Hax0r!

Mar. 22nd, 2005 08:00 pm
andrewducker: (running lego man)
[personal profile] andrewducker
A study was released today which shows that 25% of all zombie drone PCs on the internet are based in the UK.

This is quite obviously because people _don't look after their PCs_ (and, of course, insist on using vulnerable Operating Systems).  The answer, it seems to me, is to prevent these people from inadvertently spewing email to the four corners of the earth.  The answer, it seems to me, is remarkably obvious.

Firewalls.

And not the firewalls you install on your PC, get in the way of things and are so much trouble that they frequently get turned off by frustrated users (although I recommend those too) - I mean a _managed_ firewall.  This sits at the ISP end and blocks all incoming traffic that you haven't specifically asked for.  So if you're confident that you want port 80 open, then you use a webform to open that port up - and if you're not technical to manage that much, then you're perfectly safe from incoming nastiness.

It's not a perfect solution, but it'd save an awful lot of heartache, solve the problems that vast numbers of people have with their PCs being insta-hacked and make the internet that much safer for mankind.

The only problem is that it would undoubtably break some people's applications when it was first switched on, which would mean that more helpdesk calls occurred.  And nobody wants to pay for that, especially if their competitors aren't.  Which means the only way to make it happen is through regulation - imposing a minimum level of service on broadband in the same way that we do for any other utility we want to make safe for the public good.

Date: 2005-03-22 09:32 pm (UTC)
From: [identity profile] sbisson.livejournal.com
I have to disagree. Or rather, I agree that it would be nice, but from bitter experience I can only say: dream on...

Having actually run an ISP, I just can't see it happening. The resources that ISPs have are limited, and firewall management tools too brokencomplex (have you ever tried managing a whole collection of PIXes, let alone several Nokias?). Now, if the firewall manufacturers actually produced tools that worked, and could be easily scripted, then your idea might fly.

Until then, I just tell people to buy Zyxel DSL routers and to run them in SUA mode with the base firewall rule set active.

Date: 2005-03-22 10:50 pm (UTC)
ext_267: Photo of DougS, who has a round face with thinning hair and a short beard (Default)
From: [identity profile] dougs.livejournal.com
> ...if the firewall manufacturers actually produced tools that worked, and could be easily scripted...

Linux and netfilter/iptables? Runs on a knackered old 386 or a brand-new supercomputer, and takes 20 minutes to install and less to configure.

Date: 2005-03-22 11:48 pm (UTC)
ext_267: Photo of DougS, who has a round face with thinning hair and a short beard (Default)
From: [identity profile] dougs.livejournal.com
It can -- but see Simon below, and my reply to him.

Date: 2005-03-22 11:04 pm (UTC)
From: [identity profile] sbisson.livejournal.com
Not really suitable - and certainly unlikely to scale to handling the umber of connections required. It's not Linux or even ip-tables that's the problem here - it's the PC architecture...

I'm unsure as to whether you or Andy actually understand the scale of the problem. You're looking at on-demand reconfiguration of firewall rules on a per-user-basis and most likely assigning dynamic IPs to connections at the same time... When you start to get to the many-thousands of users with varying usage patterns, it becomes a very complex problem indeed.

You really do need hardware that's been designed for the task, and something like an array of Cisco PIX boxen is your most likely candidate. They're superb edge network filters - very fast, and very responsive - and a pig to configure.

The only approach that looks like it would come anywhere near helping would be to tie something into the authorisation process. This means you're going to need to deploy security profiles on an issued IP-basis, which means you're going to need to hack radius significantly in order to do this.

I've done it to deploy specific IP address filtering in Ascend Max arrays, but there were significant problems which meant that once we were over 10,000 users the whole thing became unresponsive, and blew the auth-servers off the net. I ended up having to withdraw the child filtering service, and had to move trial accounts to a dedicated set of Maxes.

Like I said, it's a lovely idea. But no ISP in the country has the time or the resources to deploy it. And that's not getting into the really hairy legal situation that puts them into...

Date: 2005-03-22 11:26 pm (UTC)
From: [identity profile] green-amber.livejournal.com
I really truely wish I understood all this..

Date: 2005-03-22 11:29 pm (UTC)
From: [identity profile] sbisson.livejournal.com
It's alright, you understand the last bit - where they suddenly become responsible for every packet that passes through their networks...

And then there are the court-cases that ensue when l33t haX0r5 manage to get around the firewalls and drop malware on PCs that the owners thought were being protected by their ISPs.

Best effort is by far the safest recourse here!

Date: 2005-03-22 11:52 pm (UTC)
ext_267: Photo of DougS, who has a round face with thinning hair and a short beard (Default)
From: [identity profile] dougs.livejournal.com
> ...actually understand the scale of the problem...

This is true -- I'm used to firewalling a small handful of private subnets, and two or three Internet connections. It doesn't scale briliantly if, as you say, you're using a PC architecture.

I don't know enough about kernel internals to know if it'll scale well on some massively parallel supercomputer with myriads of network interfaces.

PIX are awful to configure, it's true. And very easy to misconfigure, which is worse.

Date: 2005-03-23 08:32 am (UTC)
From: [identity profile] poisonduk.livejournal.com
It'd never work! It's bad enough getting technical assistance from an ISP when you do know what you're talking about, and the ISP's would wipe their hands about giving technical advice - Lets be honest a lot of these drone PCs are probably people running kazaa, because they think it's the only P2P software around.

You'll never educate people - it would just become a drain on the more proficient of us because our family and friends would constantly be asking us to be fortune tellers and answer firewall questions without actually being at the PC.

I agree regarding Firewalls though, considering I'm currently running four silmultaneously on one PC(No-one makes me a drone) - as you know it took me three nights to configure them all correctly to allow me to get P2P working, a lesser mortal would have given up on day 1, uninstalled and disabled them all whilst sitting happily thinking windows firewall would protect them from everything since Mr Gates is such a nice secure guy who would never produce inefficient or unsecure software!

Date: 2005-03-24 06:17 pm (UTC)
From: [identity profile] albanach.livejournal.com
Most the malware is designed to deliver spam. If ISPs would jsut stop outbound SMTP traffic other than authenticated stuff going through the ISPs mail server that would solve a lot of it. There really is no reason for someone on a home internet account to need theur own mail server.

Given some ISPs already do this, it's not a technical problem.

October 2025

S M T W T F S
    1 2 3 4
5 6 7 891011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Oct. 8th, 2025 12:02 pm
Powered by Dreamwidth Studios