus don't develop immunity fast en
"takes exploits and turns them into worms" (Score:3, Funny)
Maybe we could name them Sentinels (Score:2, Funny)
Just a worm creation toolkit... (Score:3, Insightful)
2. Create a "worm creation toolkit"
3. Create a GUI for the toolkit
4. Find a good buzz name such as "nematodes"
5. Feed the press with your buzz words
6. Sell your product to entreprises
7.
8. Profit!
Theese guys are just black hats that want to profit from a technology only useful to black hats.
Have a look to http://www.agentland.com/ [agentland.com] for 'smart' programs that can do good.
history repeating itself (Score:2)
Patching (Score:3, Interesting)
Although this seems like a good idea, I can't imagine pushing out worms that are beneficial. Why? Because you're still leaving the security exploit in place! Unless the beneficial worm closes the exploit, and in that case why not just release a patch in a safe an controlled manor?
Are we starting to confuse patching, a process every good security administrator should be familiar with, with "good worms"
DUMB DUMB DUMB! (Score:2, Interesting)
(yes I was young and stupid when I wrote the code in question
What if some one hacks a 'Nematode' ... (Score:2, Insightful)
Re:What about the self-determination of the user? (Score:1)