Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Botnet Security The Internet Technology

50 ISPs Harbor Half of All Infected Machines 140

Orome1 writes "As the classic method of combating botnets by taking down command and control centers has proven pretty much ineffective in the long run, there has been lots of talk lately about new stratagems that could bring about the desired result. A group of researchers from the Delft University of Technology and Michigan State University have recently released an analysis of the role that ISPs could play in botnet mitigation — an analysis that led to interesting conclusions. The often believed assumption that the presence of a high speed broadband connection is linked to the widespread presence of botnet infection in a country has been proven false."
This discussion has been archived. No new comments can be posted.

50 ISPs Harbor Half of All Infected Machines

Comments Filter:
  • Duh. (Score:4, Insightful)

    by TaoPhoenix ( 980487 ) <TaoPhoenix@yahoo.com> on Thursday November 18, 2010 @07:59AM (#34266846) Journal

    Well, since Verizon and Comcast harbor 10% of all user customer PC's all by themselves, this is not so impressive.

    • Re: (Score:3, Insightful)

      by Chrisq ( 894406 )

      Well, since Verizon and Comcast harbor 10% of all user customer PC's all by themselves, this is not so impressive.

      I was thinking the same thing. What percentage of all PCs doe these 50 ISPs "harbour"? If it is arround 50% there's no story.

      • Re:Duh. (Score:5, Insightful)

        by realityimpaired ( 1668397 ) on Thursday November 18, 2010 @08:16AM (#34266938)

        I'm guessing far fewer than 50%... while I could be wrong, the point they're trying to make is that a handful of small ISP's which don't seem to pay attention to security are a major source of the problem.

        While I know it'll have a bunch of the net neutrality folks up in arms, it's relatively trivial for an ISP to redirect all outgoing traffic on port 25 through their internal mail servers, and to run server-side anti-virus on all outgoing mail. They can go one further, and rather than blacklisting potential viruses, they can work off a whitelist of allowed senders (sender e-mail address, in the case of my ISP), and require secure authentication to relay. My own ISP does exactly that, and while somewhat draconian it doesn't really affect the average user, and, when coupled with a blacklist of known viruses, it does take a significant chunk out of the potential to cause harm to others if you get infected yourself.

        • Re:Duh. (Score:4, Interesting)

          by mikael_j ( 106439 ) on Thursday November 18, 2010 @08:28AM (#34267008)

          Unfortunately I've worked for several ISPs that had the bad habit of enforcing the following:

          • Blocked outgoing connections on port 25 for all hosts except their own SMTP relay.
          • Required valid logins on the SMTP relay in order to send emails.
          • Draconian size limits on emails passing through the SMTP relay.
          • Low upper limit on number of emails per day through the relay.
          • Antivirus software that ripped all sorts of benign data from emails for no reason.

          Let's just say there were plenty of issues with users who couldn't figure out how to set things up on their own, not to mention users who found out the hard way that large attachments caused their emails to bounce (somewhere in the 10-15 MiB range IIRC).

          Personally I'd love if there was at least an option for completely unfiltered access (perhaps even proper reverse lookup to deal with the idiots who think reverse lookup is a good way to deal with spam (hint: it's not, way too many legit companies have multiple hostnames on their mail servers or use a third party's mail relay for this to work well, it just gimps email)). Now. I'm not saying this should be for everyone, filter by default but give users an option to turn the filter off completely but display an overly clear "don't do this unless you're absolutely certain you know what you're doing" message that includes a warning about how the ISP will shut them down in a nanosecond if they get any legit spam reports. That way those who really want/need unfiltered access can have it while the rest of the users can enjoy the walled garden.

          • Re: (Score:3, Insightful)

            by AndGodSed ( 968378 )

            While I largely agree, I am of the opinion that large mails are a bad idea. That said, email is no longer a communication protocol, but an idea/data sharing platform.

            Client side mail programs and the antivirus that go along with them tend to fail when dealing with large mails, so the technology has not caught up with the new usage patterns that are emerging.

            This is especially true for areas where people do not have "true" broadband and the timeout issue crops up. What I have seen happening is that the mail

            • Re: (Score:3, Insightful)

              by ultranova ( 717540 )

              While I largely agree, I am of the opinion that large mails are a bad idea.

              I have often used e-mail to send photographs to people. No, I don't want to set up an "online photo-album" or other such thing, I just want a mail-equivalent for the Internet. Given this requirement, e-mail is the best system available.

              That said, email is no longer a communication protocol, but an idea/data sharing platform.

              Care to explain the difference?

              • While I largely agree, I am of the opinion that large mails are a bad idea.

                I have often used e-mail to send photographs to people. No, I don't want to set up an "online photo-album" or other such thing, I just want a mail-equivalent for the Internet. Given this requirement, e-mail is the best system available.

                That said, email is no longer a communication protocol, but an idea/data sharing platform.

                Care to explain the difference?

                Re the difference:

                Email has previously been a means of communication only. Similar to writing letters and the like. Gradually email has been used to send content along with the letters.

                Lately I see more and more people using email almost as a collaboration tool, architects or engineers (many among my clients are) use it to send plans or technical drawings to each other.

                These technical drawings can cause mails to be ridiculously huge.

                Then graphics designers also tend to send huge images and design studies to

          • Why would you want to send mail from a residential IP? The vast majority of big mail servers will simply block your messages. What's the point of email if you don't have reliable delivery?

            If you want to access your own mail server running elsewhere, it should be trivial for it to allow inbound connections requiring smtp auth on a port other than 25.

            • Re:Duh. (Score:4, Interesting)

              by mikael_j ( 106439 ) on Thursday November 18, 2010 @09:06AM (#34267320)

              Why would you want to send mail from a residential IP?

              Because it should be possible.

              The vast majority of big mail servers will simply block your messages.

              I've found it's more like a minority, and I've even encountered a few that block large swaths of IPs that they have tagged as "residential/dynamic" but will let incoming emails through if there's a proper matching SPF record.

              What's the point of email if you don't have reliable delivery?

              It's only unreliable because some admins are lazy. And boy, it sure is fun when an IP that's been a static business IP for years suddenly gets blacklisted as "dynamic residential"...

              If you want to access your own mail server running elsewhere, it should be trivial for it to allow inbound connections requiring smtp auth on a port other than 25.

              It's still just a workaround that doesn't need to be done if the ISP handles its network properly instead of just randomly blocking ports for shits and giggles. And most only block outgoing port 25 so it's pretty easy to set up your MTA to send via their relay and run the MTA locally anyway, but this still retains the problem of the ISP filtering and messing with outgoing email (as well as the potential loss of outside access if their SMTP relay decides to go down, and I've seen enough ancient Solaris machines handling customer email to have a strong distrust of ISP SMTP relays, it shouldn't be "normal" for it to go down at least 1-2 times per week if you have tens of thousands of customers).

              • Sending mail should be possible - use your ISPs smart host. I don't see any advantage for you in being able to directly connect to other mail servers from a residential IP, and can see lots of disadvantages where ISPs permit it en masse.

                Have you ever run a mailserver for a business? It's not lazy to have tight spam controls - it's business sense. Spam costs money. For a couple of hundred accounts I see days with over 150,000 spam messages coming in. Users couldn't do their job if that were to be landing in

                • Sending mail should be possible - use your ISPs smart host.

                  Yes, I already run my own MTA at home, it just bugs me that I'm being sold an internet connection that is limited by my ISP.

                  I don't see any advantage for you in being able to directly connect to other mail servers from a residential IP, and can see lots of disadvantages where ISPs permit it en mass

                  From my point of view there are definitely advantages.

                  Have you ever run a mailserver for a business? It's not lazy to have tight spam controls - it's business sense. Spam costs money. For a couple of hundred accounts I see days with over 150,000 spam messages coming in. Users couldn't do their job if that were to be landing in their inbox. Filtering residential IPs will knock off 90% of that spam.

                  Yes I have. And of course spam filtering makes sense. But our spam filtering doesn't just rely on "ooh! this IP is in our 'residential' list! let's drop/bounce it!" but we have had issues with others blacklisting our primary external mail server's IP as a "residential" IP thereby making it impossible for us to send emails to them (a

                • Re: (Score:3, Informative)

                  by tlhIngan ( 30335 )

                  There's nothing random about blocking port 25, and no one is doing it for shits and giggles. I'm all for ISPs allowing the port to be opened for a customer where they request it, but seriously, as long as they provide a reliable SMTP server that you can use as a relay, the cost to the end user is almost nil.

                  Use port 587 with SMTP AUTH. Gets around outgoing 25 blocks. It's not "open" in that you have to authenticate with the SMTP server so you're accountable for traffic using your credentials. If you colo yo

              • It's only unreliable because some admins are lazy.

                I guess that makes me lazy. Oh well.

                Because it should be possible.

                It is possible. It's just unlikely that your email will be accepted. If you're sending from a "home/dynamic" range, then YOU have to take the extra steps to distinguish YOUR email from the (literally) BILLIONS of spam messages coming from that same range. Or you can blame the admins who have to deal with those BILLIONS of spam messages.

                It's still just a workaround that doesn't need to be done

            • > Why would you want to send mail from a residential IP?

              CenturyLink's mail service is managed by incompetent boobs (they contract it out to some outfit called "Bigfoot"). Fortunately, Newsguy provides me with excellent service. However, this requires me to connect to Newsguy's mail servers via SMTP.

              • It's trivial to allow authenticated smtp connections on a port other than 25.

                Newsguy allows you to connect to them on 110, 8100, 995 (SSL) / 25, 8025, 465(SSL)

                I fail to see why your ISP blocking 25 should impact you.

            • Re:Duh. (Score:4, Insightful)

              by KingMotley ( 944240 ) * on Thursday November 18, 2010 @12:18PM (#34270068) Journal

              Spoken like a gmail/yahoo/hotmail web user. Sorry, I actually use a real email client, and send/receive emails to and from multiple email accounts all from my one email client.

              See there is this thing called an email standard, and that standard specifies port 25 is used for that purpose. Maybe a better standard needs to be made, but until then I want my ISP to leave port 25 alone. If they catch me sending spam from it, feel free to send me an letter and email and block the port temporarily.

              • Spoken like a gmail/yahoo/hotmail web user. Sorry, I actually use a real email client, and send/receive emails to and from multiple email accounts all from my one email client.

                I use Thunderbird with a gmail account over SSL, and it works just fine.

                See there is this thing called an email standard, and that standard specifies port 25 is used for that purpose.

                The SMTP standard defines that for use of servers. E-mail clients usually use POP or IMAP protocols, which use ports 110 and 143 respectively. So no, y

                • by pjt33 ( 739471 )

                  The SMTP standard defines that for use of servers.

                  Yes. It's quite clear to me that both Albanach and KingMotley are talking about ISPs blocking outgoing connections from customer's computer, arbitrary port to customer's (or recipient's) mail server elsewhere, port 25.

                  What you say about my home ISP requiring me to file a request to host a mail server on port 25 is spot on. But what you perhaps don't realise is that some ISPs operate on the basis that if you want to send e-mail from your home computer, you use webmail or you use the e-mail account which the

                • You really shouldn't try to correct someone when you don't even begin to understand what you are talking about.

                  Port 110 is for POP3, which is for RECEIVING email from a server.

                  Port 25 is for SMTP, which is for SENDING email (from a client OR another server).

                  I suggest starting to read here: http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol [wikipedia.org]

                • As a side note, I tried thunderbird. It sucked. It dies on the install if you try to import multiple email accounts as it tosses up multiple modal dialog boxes that you can't respond to any of them. Once you get passed that, it doesn't even have a threaded view of emails, doesn't sync with iTunes easily, and has a very limited amount of fields for contacts. Even my mobile phone has more fields than that which makes syncing a pita.

                  I wished it worked well, and I've tried looking for an open source email c

              • by Ksevio ( 865461 )
                Are you running an email server on your PC? What is it - the '80s?
                • Sorry, I guess I'm still amazed at how little people actually know that read slashdot these days.

                  No, I am not running an email server, I'm using an email client that uses SMTP/POP3 for sending and receiving email.

                  Not knowing what/how POP3/SMTP work, what are you? In preschool? Or are you one of those people that think the blue e is the internet?

          • large attachments caused their emails to bounce (somewhere in the 10-15 MiB range IIRC)

            If you're sending 10MB attachments via email, you're doing it wrong. Most email servers have an upper limit around 10 MB... converting that email attachment to email format makes it about 30% larger... so anything over 7.5 MB can be problematic.

            Email was never designed for large attachments. Send a link. Use FTP. Find another method out of the 10,000 different ways you could do this.

            • Great, you have a plethora of solutions (as do I), now please explain to someone who spends his/her days using Internet Explorer, Outlook, Excel and a handful of other "office drone tools" how to upload files to an FTP server. Oh btw, if it isn't done in exactly the same way as creating an attachment in Outlook they will never learn. These are the kind of people who call and mail software developers to complain when the "Print" and "Save" buttons have swapped places because they "can't find the print button

              • At work we have setup externally hosted FTP and granted rights to over a dozen users explicitly for this purpose. Our auditors use it to collaborate with our Finance and Accounting departments. They use the built-in Windows tools to accomplish this. So yes it can be done, by nontechnical personnel, in a corporate environment, with minimal effort.
              • by jp10558 ( 748604 )

                Well, I would think they have a choice between:
                1) use an appropriate tool, maybe learning something
                2) Not working.

                Most users I know, even the very office dronish ones, prefer tools that function vs not.

          • Personally I'd love if there was at least an option for completely unfiltered access (perhaps even proper reverse lookup to deal with the idiots who think reverse lookup is a good way to deal with spam (hint: it's not, way too many legit companies have multiple hostnames on their mail servers or use a third party's mail relay for this to work well, it just gimps email)).

            Yes, it's called a business class account with a static IP. Or a dedicated line like a T1/etc. With those, you can do whatever you wa
        • ...the point they're trying to make is that a handful of small ISP's which don't seem to pay attention to security are a major source of the problem.

          No. Quite the opposite. A small number of very large ISPs are a major source of the problem.

        • by rdnetto ( 955205 )

          Better solution: block the commonly exploited ports (25, 80, etc.) for users by default, and offer them an option on the website to enable them.
          This blocks the flow of malware, but still preserves neutrality.
          My ISP (iiNet) does this and it works extremely well, IMO.

    • Re: (Score:3, Interesting)

      by Albanach ( 527650 )

      Do either of them filter outbound smtp?

      It still amazes me that residential broadband connections don't filter this as standard. I guess while it's technically easy, it's all about cost, and it's cheaper to leave a customer running an infected machine than have them call your helldesk.

      • Filter, or block? I run my own mail server, you insensitive clod!

        • Filter, or block? I run my own mail server, you insensitive clod!

          $ vi /etc/postfix/main.cf


          relayhost = smtp.example.com

        • Handling Verizon DSL home service's TOS for the past decade, I thought their ban on "servers of any kind" was enforced for these obvious things.

          In practice, I can "host" games like Unreal Tournament and not get shut down, but the ISPs ARE dropping inbound port 80 traffic to encourage a costly "business plan" upgrade. Still, it's unsettling that they won't put their foot down and disconnect bots like colleges dorm policies do nowadays.

          Regardless, I'm spammed thru e-mail headers from of US broadband bots an

    • by Kvasio ( 127200 )

      hey Americano, are you thinking 10% nationwide or globally?
      Because bots, (hope this is not a shocker for you) are global problem.

      And 10% of global PCs with broadband in Verizon? I don't think so.

      • Comcast + Verizon accounts for approximately 5.5% of the WORLDS connected users.
        Comcast + AT&T accounts for approximately 7.2% of the WORLDS connected users.

        The top 10 ISPs account for 39% of the WORLD connected users, so this story is backwards. One would expect the top 50 ISPs to have much more than 50% of the spammers.

        TOP 10 ISP's in the world (accurate to +- 2 million):
        China Telecom (55 million)
        China Unicom (41 million)
        NTT (18 million)
        Comcast (18 million)
        AT&T (15 million)
        Deutsche Telecom (12 mi

        • Awesome post.
          I just wanted to drill out a moderately insightful First Post.
          (Look! Very little trolling this thread! "Correlation wants to be related to Causation!")

          Glad to know my lightning guess wasn't ludicrous.

          • by Kvasio ( 127200 )

            Last time I checked, 5.5% was way lower than 10%.

            Glad that you're still feeling well. Yes, in FP category this was definitely a +5.

      • Sure, I'll grant you caught me on -1 Nationalism, but I did guess low with zero data and hoped.

        The big surprise is I had no idea China had that many users.

  • They should go infecting machines, cleaning them, and distributing them to other machines. There is no other way, if we look at the nature. Diseases in body are cleaned similarly by defense cells that carry the cleansing information and multiply.
    • Re: (Score:1, Informative)

      by Anonymous Coward

      Umm...somebody tried this a number of years ago. It was called the W32.Welchia worm. It tried to download and install a well-known security patch from Microsoft,

      It didn't make anyone particularly happy, particularly security admins.

      • It angered people mostly because it spread so effectively that it clogged the Internet. If you coded one properly, such that it spread slowly and didn't try to reinfect machines, I think it would be viewed in a much more positive light.
        • by bvimo ( 780026 )

          I got caught by Welchia following a reinstall of Windows 2000. I forgot to install a firewall before getting the updates from MS. It took about 30 minutes before Welchia installed itself.

  • by qbast ( 1265706 ) on Thursday November 18, 2010 @08:03AM (#34266880)
    "I say we take off and nuke the entire site from orbit. It's the only way to be sure."
    • Re: (Score:1, Redundant)

      by natehoy ( 1608657 )

      "Meme over, man! Meme over!"

    • "I say we take off and nuke the entire site from orbit. It's the only way to be sure."

      The problem is trying to find a technical solution to a personal problem. Users will not exert the effort to make their machines secure unless and until they perceive a destructive threat to their personal PC.

      We need destructive malware in abundance, so improperly secured machines are taken out of action and the remaining ones build an immune response. Since most computers are used for entertainment, no great loss if a bun

      • by Shark ( 78448 )

        We're a small ISP and we pretty much do just that. We do not filter extensively, we are very quick to respond to abuse@ emails and disable whichever customer is infected instantly. It really didn't take long before most of our user base made the connection: Infected pc = disabled Internet.

        Overall, I think the cost of educating our users was the cheapest alternative. I really don't get why other ISPs don't see it that way.

        • by qbast ( 1265706 )
          I wonder how much of your user base blames you instead. After all other ISPs used by their friends never notice them about infections, so obviously your security sucks if you allow this many viruses through.
          • by Shark ( 78448 )

            I only remember one such cases. We actually explain that unlike big megacorp, we can afford to warn our customers and treat them like human beings. They are typically quite grateful. Especially since they tend to notice their computer working a whole lot better once they have it cleaned up.

  • I mean 50 is half of all the ISPs anymore anyways. Ta dit boom.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      The study (linked to from the fine article) was of 200 ISPs, so 25% of ISPs are responsible for 50% of infected machines. Not surprising at all.

  • "the presence of a high speed broadband connection is linked to the widespread presence of botnet infection..... has been proven false."

    What's this mean? That we can blame dialup users? The article hints that's the case when it says most infected computers are from poor households.

    • Re: (Score:3, Insightful)

      Not linked with high speed broadband != Linked with dial-up.

      And low education is not necessarily linked with dial-up. Here in Portugal we have 12mbps for 20/month, which is affordable by most people, and yet we have terrible education levels compared to the rest of the EU (81% of the working population only have lower basic education levels).

      • "No Speak Americano" ;-)

        But serious: You're right that I jumped to a bad conclusion where poor==dialup. (hits self). Here's what the article actually concludes: "Higher education levels in a country are also conducive to a lower level of infection." And vice-versa presumably.

  • That means that persuading just these 50 ISPs to begin implementing new, more efficient approaches for preventing and eradicating the infection could make a big dent into the botnet market.
    Combat these botnets through some type of mandatory scan and removal tool from their ISP or Microsoft, and also through some tool installed with Windows Update that runs immediately. Not sure exactly how this would be accomplished, but it would be a start.
    • Re: (Score:3, Informative)

      by Spad ( 470073 )

      You mean like the Malicious Software Removal Tool [microsoft.com] which is already offered through Windows Update as a critical update? Or Microsoft Security Essentials [microsoft.com] which either is or will shortly be available through Windows Update as a recommended update?

      • Yes, indeed. MS Security Essentials now seems like it will become a mandatory part of the Windows OS.
        • Err, no. First of all it is an optional update through Microsoft Update not Windows Update. So the user has to have chosen to switch to the Microsoft Updates which will update other MS software installed on the PC eg Office. Secondly it is only offered to users who are not already running A/V software.

      • Or Norton Security Suite, which is available for free for Comcast subscribers?

        OK, so it's not mandatory, but at least it's free, and you gave me the opening to mention it for any Comcast users who might not be running current AntiVirus to save money (or might be wasting money buying a Norton subscription when a FREE one is readily available to them).

        No more excuses, my fellow Comcasters, it's FREE (*).

        http://security.comcast.net/norton/resi/?cid=NET_33_258 [comcast.net]

        (*) "FREE" means "included with your overpriced, ove

        • by Spad ( 470073 )

          Say what you will about Norton, but it's a shitload better than nothing

          A false sense of security is worse than no security at all :)

        • by jonwil ( 467024 )

          I wouldn't use Norton if you PAID me to do it.

      • And you think our average Joe even knows what the Windows Update Center is, goes there, checks the optional updates, selects the software and installs it?

        Really? I'd like to see that.

        IMO, unless that thing comes as a critical update, that installs without question, it could as well not be there at all. Make nearly no difference.

    • "Combat these botnets through some type of mandatory scan and removal tool from their ISP or Microsoft, and also through some tool installed with Windows Update that runs immediately."

      I run Mac OS X, you insensitive clod!

  • Is that too much to ask for? I`d love to block as many as I can.
    • Is that too much to ask for? I`d love to block as many as I can.

      I don't think it is. And I'm not sure why there isn't a routing option that allows ISPs to apply a metric against a variable like "network naughtiness". Flapping routes can get blackholed -- why not naughtiness? How 'bout it science?

  • by Rosco P. Coltrane ( 209368 ) on Thursday November 18, 2010 @08:33AM (#34267046)

    The real shocking truth here is that one single OS harbors the vast majority of botnets and viruses. That OS should be the real target, not ISPs or poor users or something. Sheesh...

    • Re: (Score:2, Insightful)

      by stylewar ( 1942908 )
      guns don't kill people--- people kill people. Fix the OS, and botnets will pop up on a different OS. Botnets exist because of ignorance, not operating systems.
      • Re: (Score:3, Interesting)

        Fix the OS, and botnets will pop up on a different OS

        That is indeed the common wisdom. However, somehow I'm not convinced that's entirely true: Linux and MacOS machines have been around for a long time, and even if the represent a small (albeit growing) segment of the market, they're there and you'd think many pieces of malware would have cropped up on these platforms already. Yet it just hasn't happened: there are some, but nowhere near what you'd expect if the latter OSes were as insecure as Windows.

        The o

        • It isn't just catering to "noobs" that causes Windows to be insecure, it's very much the culture of Microsoft itself. Microsoft managers are still stuck in the late 90s mentality that their biggest competitor is themselves. The managers constantly try to backstab eachother and refuse to work together on almost anything, and thus security, much like every other component of the OS, is a incoherent, bloated mess. Take the firewall settings in WIndows XP for example. There are no less than 3....THREE! diff
        • Re: (Score:2, Insightful)

          by moeluv ( 1785142 )
          I won't dispute that windows has it's share of holes that is true. The thing is they end up being found more often because 90% PC's run it. If Linux or macOS had that market share they would be put under the same magnifying glass buy exploit writers. It's the same reason that more legit software is written for Windows than macOS or Linux. The writers want as wide a distribution as possible.
        • indeed...i've had theunpleasant experience while traveling to need to set up a c2c wifi cnxtn on a pc that uses an at&t gsm dongle 4 its internet access:-P after enabling that network device to share its cnxtn, i setup a c2c.

          then on my mac i connect...but then the pc tries 2 disconnect the gsm:-\ and after i'm finished w/ the cnxtn, the pc forgets it's a c2c, and adds it to its wireless list, making it unavailable 4 c2c, even tho i've told it 2 remember it...

          no wonder micro$serfs r so sorry;-}

      • Nope, that's the Microsoft apologist way of thinking.
        • UNIX and Mac have been around longer than Windows and do not require antivirus, anti-malware or malicious software removal tools.
        • Linux is newer but still does not require antivirus, anti-malware or malicious software removal tools.
        • There exist ZERO versions of Windows which should not have antivirus and anti-malware software installed and running at all times.
        • Even if a computer running Windows is removed from the network, it should still be protected. Sim
      • by Shark ( 78448 )

        I don't think this is Troll (but I posted earlier so no modpoints). I think it's a very valid point.

    • If you want a single unifying factor behind botnets, look for things like greed and the like on the part of the botmasters.

      Unfortunately those are a lot harder to combat than technical measures against infected computers.

    • by MobyDisk ( 75490 )

      Actually, one single planet harbors all of the botnets, viruses, and Justin Bieber fans. That planet should be the real target, no operating systems or poor ISPs or something. Sheesh...

  • Sandbox (Score:2, Interesting)

    A friend of mine who was tasked with looking after a university network years ago had a setup that worked well. When the user first connected, they were put in a sandbox, and thus not allowed outside access. They would be greeted with a web page stating that their computer was being scanned for ports well known for viruses and/or spyware. Once the scan was completed, which took about 60 seconds IIRC, they were allowed access to the Internet. Perhaps there is a way that ISP's could do the same sort of thing?
    • I've been online continuously for months; since our last blackout. What good is a one minute scan last spring going to do?
    • by jonwil ( 467024 )

      Wont work for the 1000s of people using home routers with NAT to allow connection of multiple devices with a single world-facing IP address.

  • My site at home has been under a distributed hack attempt (a long list of IPs all trying to ssh in as root*) for days now. On the first day the attempts were quite frequent; approaching 1 per minute. Now on day 4 the attempts are trickling it as infrequently as one every 20 minutes. A system on a reasonably fast connection could on its own surpass the 1/minute barrier when running a dictionary password attempt through ssh if it wanted to; hence this looks like it could well be systems on slow connections. Add in that some IPs disappear for a while and then come back - as if the PC is logging off and then on again - and it certainly does look like a low-speed botnet.

    * Naturally, my ssh denies all root attempts. Even if they got the password right they wouldn't know it, because the rejection would be the same. Other botnets have tried whitepages-style attacks using long lists of common user names and not matched any allowed users on my system as well.

    ** Yes I know I could just change my ssh port and much of this would go away. But I find it amusing and I have bandwidth to burn.
    • ** Yes I know I could just change my ssh port and much of this would go away. But I find it amusing and I have bandwidth to burn.

      Do you also have your daily/weekly log reports set to separate the chaff from the wheat so you can distinguish between worrisome attempts and the background noise?

      The biggest reason to move the port - it cuts down on the message log spam, which often drowns out more important information. If I see attempts on my custom port #, I know I need to take a closer look.

      (Second bi
    • My site at home has been under a distributed hack attempt (a long list of IPs all trying to ssh in as root*) for days now. ... Yes I know I could just change my ssh port and much of this would go away. But I find it amusing and I have bandwidth to burn.

      I have a home server exposed to the wild internet by only port 22. It's an old machine, and it only allowed a single authorized user to log in, only with key authentication, not password. Nonetheless, the attacks would sometimes come in at such a rate that

      • face it, denying an authentication doesn't cost much bandwidth, but it can take a few cycles to fail to authenticate a key.

        That is true. However, at the rates that I am usually attacked the CPU usage is trivial. Denying one attack every minute (that is the high end) doesn't do much to my meager P4, and denying one every 20 minutes (as in at this moment) barely counts as noise.

        If the attack frequency suddenly picked up dramatically - which I don't expect to happen on my server - then I would be concerned. But right now I'd say slashdot uses more of my home bandwidth (and CPU time) than the distributed attack does.

    • Re: (Score:3, Informative)

      by PeterBrett ( 780946 )

      Naturally, my ssh denies all root attempts. Even if they got the password right they wouldn't know it, because the rejection would be the same. Other botnets have tried whitepages-style attacks using long lists of common user names and not matched any allowed users on my system as well.

      I usually recommend disallowing password-based authentication, and permitting only key-based logins.

  • very flawed logic (Score:4, Interesting)

    by frovingslosh ( 582462 ) on Thursday November 18, 2010 @08:49AM (#34267170)

    One big problem with this logic is that it is based on IP addresses analyzed from captured spam. The problem with that is some major ISPs (including AT&T) are blocking access to out-of-network e-mail servers, and doing other things to make it difficult for even their legitimate customers to send legitimate e-mail. So this method of knowing where the botnets are would completely miss major botnets if they are unable to get spam out efficiently.

    You may say "Why does that matter as long as the spam is stopped?", but it matters a lot. The machines are still infected and could be used for other things, from denial of service attacks to hosting and spreading kiddy porn to just watching for private data to go by (like banking information and credit card numbers) and report them directly back to the control system. Making major judgments about botnets based only on IP addresses seen in spam is short sighted and foolish. And it also assumes that all botnets are honest enough to not forge IP addresses. Any smart botnet could easily forge the IP address the spam is coming from, to make it that much harder to find. If a clever bot just changed the fourth or even third and fourth part of the IP address and replaced it with a random number, the botnet would look much larger than it really is and make it much harder to track back to the infected machine, but would not be easy to detect by comparing the supposed source IP and the SMTP server from outside the network.

  • Comment removed based on user account deletion
  • Zipf's law strikes again!
  • by wowbagger ( 69688 ) on Thursday November 18, 2010 @09:22AM (#34267468) Homepage Journal

    There is a simple solution to the problem. Unfortunately, being simple does not mean it is easy.

    1) ISPs by default implement some basic filtering:
    1a) do not allow access to port 25, save to their own servers
    1b) do not allow inbound nor outbound access to certain "LAN only" type services (e.g. NFS, SMB/CIFS, etc.)
    2) NOTA BENE: ISPs SHALL allow users to elect to bypass these filters, but:
    2a) This shall require action on the part of the account owner.
    2b) Upon doing so, the account owner SHALL be responsible for their actions
    2b.i) The ISP SHALL provide a contact mechanism (e.g. WHOIS record for that IP) that notifies both the ISP and the account holder of abuses.
    2b.ii) The ISP SHALL act on complaints if the user does not.
    2c) The action to disable blocking SHALL be done in a way that prevents a bot from doing it (e.g. require a phone call to the ISP, or a Turing test, etc.)
    3) ISPs SHALL look for "infected" behaviors, like port scans, BEFORE the traffic leaves their network (remember people, the term "firewall" comes from building codes, where a building is supposed to have MANY levels of firewall. ISPs should be no different).
    3a) such behaviors SHALL be investigated, and potential infectees quarantined and the owners contacted.
    4) ISPs SHALL be required to address complaints
    4a) The SHALL be required to have an automated means to report such abuses. No, Web pages don't count.
    4b) ISPs that fail to address complaints SHALL be listed in such a way that other entities can block them (e.g. DNS-RBLs).

    For too long ISPs have been able to externalize the costs of infected machines. Obviously, any cost a business can externalize will be externalized, and thus the business won't handle it. The solution is to force the costs of infected machines to be internalized to the ISPs. They will, of course, bitch mightily about this - again, no business will allow a previously externalized cost to be internalized without a fight.

  • Who are they? (Score:5, Insightful)

    by HangingChad ( 677530 ) on Thursday November 18, 2010 @09:38AM (#34267620) Homepage
    "The networks of just 50 ISPs account for around half of all infected machines worldwide," say the researchers.

    Who are the 50? Publish the names and IP ranges and let the admins loose on them.

  • Forget about holding the ISPs responsible. There are some defective users and defective products allowing this to happen. If someone is found to be harboring a bot node on their home computer, hold them liable for statutory damages, much like the RIAA sues people for. If those people can demonstrate that they made a reasonable effort and followed accepted guidelines in maintaining their computers, then take the fight to the manufacturer, since the product is clearly defective. We need a New DMCA that holds

  • "50 ISPs Harbor Half of All Machines"

news: gotcha

Working...