Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Your Rights Online

ISP Restrictions Based on Hardware/Software? 387

An anonymous reader writes "IT Architect magazine is reporting that ISPs are working towards a greater restriction of a customer's right to run what may be 'insecure' software. From the article: 'A greater threat is that ISPs may try to restrict the customer's side by denying access to machines based on their hardware or software configuration. [...] former head of cybersecurity, White House terrorism advisor Richard Clarke even said it should be made mandatory to quarantine malware.' Something that may also come as a surprise to some is that Microsoft is completely against this censorship of internet access. 'According to Chief Privacy Officer Peter Cullen, Microsoft is against ISPs doing anything that would restrict customers' choice of software. And he says this isn't just about the impracticability of demanding that data centers patch everything on the second Tuesday of the month. Laptop and home users also have the right to run an insecure PC.'"
This discussion has been archived. No new comments can be posted.

ISP Restrictions Based on Hardware/Software?

Comments Filter:
  • by blair1q ( 305137 ) on Tuesday December 27, 2005 @09:05PM (#14349169) Journal
    I've said it before, I'm saying it now, I'll say it every time someone tries to enforce security on The Internet:

    THE INTERNET IS NOT SECURE

    By connecting to it you must expect to be probed, attacked, sniffed, decrypted, spammed, hacked, and denied service. In order to avoid these things either you must not connect to it, or you must take measures that degrade its performance in order to eliminate some of these possibilities. But you will never make it secure, because it is not secure.

    If you want a secure network, you will have to start over from scratch.
  • by AndroidCat ( 229562 ) on Tuesday December 27, 2005 @09:06PM (#14349178) Homepage
    Argh, this was a reply to the post above the one my big fat mouse clicked reply on.
  • by Anonymous Coward on Tuesday December 27, 2005 @09:07PM (#14349180)
    "If you don't like your ISP's TOS, find a different one. But don't confuse you right to run an insure PC with your right to abuse your ISP's network -- you do not have the latter."

    "When everything's a right, nothing is a right." [stgeorgepress.com]
  • by suitepotato ( 863945 ) on Tuesday December 27, 2005 @09:20PM (#14349251)
    At the risk of pointing out the obvious, but - does it surprise anyone that the maker of the #1 target for malware writers is actively campagining against ISPs downthrottling infected users' PCs? I mean, if customers found out that Microsoft Windows = your ISP cuts down your rate, are people more or less likely to buy Windows? Their actions seems like obvious good buisness practice to me.

    What percentage of all Internet users are on Windows versus everything else?

    Okay, so this is NOT a good business practice. Disenfranchising 90%+ of all Internet users is just plain stupid. Right up their with a multitiered Internet where big carriers can throttle your traffic if it comes from IP addys other than in their blocks or is aimed at ports they believe signify what is in their opinion unimportant traffic.

    This is plainly a stupid idea on multiple levels.
  • Re:Err.... (Score:3, Informative)

    by AndroidCat ( 229562 ) on Tuesday December 27, 2005 @09:39PM (#14349346) Homepage
    Check the FA. The fools want people to run client-side software to verify that all your software and hardware are on the approved list. ("Gee, does your client run on PC/104 ARM9 hardware?")
  • No problem. (Score:3, Informative)

    by jd ( 1658 ) <imipak@yahoGINSBERGo.com minus poet> on Tuesday December 27, 2005 @10:31PM (#14349540) Homepage Journal
    I'll just tell them it's a Windows screensaver [slashdot.org]. Failing that, I'll just gross them out [bbc.co.uk] until they give up and go home.
  • by spongebill ( 941756 ) on Tuesday December 27, 2005 @10:39PM (#14349584)
    verizon wireless is already doing this over their unlimited broadband 500kbps wireless data plan for 60 bucks a month restricts the user from ANY large upload or downloads. here, this quoted from verizon's website.
    PROPER USES:
    "Unlimited NationalAccess/BroadbandAccess:
    Subject to VZAccess Acceptable Use Policy, available on www.verizonwireless.com. NationalAccess and BroadbandAccess data sessions may be used with wireless devices for the following purposes: (i) Internet browsing; (ii) email; and (iii) intranet access (including access to corporate intranets, email and individual productivity applications like customer relationship management, sales force and field service automation).

    SUCH USE DESCRIBED BELOW WOULD BE SUBJECT TO TERMINATION OF SERVICE CONTRACT
    Unlimited NationalAccess/BroadbandAccess services cannot be used (1) for uploading, downloading or streaming of movies, music or games, (2) with server devices or with host computer applications, including, but not limited to, Web camera posts or broadcasts, automatic data feeds, Voice over IP (VoIP), automated machine-to-machine connections, or peer-to-peer (P2P) file sharing, or (3) as a substitute or backup for private lines or dedicated data connections."
  • Re:Even if... (Score:3, Informative)

    by Kjella ( 173770 ) on Tuesday December 27, 2005 @10:42PM (#14349594) Homepage
    What about Linux users? Well, there's always the IP Personality patch. This disguises your OS, so that common methods of fingerprinting your computer will return the OS identity that you choose. You can always make a Linux box look like Windows XP or whatever.

    That's probably another concern of Microsoft. Linux distributions can be easily modified to fool such restrictions and existing Linux users will likely install the necessary patches. (...) I'm all for these restrictions, because they don't apply to Open Source software - masquerading as other software is already quite standard.


    You can not have read much about trusted computing, and in particular trusted network connect. Without the proper TCPA signatures, Linux won't be able to fake being a Windows box. The OS fingerprinting of today relies on implementation differences, and is a completely other ballpark than trying to forge a digital signature.
  • Re:Well... (Score:3, Informative)

    by ocbwilg ( 259828 ) on Wednesday December 28, 2005 @12:14AM (#14349970)
    Imagine if people suddenly got booted off and told it was because their computers needed repair, then they'd find out what's wrong (spyware/viruses) and why (holes in Windows), and then some of the more intelligent ones would investigate alternatives like Apple and Linux.

    You're vastly oversimplifying. Firstly, most home PC users can barely figure out how to begin to use Windows. If you throw something completely new at them (Linux or OSX) they will probably be even worse off than where they started.

    Secondly, you're assuming that it's impossible to have a secure Windows PC, and that simply isn't true. My home PCs run Windows XP and are secured. My place of employment is about 95% Windows XP, and we haven't had any security incidents or security related downtime since we opened over two years ago. No PC platform will ever be 100% secure and exploit-proof, but you can make pretty much any current platform secure enough to not be a threat to the Internet. If a user is faced with learning how to secure Windows (possibly with a minimal additional hardware/software investment) versus scrapping the whole thing and learning a whole new OS, and how to secure it (possibly with a minimal additional software investment or a completely new PC purchase), they will probably stick with Windows.

    And that's the big thing about Windows, it is relatively easy to secure it for connecting to the Internet. For example:

    1. Download and install a decent antivirus/firewall package. You can buy one for $50 or less from most securty vendors, or you can get a free package like Avast or AVG with ZoneAlarm or Windows Firewall.

    2. Turn on automatic updates so that security patches are installed automaticall when they become available. Or for the more paranoid (like me), set it to automatically notify you when they are available so that you can review them or test them before using them.

    3. (optional but highly recommended) Spend $30-$50 for a DSL/cable router/firewall with NAT capability.

    4. Don't open messages from strange or unknown sources, and don't open unexpected attachments from known sources.

    If you have a Windows PC and follow those 4 simple steps you should very rarely, if ever, have security issues.
  • by Animats ( 122034 ) on Wednesday December 28, 2005 @01:08AM (#14350152) Homepage
    Users with a LAN aren't really examinable by the ISP anyway. And by now, most users need a LAN, just so the home PC, the game console, and the TV can coexist.

    The ISP's first responsibility is IP egress filtering. The ISP must validate the outgoing source IP address of each packet. This at least prevents the most annoying types of denial of service attacks. Most competent ISPs do this now, although some of the cable guys are weak in this area.

    The ISP's second responsibility is outgoing mail rate limiting. That's enough to slow down zombie-based spam. If the outgoing mail rate exceeds some reasonable threshold, the user should get a phone call, even if the phone call is automatically generated.

    The ISP's third responsibility is incoming mail spam filtering. This should include virus filtering.

    Incidentally, ISPs which block outgoing TCP ports should return an ICMP message (type Destination Unreachable, code Communication Administratively Prohibited). At least then you know what's going on, and who's doing the filtering.

  • Re:The Horses Mouth (Score:3, Informative)

    by Crudely_Indecent ( 739699 ) * on Wednesday December 28, 2005 @11:01AM (#14351752) Journal
    I know exactly what you mean about the 10 year olds. There was one kid that called at least once a week to do some nifty thing with his pda (some kid version of a PDA that was actually pretty cool)

    Every time he called, he had read about something and wanted to try setting it up between his router and his pda....he was patient, took notes, followed instructions and was generally cool to talk to....on top of it all - he thanked us for our time and assistance. A rare individual.
  • by Andy Dornan ( 942153 ) <dornan@gmail.com> on Thursday December 29, 2005 @10:50PM (#14362259) Homepage
    Richard Clarke's speech about mandatory TNC is here. [bsa.org] (PDF file, and Google doesn't have an HTML version.) I think the date (2001) might be wrong, as that was before the official announcement of TCPA and Palladium.

    There were also some leaked memos that went into more detail. I don't know if they're still on the Web anywhere, but this story [theregister.co.uk] from The Register describes them.

    There are no TPM/TNC-based authentication systems available yet, but plenty of companies sell software-only versions. (These can be spoofed, of course.) The most well-known is Cisco's Network Admission Control ("the self-defending network"). They're intended mostly for LANs, but some vendors are already suggesting that they be used by ISPs [itarchitect.com] (especialy in Wi-Fi hotspots).

    I'd be extremely interested in seeing the Pentium with an onboard TPM, as this is something Intel has denied. (They sell motherboards with third-party TPM chips, but claim not to be integrating it with the CPU itself.)

  • by Alsee ( 515537 ) on Saturday December 31, 2005 @07:55AM (#14369847) Homepage
    Pentium with an onboard TPM, as this is something Intel has denied.

    It's apparently inactive: Intel Prescott micrograph, bottom picture on the page. [chip-architect.com]

    Richard Clarke's speech about mandatory TNC is here.. I think the date (2001) might be wrong

    Yep, 2001. That's the right one. Trusted computing has been in the works for a few years now. The Pentium III CPUID was to be the first step in a step-by-step Trusted Computing deployment, until the backlash.

    -
  • La Grande (Score:2, Informative)

    by Andy Dornan ( 942153 ) <dornan@gmail.com> on Sunday January 01, 2006 @04:33PM (#14375472) Homepage

    Interesting. It could be that the chip-architect article is mistaken, but it was right about Yamhill, and also mentions an Intel patent that involves an on-chip crypto engine. (I think it means #6542981 [PDF] [freepatentsonline.com], not the one referenced.) Alternatively, Intel could be lying, or just have changed plans since 2003.

    But the two aren't really incompatible. The circuitry that the monograph points to is allegedly part of La Grande, Intel's proprietary version of Trusted Computing, not a TCG-compliant TPM. That’s even worse in a way, as it would mean software that only runs on an Intel CPU (and an Intel chipset: La Grande will also require a TPM and AMT [itarchitect.com], a proprietary technology in Intel network cards).

    On-CPU crypto might also have something to do with trusted components. The TCG's long-term plan is to have some form of hardware signing/encryption in everything, not just a single chip in every PC. Most of the focus so far is on graphics/sound cards (for DRM) and keyboards/mice (to stop hardware sniffers), though.

    I was aware that the TCPA predates the official announcements about Palladium, etc., but I thought that meant technical work. It's disturbing that the White House and the BSA were involved so far back, and that they chose the immediate aftermath of 9/11 to talk about it publicly.

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...