Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft Networking Security The Courts The Internet Your Rights Online

Microsoft Takes Down No-IP.com Domains 495

An anonymous reader writes For some reason that escapes me, a Judge has granted Microsoft permission to hijack NoIP's DNS. This is necessary according to Microsoft to thwart a "global cybercrime epidemic" being perpetrated by infected machines running Microsoft software. No-IP is a provider of dynamic DNS services (among other things). Many legitimate users were affected by the takedown: "This morning, Microsoft served a federal court order and seized 22 of our most commonly used domains because they claimed that some of the subdomains have been abused by creators of malware. We were very surprised by this. We have a long history of proactively working with other companies when cases of alleged malicious activity have been reported to us. Unfortunately, Microsoft never contacted us or asked us to block any subdomains, even though we have an open line of communication with Microsoft corporate executives. ... We have been in contact with Microsoft today. They claim that their intent is to only filter out the known bad hostnames in each seized domain, while continuing to allow the good hostnames to resolve. However, this is not happening."
This discussion has been archived. No new comments can be posted.

Microsoft Takes Down No-IP.com Domains

Comments Filter:
  • by Anonymous Coward on Tuesday July 01, 2014 @12:09AM (#47357031)

    This is their business the court decided to hand over to Microsoft. Lawsuits should be flying in all directions.

    • Re: (Score:3, Informative)

      by DrJimbo ( 594231 )

      Lawsuits should be flying in all directions.

      Are you suggesting they sue the court? Good luck with that. ISTM the fundamental problem is that the US courts have become the corporations bitches. Who are you going to sue and where are you going to sue them?

      The book Econned [ineteconomics.org] explains how people with a far right economic agenda have been stacking the US courts for years. The result is what you see, basically a feudal systems where corporations are treated like lords and everyone else is a serf.

    • by Anonymous Coward on Tuesday July 01, 2014 @12:24AM (#47357145)

      Microsoft has way more money than whichever company that owns No-ip does. They can't sue and win. Microsoft wouldn't even need to bribe the judge, they can just use scorched earth tactics and let the lawyers suck more and more money until No-ip is dry.
      Also, apparently No-ip didn't appear when summoned. Apparently, that's kinda of a big no-no. Maybe next time they will buy their domains somewhere with proper laws.

      • by man_ls ( 248470 )

        Since I'm replying to an AC post I don't feel a need to include citations, but there's been at least one case where the domains in question were purchased through registrars and registered to owners both outside the United States but because the domains themselves were .com domains and Verizon is the ultimate authority for .com domains, the U.S. simply ordered Verizon to update the global master registry to reflect the seizure and there was nothing to be done about it.

        They'd have to use a non-U.S. TLD as we

        • That's Verisign, not Verizon.

          Though not all the domains in question were .com and .net. For example, no-ip.biz appears to be out and that TLD is run by Neustar, though they're also a US corp.

      • by Sun ( 104778 ) on Tuesday July 01, 2014 @04:53AM (#47358237) Homepage

        Also, apparently No-ip didn't appear when summoned. Apparently, that's kinda of a big no-no. Maybe next time they will buy their domains somewhere with proper laws.

        IANAL. All of this is from following legal procedures.

        Not showing up is a big no-no. A judge can, usually, assume that the party not showing up has nothing to say in the matter, and just accept the petition as is. This is, however, not what happened here. From the first link:

        On June 19, Microsoft filed for an ex parte temporary restraining order (TRO) from the U.S. District Court for Nevada against No-IP.

        Emphasis mine.

        An Ex-Parte petition is filed without the other side being given a chance to answer. This is outrageous act by Microsoft. You ask for an ex-part hearing when there is danger that the other side, if given prior warning of your requested subpoena, will destroy evidence. Since Microsoft is claiming that no-ip are unknowingly hosting malware, this simply wrong.

        Before you go to blame the judge, however, please bear in mind that he can only rule based on the petitions before him. Presumably, a two-party hearing will be held soon, and then things can, and should, go differently. Also, the judge should have ordered Microsoft to place some money in escrow, which no-ip will automatically get in case the temporary restraining order is found to be unjustified.

        What I'm saying is that we don't have enough information so far to conclude that the judge did anything wrong, but the first link, written by Microsoft, clearly shows MS to be douche bags in this case.

        Shachar

        • by Anonymous Coward on Tuesday July 01, 2014 @05:05AM (#47358263)

          Sorry, I do blame the judge. He caused major harm and he should have known he would. I also blame the US justice system, because obvious, easily avoidable injustice is a perfectly acceptable outcome in it as long as just all the is were dotted. We all know that making sure things are done by the rules is the real purpose of the courts!
          Honestly, stop making up excuses for your legal system, no it is not acceptable for it to not only allow but actively encourage injustice like yours does, all the time!

        • by Rich0 ( 548339 ) on Tuesday July 01, 2014 @07:23AM (#47358623) Homepage

          The problem is that we substitute "due process" for justice and define due process as whatever the rules of the court says that it is. Are court rules even legislated?

          Ex parte petitions should only be used in the most extreme of circumstances and there should be a high burden of proof before a court grants them.

          Also, even default judgments should work far differently. The court should examine the evidence itself to determine that there is a reasonable chance of prevailing. I'm not saying that the threshold has to be the same as for a summary judgment, but there should still be an examination of the evidence and arguments, and the judge should be skeptical of any evidence submitted. Ideally the court should just appoint an attorney for the side that didn't show up.

          Also, in a country as large as the US we really need to get rid of this system that assumes that both parties will appear in person for everything. It is already a burden to show up to a local court. If you're summoned to a court on the other side of the country that is a huge expense, especially since it might just be for an hour long hearing. There is no reason that hearings couldn't be conducted via phone in many cases. Another option would be to have telepresence rooms at all courthouses so that you'd only have to show up at a local court. Heck, you could probably fit 5x as many courtrooms in a courthouse if instead of a big room you just had a bunch of individual boxes with a desk, a few chairs, and a screen/camera and the court linked the appropriate boxes together to create a courtroom, even if everybody was at the same facility. Also, for popular cases you could have as many people in the "gallery" as you have bandwidth to serve.

          • Re: (Score:3, Insightful)

            by Sun ( 104778 )

            Ex parte petitions should only be used in the most extreme of circumstances and there should be a high burden of proof before a court grants them.

            Again, IANAL.

            Still, how can you have a high burden of proof? In an adverserial system, the only things you can prove need two opposing parties to present their case. As such, an ex-parte request does not contain proof at all (how can it?)

            Instead, it contains claims backed by sworn testimony. The judge examines these claims in the light most favorable to the non-present party, but otherwise within the context of the claims presented by the moving party.

            In other words, you cannot second guess the judge's deci

        • by Jody Bruchon ( 3404363 ) on Tuesday July 01, 2014 @07:46AM (#47358715)
          Ex parte petitions are how the Business Software Alliance (BSA) gets the local sheriff deputies and police to help them conduct jack-booted thug raids on businesses. I agree strongly: the standards for proof should be extremely high.
        • by AmiMoJo ( 196126 ) * on Tuesday July 01, 2014 @08:11AM (#47358823) Homepage Journal

          Hard to imagine how the money in escrow will undo the massive damage to no-ip's business. Everyone using the service is right this minute switching to alternatives, changing their DNS settings and updating their routers.

          • If NoIP doesn't drain Microsoft's reserves significantly for doing this, then they'll just do it again. It's important to speak to somebody in their native language whenever possible.

      • by GodGell ( 897123 )

        Microsoft has way more money than whichever company that owns No-ip does. They can't sue and win.

        That sentence, combined with the lack of sarcasm or indignation in its presentation, would paint a pretty dystopic picture of any kind of fictional society a paranoid author would want to write about.

        I wish this society remained fictional, and I wish I didn't have to live on the same planet.

      • Try reading a bit deeper. This from the TechNet article:

        On June 19, Microsoft filed for an ex parte temporary restraining order...

        ex parte [wikipedia.org]: "a legal proceeding brought by one person in the absence of and without representation or notification of other parties."

        Translation: Microsoft *never notified* No-IP. There was no summons. There was no notification. There was no chance to file for a stay of judgement or make an appeal.

  • Good judge (Score:5, Insightful)

    by Rosco P. Coltrane ( 209368 ) on Tuesday July 01, 2014 @12:12AM (#47357049)

    The best money could buy.

  • only an excerpt (Score:2, Interesting)

    If a judge granted permission, I have feeling that a domain name service provider may have been guilty of alerting their customers to legal intentions. Which gives credence to locking it down before a new sub-domain is created to deliver the same traffic. While I don't side based on a brief, I don't make adverse statements. I can only surmise.
    • by guruevi ( 827432 )

      I would hope that my ISP's alerts me to legal action. If you have ISP's just complying with every legal request as some already do with DMCA, you can forget about ever getting to anything.

  • And it's microsoft.com, the creator and perpetrator of Internet Explorer and Windows, the two biggest malwares ever invented. They should be shutdown immediately. Thanks.
    • by Anonymous Coward

      I really can't see why this wouldn't be possible using the exact same logic that MS uses.

  • Hotmail? (Score:5, Interesting)

    by Anonymous Coward on Tuesday July 01, 2014 @12:21AM (#47357121)

    So after decades of the community putting Microsoft on notice that HotMail is abused by spammers, can I sieze the domain name?

    • As long as you try to keep it running from your basement as you sort out the bad accounts, sure.

      • As long as you try to keep it running from your basement as you sort out the bad accounts, sure.

        Why? Microsoft doesn't seem to think it necessary to resolve the subdomains that are not included in the list of bad subdomains.

  • In other news Microsoft has come out in support of preserving a free and open web
  • by QuietLagoon ( 813062 ) on Tuesday July 01, 2014 @12:24AM (#47357143)
    Microsoft has pushed upon the world (literally, the world) software that has a history of security issues.

    .
    Now it appears that Microsoft is using their reputation for producing security-challenged software to badger companies for PR purposes. The headlines will all read, ~Microsoft takes down a company that is a security threat~. And Microsoft will look good in the headline.

    But what has Microsoft really accomplished? Will Microsoft's reputation for software with abysmal security be changed? Or will a small company be crushed because a huge company is trying to look good?

  • Legal Precedent? (Score:5, Interesting)

    by wisnoskij ( 1206448 ) on Tuesday July 01, 2014 @12:28AM (#47357163) Homepage
    What is the legal precedent for taking ownership of a company's assets (without apparently even informing them beforehand) and randomly giving them to some other company to use? How is that even a legal possibility?
    • as the kids, today, say, "its because of - well - reasons. that's why!"

      you won't get any more explanation than that.

    • Re:Legal Precedent? (Score:5, Informative)

      by Pinhedd ( 1661735 ) on Tuesday July 01, 2014 @12:48AM (#47357257)

      property used to engage in criminal activity is subject to seizure and/or forfeiture. Domains have been seized in the past due to criminal activity but this has usually accompanied a criminal complaint by a law enforcement agency.

      In this case, despite what the article may imply, Microsoft hasn't seized ownership of the domains. Rather, they used an ex parte temporary restraining order to seize control of the domains so that they may neutralize the source of the maliciousness. The ex-parte aspect is why no-ip wasn't notified. Microsoft managed to convince a judge to grant the order without informing the other party (most likely to prevent no-ip from notifying the malicious users). This will be followed up by a formal hearing, and full control of the domains will be restored to no-ip eventually.

      If Microsoft abuses this, judges won't be so inclined to grant such requests in the future.

      • Re: (Score:2, Interesting)

        by Anonymous Coward

        No, they seized control of the entire business -- the top-level domains, the second-level domains engaging in criminal activity, and all of the second-level domains who were not engaging in criminal activity. The right way to do this is to get a court order to seize the infringing addresses and leave the millions of customers who did nothing wrong alone. This is like the FBI seizing an entire rack or datacenter from AWS because someone served child pornography from a t1.micro instance, and then letting the

        • Second level domains are controlled through top level domains. Do you know nothing about DNS?

      • Re:Legal Precedent? (Score:5, Informative)

        by lister king of smeg ( 2481612 ) on Tuesday July 01, 2014 @01:17AM (#47357411)

        property used to engage in criminal activity is subject to seizure and/or forfeiture. Domains have been seized in the past due to criminal activity but this has usually accompanied a criminal complaint by a law enforcement agency.

        In this case, despite what the article may imply, Microsoft hasn't seized ownership of the domains. Rather, they used an ex parte temporary restraining order to seize control of the domains so that they may neutralize the source of the maliciousness. The ex-parte aspect is why no-ip wasn't notified. Microsoft managed to convince a judge to grant the order without informing the other party (most likely to prevent no-ip from notifying the malicious users). This will be followed up by a formal hearing, and full control of the domains will be restored to no-ip eventually.

        If Microsoft abuses this, judges won't be so inclined to grant such requests in the future.

        Most people I know that use no-ip are people setting up their own minecraft servers its not a hotbed of criminal activivty like MS claims. I use it for my ssh server/freeciv/cloud storage/retroshare and it has been inaccessibly today thanks to microsofts fuckery. claiming that they are a tool of criminal activity is like saying that the internet is a tool of criminal acivity because criminals use it, which is to say anything may be taken away and given to another with this same logic.
        I wonder seeings as Microsoft has fucked with my servers traffic today thanks to this could I go after in court them for maliciously hijacking my sub domain and traffic and have their DNS entries redirect to me with no warning to microsoft.

        • Re:Legal Precedent? (Score:5, Informative)

          by lindseyp ( 988332 ) on Tuesday July 01, 2014 @01:23AM (#47357439)

          I'm one of those Minecraft servers. Goddammit I ony found out why this was happening thanks to slashdot.

          I know my own IP, but none of my users do.

        • I'm sure that you're absolutely correct about that. The vast majority of no-ip's customers are using the service legitimately, I'm certain of this. However, no-ip has certain legal responsibilities as a service provider and if they don't meet them their legitimate customers may end up getting caught in the crossfire.

          For the record, I'm not taking a side as I have no idea what evidence Microsoft presented to get the ruling. I'm just pointing out the legal basis for what occurred.

          • by Rich0 ( 548339 ) on Tuesday July 01, 2014 @07:27AM (#47358643) Homepage

            However, no-ip has certain legal responsibilities as a service provider and if they don't meet them their legitimate customers may end up getting caught in the crossfire.

            What would those be? They're a DNS provider. Somebody tells them that domain A is IP B, and then somebody asks them what the IP for A is, and they say B.

            They don't carry traffic. No attack would come from their servers.

            I could see a court ordering them to lock an account or remove a domain being used to coordinate malicious activity, and then they'd have a duty to comply. However, that isn't what happened here.

        • Security cameras (Score:5, Insightful)

          by Ecuador ( 740021 ) on Tuesday July 01, 2014 @06:01AM (#47358403) Homepage
          Security cameras is another common usage. A low cost installation has some IP cameras on a residential dynamic IP internet service, so you use no-ip for access. I can't access my vacation house feeds today. For all I know there might be gnomes partying around the premises right now. Thanks MS.
          • by modi123 ( 750470 )

            For all I know there might be gnomes partying around the premises right now.

            On the scale of one to ten, how hot are your average gnomes that party at your vacation house?

        • by MrNemesis ( 587188 ) on Tuesday July 01, 2014 @08:07AM (#47358805) Homepage Journal

          Most people I know that use no-ip are people setting up their own minecraft servers its not a hotbed of criminal activivty like MS claims.

          I looked up this "minecraft" of which you speak, and it seems to be some crudely archaic simulation where you wander round indiscriminately smashing rocks together and killing animals - basically a terrorism simulator. I fail to see why anyone would support the use of this software.

          Lots of terrorism-simulator apologists say it's something called an Indy game, but it bears absolutely no comparison with any of the Harrison Ford films (and in any case, an Indy game would require royalty payments to LucasArts which we can find no record of). It doesn't have a proper company behind it like EA or Zynga but only a nebulous cloud of anonymous people known as "notch".

          Not only that, it seems that the hacker group "notch" had their paypal account suspended several years ago due to money laundering and other suspicious activities.

          Frankly anyone who uses this simulator or supports the filth behind it deserves everything they get.

          Richard Domingues

      • by rtb61 ( 674572 )

        Still wildly inappropriate for M$ to be doing this. You could argue that the FBI could do this and even contract to M$ to do it under FBI supervision but no way should M$ have been given carte blache vigilante powers.

        It should have all been laid out. What access was allowed. What end user data was gathered. What is to be do with end user infected systems. What record will be required to be kept of all activities conducted. What recompense the innocent affected parties. How will evidence be preserved and

        • I'd be incredibly surprised if the ruling was carte blanche as you describe. All that we have to go on is one press release and a news report, not the text of the ruling itself, so it's a bit premature to rush to judgement. Many of the stipulations that you suggest were most likely conditions imposed on Microsoft as a part of the ex parte TRO. Even if they weren't required to document some things they would be very wise to do so as it is sure to be brought up at the hearing. In any case, I find it unlikely

      • by mysidia ( 191772 )

        If Microsoft abuses this, judges won't be so inclined to grant such requests in the future.

        What I'm looking for is a procedure where the public can alert the judge, that Microsoft has indeed abused this by causing serious damage to the public: in terms of disruption of internet infrastructure used by millions of Dynamic DNS users.

      • This comes under the general category of "absurdly overbroad".

        It's like pitching an entire city of of their houses because you suspect that there's criminal activity going on somewhere in that city.

        • It's like pitching an entire city of of their houses because you suspect that there's criminal activity going on somewhere in that city.

          Ie standard US policy

  • by Stealth Dave ( 189726 ) on Tuesday July 01, 2014 @12:39AM (#47357207) Homepage

    While I fully blame Microsoft for creating this mess, I'm somewhat dismayed that as a customer I'm finding out that my service is down from a news outlet rather than from noip themselves! I've been using their sub domain wildcard service for 7-8 years now and have just now found out that it's down. I'm none too happy about being thrown out with the bathwater!

    • Even if you were using one or some of the affected domains still this is the type of service where most customers just won't notice any problem, even if they would be technically counted in the millions from TFA.

      Such notification has less operational importance and more PR/image. They might send one eventually, once dust settles.

      PLUS ... they might be having issues with the emails as well! They say now for me:

      Alert: Email communications to your email address on file recently bounced. Please update your emai

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      Just wondering... Considering that their main domain was hijacked. How would you expect them to send email?

  • Affected me (Score:4, Informative)

    by BenJeremy ( 181303 ) on Tuesday July 01, 2014 @01:04AM (#47357357)

    I don't serve anything important... but I usually post images through my local server and upload to imgur "through the web" - it took several retries when I tried to do this a short while ago, and now I know why.

    Thanks, Microsoft.... you can't just take over no-ip and then run it through crap servers that can't handle the loads.

  • I've looked a bit but never really found a package to do this, although it's been a few years. I've got a BSD box, a static IP and some domain names. How would I set it up so that other hosts could use this in a dynamic way to set forward DNS records if they were on an ISP's ever changing DHCP addresses?

    In other words, how can I roll my own no-ip.com system without being a Vixie level hacker?

    • by Temkin ( 112574 ) on Tuesday July 01, 2014 @01:21AM (#47357427)

      I have a $10/mo VPS at a major datacenter with static IPv4 & IPv6 addresses that hosts the primary DNS server for my vanity domain. My house has plain old boring dynamic address DSL with filtered port 25, etc... I have a Raspberry Pi running light network services on the house net. It runs a cron job that runs pubkey ssh into a no-shell account on the VPS. When that happens, a script rips $SSH_CLIENT and does a quick compare to see if it changed. If it has, another cron job on the VPS fixes up a record in my vanity domain with a 60 second TTL.

      OpenVPN gets me around the port 25 filter...

      Why am I explaining this to a low four digit?

      • by Nethead ( 1563 )

        Because us lower 4 digits don't like to re-invent the wheel:)

        Nice setup though, I'll keep those tips in mind if I need to roll my own. I'm looking for a client and server package that can be installed quickly on a client computer/router. A client end that could run on OpenWRT would be really sweet.

      • by rduke15 ( 721841 )

        If you already have a server with a static IP, it's pretty easy to configure bind to accept dynamic updates. See for example Set up your own Dynamic DNS [bahut.alma.ch].

        I set it up like that, and have short scripts on my Linux and Mac notebooks to do the updates when the network comes up. On Linux, it's a short script in /etc/network/if-up.d/. On Mac, it's a script called by a LaunchDeaemon (a .plist file in /Library/LaunchDaemons).

      • by Noishe ( 829350 )

        You should not be using port 25 unless you are hosting a mail transmission agent. If you are submitting email from a user agent, you should be using port 587.
        Port 25 has been deprecated by the IETF for over a decade and is reserved for transmission, not submission.

    • powerdns [powerdns.com] + powerdyn [github.com]

    • MyDNS [mydns-ng.com] plus a custom-built sign-up form?

  • We should change the definition of Legal to "Backed by much money".

  • by FuzzNugget ( 2840687 ) on Tuesday July 01, 2014 @01:50AM (#47357567)

    So *that's* why my DDNS suddenly went dark today, with no apparent explanation.

    Port 80 forwarding to the right LAN IP. Server daemons are running. I can access all the services directly by WAN IP (not very useful). Updater client running just fine. No firewall configs in the way. No-IP reports the correct IP. No news posting on No-IP's website about any sort of outage or technical issues.

    Well, I was lost -- that was everything. ... and that was all because of this horseshit? Guess what... I'm not even *in* the US, so now the US courts think they have jurisdiction over countries? (OK, that's not new)

    Fuck all involved. Hope they get their asses sued to hell. And this judge canned for such a dumbass decision.

    • by Geeky ( 90998 )

      Me too, in the UK. Figured it was a random glitch until I read this.

      I use no-ip to provide an address back to a home server running ZoneMinder for a couple of security cameras. So as it stands I can't access my security system. Great. I went to no-ip because my ISP doesn't offer fixed IP addresses and for no good reason changes my IP address every few days. I also have it on a self-signed SSL cert, and if I access it via IP I have to add another exception to the browser every time it changes.

      If it wasn't fo

  • Overdue (Score:4, Insightful)

    by networkzombie ( 921324 ) on Tuesday July 01, 2014 @01:56AM (#47357597)
    Why is anyone surprised about this? I've been reading articles for over a year about No-IP and the abuse that they seemingly allow. They say they are working hard to stop the malicious software plowing through their service, but obviously they are not working hard enough. No one contacted No-IP to tell them that their service was being used to spread malware?

    Bullshit.

    April 2013: http://labs.opendns.com/2013/0... [opendns.com]

    Sept 2013: No-IP is a preferred choice for other similar attacks for command and control infrastructure: http://threatpost.com/njw0rm-a... [threatpost.com]

    Feb 2014: Even Cisco said their domains were being abusive and they posted to complain that Cisco didn't contact them. http://www.noip.com/blog/2014/... [noip.com]

    Looks to me like they should have contacted Microsoft and asked them for help. I guess they waited too long.

  • Wait a second... (Score:5, Insightful)

    by FuzzNugget ( 2840687 ) on Tuesday July 01, 2014 @02:02AM (#47357631)

    So, Microsoft's argument was that they needed to hijack thousands of computers, secretly redirect them and put people in financial strain... so that someone else couldn't hijack thousands of computers, secretly redirect them and put people in financial strain?

    Great plan, fuckwits!

    • by AHuxley ( 892839 )
      You would think this could be fixed at an OS or application level vs the only fix been reaching out to fix the 'internet'?
  • If it wasn't for the all the holes in WIndows then there's would't be as many people trying to distribute malware. MS themselves are the first in line as the root cause.

  • by ruir ( 2709173 ) on Tuesday July 01, 2014 @02:28AM (#47357745)
    USA and Microsoft the self-appointed police of the world strikes again... Two comments. If it indeed no-ip has virus problems, it would be FBI, CIA or NSA, or whatever national agency and not the fuckwits from Microsoft. Second point, if we are talking about malware distribution points, are we disabling hotmail.com and microsoft.com too?
  • by DarkHelmet433 ( 467596 ) on Tuesday July 01, 2014 @03:17AM (#47357903)

    A quick skim of the motion for the court order gave me the "boilerplate" and "cut & paste" feeling. There is a lot of sloppy line blurring between actions and complaints directed at the Malware authors and the no-ip folks. Sometimes they refer to the "Malware Defendants" and other times the generic "Defendants" when they meant the former. Really sloppy legal work.

    There are some real gems in there:

    From section 7:
    "There is good cause to believe that immediate and irreparable damage to this Court’s ability to grant effective final relief will result from the sale, transfer, or other disposition or concealment by Defendants of the Internet domains at issue"
    Say what? How is that related anything? Its not like the TRO will actually prevent people from being able to hit 'delete' via the control panel. Given that everything's busted by their own doing, the bad guys got a huge head start.

    From section 8:
    "... and the interest of justice require that this Order be Granted without prior notice to Defendants ..."
    Wow ...

    The full motion text: http://www.noticeoflawsuit.com... [noticeoflawsuit.com]

    It seems to me that regardless of what good intentions that Microsoft may have had, they've really fouled up the execution. They'll be remembered more for taking out millions of legitimate users than the malware they *might* be able to take down.

    • Comment removed based on user account deletion
      • by DarkHelmet433 ( 467596 ) on Tuesday July 01, 2014 @03:46AM (#47358019)

        I also suspect they've managed to botch the technical aspect of it as well.

        Presumably the plan was to put their caching name servers in front of the real no-ip servers, and gather the mappings for the malware suspect sites and then blackhole them after getting what they want. The problem was that Microsoft's side appears to have melted down, thus taking everything down. They won't be getting logs, behavior analysis or anything, because its all a pile of wreckage in a crater. Meanwhile, all the "bad guys(TM)" have now had hours head start to delete their C&C node registrations while microsoft's servers are down. And now they've ticked off the no-ip folks, so I wouldn't expect them to be in a cooperative mood to try and help.

        Bone headed all round. There's no other way to put it.

  • Comment removed based on user account deletion
  • by AxeTheMax ( 1163705 ) on Tuesday July 01, 2014 @03:35AM (#47357975)
    So MS has a 'Digital Crimes Unit' and the US courts allow it to carry out law enforcement duties. How long before they have their own policemen, courts and prisons? It goes together with the Microsoft tax I suppose.
  • So when Microsoft hijacked the DNS, the IP addresses of No-IP services should still be running, no?

    Does anyone have a list of their (old) IPs?

  • by thrill12 ( 711899 ) on Tuesday July 01, 2014 @07:00AM (#47358539) Journal
    [grudge mode]I will be sure to claim damages for this, as I am using no-ip for my own server which is perfectly valid and runs no Microsoft software whatsoever (nor will it ever). What judge is so stupid as to do this ???[/grudge mode].
    Did not hear anything from No-ip though ; when I logged in yesterday to find out what was wrong, and why my domain was not resolving, there was no information whatsoever.
  • by Culture20 ( 968837 ) on Tuesday July 01, 2014 @07:59AM (#47358775)
    1. Extinguish
  • Lawsuits will fly (Score:5, Interesting)

    by Anonymous Coward on Tuesday July 01, 2014 @09:25AM (#47359341)

    IAAL (but this isn't legal advice). I noticed that it was an ex parte hearing, which is why this whole mess occurred. They're useful for preventing domestic violence, but ripe for abuse in all contexts. NO-IP should be moving for an emergency hearing and the whole issue should be resolved within hours. Beyond that, NO-IP should follow-up with a suit for damages (I suspect MS will pull the we-got-a-court-order card and NO-IP gets to respond back with you lied to the court. It all goes nowhere and they settle).

    The more interesting aspect is the disrupted users. While MS moved against NO-IP ex parte, they apparently made assertions that they would keep the service functioning properly. They've failed there and suits are now possible for those failures. More interestingly, however, is whether MS was recording, manipulating, or in any other way playing with the traffic. If so, there are some excellent wiretap statutes waiting to be had.

    I, sadly, didn't have an NO-IP account, but if I did, I'd be heading to the court house this afternoon. This is what happens when you skip due process, let a to-big-to-fail corporation do whatever it wants to private corporations through the guise of the courts. Corruption at it's finest. MS should be bludgeoned thoroughly enough to at least think twice before attempting it again.

One man's constant is another man's variable. -- A.J. Perlis

Working...