All We Want Is Whatever's On Your Machine 235
kubla2000 writes: "A breathless story about how the best defense against [fill in the blank: piracy, virii, hacking] is a good offense at CNet. What struck me most though is that in the midst of the rant from Timothy Mullen (no stranger to hacking the hack as this story from computerworld magazine shows, was a throw-away line justifying the RIAA and MPAA's appeal to Congress to make it legal to do this! It seems the bandwagons have started rolling. Who's next to jump on?"
Measure for measure (Score:2, Interesting)
the best defense it defiance of copyrights (Score:2)
If they should be able to run code at our computers, they increase the security risk, since viruses may exploit these programs.
That's why this will only encourage more defiance of copyrights - because the chances of any one of us having our security breached is much less if we all insist and expect each other to not support them. I think copyrights are old-world, and the sooner we get rid of them, the better.
OK, time to fire up the worms... (Score:4, Insightful)
Who wants to get together and build a worm that does nothing but fix known security problems? We can make it grab all it's data from a chat-room, or web page, so it can stay small, but call upon a large database of known exploits, download them to the machine, and execute them...
Perhaps self modifying? To take advantage of newer exploits as they are found, so it can continue spreading itself? (Again data taken from IRC or Web URL) Perhaps just several variants of the worm...
What fun we could have!
Re:OK, time to fire up the worms... (Score:4, Insightful)
And what are the consequences if your worm has just one bug?
How would you "recall" a faulty worm? Write another worm to chase it and kill it? Get real.
Re:OK, time to fire up the worms... (Score:1)
We can make it grab all it's data from a chat-room, or web page
Add a command: halt. Remember to test it thoroughly.
Not that I'm saying it's a good idea.
Re:OK, time to fire up the worms... (Score:1)
Re:OK, time to fire up the worms... (Score:2, Insightful)
Re:OK, time to fire up the worms... (Score:1)
The worm is running around the internet fixing flaws, but how is it going to get into someone's system? Answer: A FLAW! You'd have to make a new worm for each new flaw that was discovered just to get into all the systems you already fixed.
I just get this funny image of a vigilante crawling into someone's house through a broken window, fixing it, then finding that he's locked himself in. LOL!
Re:OK, time to fire up the worms... (Score:1)
Re:OK, time to fire up the worms... (Score:2)
If it gets in, then there's a flaw for it to fix. If it can't get in, then, while it may have other flaws, it doesn't whichever flaw allows your worm to infiltrate it.
Now, there's a decent debate as to whether or not you could send your worm back out after you've fixed all the flaws, because, in theory, if you've fixed all the flaws in the system, the system should then be smart enough to not allow this code to be arbitrarily executing itself.
Of course, it could fix a number of flaws, and set the last update to occur at the next reboot, ala a run_once entry (for example), then run shutdown -r 60, then send itself back out. After its rebooted, it shouldn't be able to propagate itself at all... or something.
-9mm-
Re:OK, time to fire up the worms... (Score:2, Informative)
Last I heard he is still in jail (I maybe wrong about this).
And yes, for a while it was common for a cracker to close the security hole while leaving a "secret" backdoor. Sometimes this was accomplished by placing a bogus entry in one's
In the Windows world there are a bunch of trojans ports (27374, 31337, etc...). Unfortunately the back door was open to everybody.
Re:OK, time to fire up the worms... (Score:2, Interesting)
True, back when I first used my Windows machine NetBus was popular in a chat room I visited. A girl I got to know sent me the server part so I could let her see what other people were seeing on her computer (NetBus was actually being run willingly by her as it was a fun thing to do) and being an old computer geek felt safe doing this. 5 minutes after getting the 'patch.exe' and running it, I found the client part online *google wasnt even around then - go webcrawler* and figured it out enough to connect to her computer and do more to her than she could do to me (ie control and execute other programs and lock her out of my computer *she actually complained that noone could connect to my computer and that I wasnt running the server until I gave her the password and watched the many computers connect*). I had to guess the password to her computer of course but the person who sent her the file put her kids name as the password which happened to be the only thing I tried. I ended up changing the password and telling her to not take any more files no matter how much fun they were if she wanted to maintain privacy (it wasnt just to pop the cd in and out as she claimed). I honestly didnt know what a 'port' was at that time and thought hacking an
If you like laughing at crackers youll probably like that story.
Re:OK, time to fire up the worms... (Score:3, Insightful)
And how about in real life? Like contractors should roam the streets and randomly break into peoples' houses to fix things. No biggie right? If you come home and there are guys in tool belts breaking down your walls and moving your stuff around, you should welcome them with open arms, right?
Oh and we should absolve these roving contractor crews from any associated liablities too. After all, they're doing it for the good of all.
In the meantime, I'll stick with downloading and implementing fixes from trusted sources, and hiring bonded and insured contractors.
Good or Bad worm? (Score:2)
Silly me... if I cared about things like that, I wouldn't leave my server infected, would I.
How about if it just shut down insecure machines or publically shamed the owner?
Xix.
Re:OK, time to fire up the worms... (Score:2)
I've often thought that the ISP should play a role similar to this for users on its network. They should be actively scanning for known vulnerabilities and upon finding one, they should block connections on that port and contact the user. Insurance companies should get involved and force ISP's to implement active defense mechanisms. It's pathetic that friendly machines don't scan each other for the purposes of mutual defense.
Re:OK, time to fire up the worms... (Score:2)
horrible idea (Score:2)
E.g.: I have a computer at work that runs win2k that I have yet to install SP2 on because SP2 is known to have issues with Novell (and we run a novell/AD network). We're trying to migrate away from novell, but as long as it's in use, I can't just break it for the sake of a "more secure" computer.
Blaming the Victims (Score:4, Interesting)
policy to me.
This can't be a good thing: just think of
the court cases, and the added burden on the legal system.
Imagine a scenario like this:
Company A, B, and C are infected with viruses.
Company A tells Company B to "santize your systems, and stop infecting us, !". Company B has santizied it's system, and tells Company A to "go pound salt".
Company A, unknowingly infected by Company C but still blaming Company B shuts down Company B's system. Company B is not happy.
Company B manages to bring it's system back up, and shuts down Company A in retribution.
Lawsuits ensue. The courts, which could be ruling on citizen's issues instead, (like, say, overruling the DCMA), become backed up with corporate bickering. The citizens lose. Ugly situation.
And that's not touching on any of the questionable ethics of government sponsored vigilantism. I'll
leave that flamewar to others -- I imagine things will get quite toasty.
BlameGame (Score:5, Interesting)
Working as a telephone tech support person for a non-tech sector company, Klez was particularly annoying as we would get angry telephone calls from our own corporate executives about how our server based antivirus program wasn't working, as they were getting angry emails from people at other companies telling them to stop sending them the Klez virus.
All because the damn thing sent false header information and someone outside both companies had been infected, people would continue to blame the wrong parties when their own antivirus program would point them at the wrong culprit, despite all the media stories explaining the damn thing in clear detail.
We had a number of execs refuse to believe us when we told them their machine was clean, as "obviously" we were wrong according to the people at the other company. Even had one high up try to install her own antivirus program because she didn't trust ours and ended up trashing her computer.
I just loved the whole telephone support deal during the peak Klez season.
that would explain... (Score:2)
Re:BlameGame (Score:4, Informative)
The idea of using worms or exploits to fix holes in systems you don't own, now...I think it's a bad one. The intent might be benign, but the results would likely be ugly. A worm that alters a system enough to close a security hole (even using an "official" patch or hotfix) could do some serious unintentional damage to a machine. Bugs in the worm itself, unusual system configurations, obscure software conflicts...the potential for completely breaking the target system is pretty high.
Besides which, I don't believe anyone has the right to invade a system they don't own for any reason, benign or otherwise. I am all for convincing the owners of infected machines to clean them up, but there are ways to do this without cracking their systems. Complain to their ISP, their CEO, or someone else who can pull the plug on them until the problem is fixed, if you like. It may not work in all cases, but it can't hurt, and if it doesn't work..well, that's life on the Internet.
DennyK
Re:Blaming the Victims (Score:1)
Re:Blaming the Victims (Score:2)
Re:Blaming the Victims (Score:2)
Incoherant headline (Score:1, Offtopic)
Time to burn some karma...
Is it me, or is this story's headline totally incoherant? I re-read it twice and still only have a vague clue of what the links are going to be about. He couldn't even take some time to proofread or even close his parenthesis.
Re:Incoherant headline (Score:2)
Re:Incoherant headline (Score:5, Insightful)
> incoherant?
No, it's cut straight out of 'The Slashdot Guide for Guaranteeing your Submission is Accepted', chapter 2 which discusses creating a sensationalist headline that enables people to leap to conclusions about a story before reading it.
Bonus points are awarded for managing to make it sound like it's an issue of the man against the little man.
Cause yeah, I picked that up too.. the headline and following text had almost nothing to do with the actual story.
I'd suggest the guy submitted before reading the story, but trying to comprehend the lack of thought that would require makes my brain hurt.
Re:Incoherant headline (Score:2)
Just as an FYI: the one and only time one of my submissions was accepted, the headline was changed by an editor.
Re:Incoherant headline (Score:1)
Re:Karma-dropping (Score:2)
Re:Karma-dropping (Score:2)
Re:Karma-dropping (Score:2)
And yes, karma-dropping doesn't always guarentee positive moderation. But the success of the tactic isn't the point. The issue is whether you've really got something to say or are just posing. Of course, I suppose if a post is ignored or moderated down, the poster can feel like a martyr. So even then, its successful.
Breathless? Not really.. (Score:2, Interesting)
Right on! (Score:1)
What article did Timothy read? (Score:5, Insightful)
What he says on the issue is: What he seems to be advocating is decriminalization of defending your computer against an active attack. I tend to agree. It's like saying it isn't theft to take a crowbar away from someone who is using it to jimmy your front door.
The author has blurred all sorts of lines, viruses and worms, copyright and attack, defense of ones computer and defense of ones IP.
I'd be interested to hear Mullen's comments on the story.
-Peter
Vigilante justice is not the solution (Score:5, Insightful)
It's important to remember WHY vigilante actions are generally illegal:
I can only think of one set of circumstances in which our culture and law condone vigilante justice: self defense of a human being against bodily harm.
It is important to remember that computer crime is almost universally property crime. With rare exceptions there is absolutely no danger to the person of a human being posed by computer cracking, and thus no reasonable basis for authorizing vigilante justice.
Re:Vigilante justice is not the solution (Score:3, Interesting)
(And yes, I did write "M. Gandhi" because I don't know how to spell his first name)
-a
Re:Vigilante justice is not the solution (Score:4, Insightful)
Sure, no problem there. I don't see anything in my statements that suggested that you didn't have as much right to use violence to defend someone else from bodily harm as you do to defend yourself from bodily harm.
I live in Colorado where I may shoot a person dead if he is both 1. on my property and 2. I have reasonable cause to beleive he is or is about to commit another crime (against a person or property.)
Interesting. In most of the states who's laws I am familiar with the right to shoot an intruder in your home dead is rested firmly on the assupmtion in the law that someone who is breaking into your home if perfectly willing to use lethal force against you, thus reducing it to a defense against bodily harm case. In most states I believe the simple act of them breaking into your home is sufficient cause for you to reasonably believe they intend to harm you. I've never seen any state provide justification for the use of lethal force based on a justification of defense of property. Perhaps Colorado is different.
I think your opinion is based more on your pacifistic world-view than on any actual facts.
I think perhaps I've not communicated to you clearly. You are perhaps the first person I've encountered who has ever accused me of pacifism. I have no problems whatsoever with the application of force within reasonable limits, as proscibed by law. I also happen to believe that the right to use lethal force against an intruder in your home based upon the assumption that they intended to do you harm is reasonable. That is hardly the point of view of a pacifist.
Well, you have really twisted my example around. Someone actively attacking your computer (network) or actively breaking into your house is not related to your vigilante revenge scenario in any way, so I'll dismiss it out of hand.
Ah... I think I see where some of the confusion is now. Please note the tense I used with the word burgled. Someone currently, actively, burgling your home is a direct threat to your person for which you can reasonably respond with deadly force in most states. Belief that someone has, at some point in the past burgled is quite different as it carries no threat of bodily harm.
The point I was attempting to make is this: those senarios in which the criminal conduct of another person are grounds justifying retaliatory action which is normally proscribed by law are generally limited to cases involving the threat of bodily harm to a person. I know of no examples in US law permitting actions normally proscribed by law being justified by crimes or threats against property ( with the possible exception of your assertion with regard to Colorado state law).
Re: Colorado's "make my day" law (Score:2)
That said, the law does provide an affirmative defense if you kill anyone in your house - the state must prove that we shot them even though we knew they posed no personal threat to us or others; we do not have to prove that we perceived a credible threat before we can claim "self-defense."
In practice, this is an impossible burden in most cases (excluding cases where one resident kills another), so it's a de facto acceptance of lethal force to protect property... but it's not absolute. You certainly wouldn't want to make this statement to the cops who first show up on the scene and want to know why you have a dead guy in your living room, next to a displaced TV.
(IANAL, etc., but I am a gunowner so I follow this material.)
Re:Vigilante justice is not the solution (Score:3, Informative)
The laws on this matter tend to vary from state to state ( as murder, like most crimes, is a state matter in the US ). In two of the states I have resided in ( Indiana and North Carolina ) there is a presumption that if some one breaks into your home they mean you bodily harm. This renders any use of force against them self defense against bodily harm in the eyes of the law. I tend to think this is reasonable. I can't speak to the laws in Colorado, but I would be shocked ( and dismayed ) if defense of property figured into the right to use force to defend yourself against a burglar in anyway.
What are the laws like in Sweden regarding the use of force against someone who has broken into your home?
Re:Vigilante justice is not the solution (Score:2, Funny)
Apparently, you can have sex with them, but only if they are good-looking and a camera is rolling. According to a friend who knows these things.
</cheapjibe>
Re:Vigilante justice is not the solution (Score:2)
Re:Vigilante justice is not the solution (Score:2)
I would still kill someone who posed a deadly threat to me or my loved ones. Their lives are worth the years of hell fighting off a lawsuit.
Re:Vigilante justice is not the solution (Score:2)
Physically, my wife and daughter were OK (my wife was out of the hospital the next day, and my daughter landed on a couch)...mentally, it took a new house and a few years of counselling. But my point here is that nobody ever even questioned my decision to shoot him. The police declared it "justifiable self defense" in about 30 seconds, and the mans own family sent me a letter offering their sympathies for my wifes injuries and their hopes for a speedy recovery. While we were in counselling, we discovered that this was the typical response in these kinds of situations. Lawsuits by family members and the estates of the dead criminals are actually pretty rare, they just get a lot more press than they deserve.
Re:Vigilante justice is not the solution (Score:2)
In all states, however, you have a "duty to worry about the civil case," because while few criminal juries would find you guilty of anything for a reasonable shoot, few civil juries will turn down the opportunity to make you pay millions for it. I suppose it comes down to a quick calculation on the value of your life.
Re:Vigilante justice is not the solution (Score:2)
Re:What article did Timothy read? (Score:2)
The only "rant" in the story was from the anonymous author of the story (Reuters wasn't kind enough to let us know who the RIAA/MPAA hack was that wrote the story). This cowardly bastard quotes Mullen about whether it is ethical to hack back at a computer that is attacking one of yours and also mentions his use of an attack to push out a patch to his own network. Both interesting subjects but totally irrelevant to allowing the RIAA/MPAA to attack someone's computer because they think it is being used to possibly violate a copyright.
The tie in between what Mullen would like to do (hack back at hackers) and has done (hijack an attack to push out a patch) and what Howard Berman, the RIAA and MPAA want is strictly in the author's mind. Mullen, unfortunately, must have given an interview to a "journalist" who makes Jeraldo Rivera look like a candidate for a Pulitzer. Shame on him for talking to such a low life.
Some thoughts:
1) More people should read the story before they comment.
2) The few that do read the story need to read it more carefully (including the submitter who seems to have confused an anonymous author quoting someone out of context with statements by that person).
3) My guess is Mr. Mullen's comments on the story wouldn't be printable in a "family" publication. If I were in his position, I know mine wouldn't be.
Not exactly a suprise (Score:1)
Then through precedent, they make it illegal to link to pages which teach others how to circumvent technological countermeasures which remove our fair use.
They have found the best route to getting their way. Disney politicians who can be bought, as they were bought by enron.
We have got to change the american political structure. We must mandate 100% disclosure of personal monies and campaign contributions of all politically elected officials.
In the meantime, perhaps autohack-backs on DoS need to start getting spread around.
Who cares if you take down huge portions of the net, at least you'll get back at the RIAA for putting people like Britney Spears out there.
The truth is out there sometimes (Score:2)
You can find the contributions at OpenSecrets [opensecrets.org].
You will discover that your favorite politicians are not only 4 sale, but that you can buy them for fire-sale prices.
Legal DOS Attacks (Score:3, Interesting)
Random dead body search... (Score:1)
If these stupid laws were passed, what would stop government agencies from just randomly entering your house to search for just about anything they thought you might have in there?
Nothing would displease me more than waking up at 4am to discuss with a fireman who has a key to my frontdoor, the dangers of not having a smoke alarm.
Seems more and more, you're guilty until you've been proved innocent.
RIAA or MPAA come a knockin on my machine with the 'l33t0 toolz' they have, i'm perfectly within my rights to retaliate... afterall I dont live in the US of A.
Re:Random dead body search... (Score:1)
I'm not advocating that by the way *grin*.
The only way to stop hackers (Score:1, Redundant)
Nothing beats faux-intellectual pluralization... (Score:3, Funny)
Re:The only way to stop hackers (Score:2, Informative)
Maybe we should talk to these guys? I've heard that they're totally awesome:
http://www.realultimatepower.net/
Be careful when talking to them though: say one wrong thing and they may just totally flip out and cut your head off.
Cheers
Stor
Real life (Score:1)
(you can just tell when your about to be modded down, yet you still cant help posting)
Re:Real life (Score:2, Insightful)
The point is that the proper authorities already have the power to search computers for pirated data and viruses (with a warrant), so why do we need to give ordinary citizens (copyright holders and sys admins) this kind of power?
antibiotics arms race (Score:2, Insightful)
It's like doctors questioning the overprescription of antibiotics -- the more agressive their weapons become, the more clever we will become in working around them. Increased use of antibiotics and other agressive medicine is creating superbugs. The same is true online:
As the internet becomes more dangerous for p2p networks, only the stronger networks will survive.
what a great idea! (Score:2)
Legally tenuous, surely? (Score:5, Insightful)
As usual, this just sidesteps the more important issue which is that of secure software. If Microsoft tied up he bugs in Outlook and finally realised/admitted that secure by default is more important than snazzy and integrated by default, we wouldn't have half these problems. And if the software industry in general were really made to be more careful about its security, we could sit back and relax *a little*.
This sort of idea does little to prevent malicious scripts, and does a lot of encourage vigilantism, which is exactly the sort of nonsense that just makes things worse, and opens the legal doors to companies cracking into your computer to check if you've written about their products (y'never know lol).
Bugs in Outlook? You ignorant twit (Score:3, Informative)
You mean like Outlook 2K2 in the Office XP suite that keeps its security settings on a setting thats tighter than a fish's asshole by default? That's right. It now assumes every email is out to get you.
Oh wait, my mistake. This is
This is all despite the fact that many (but not all) of the Outlook "viruses" required the user to actually OPEN the emails. Get over it already.
Re:Bugs in Outlook? You ignorant twit (Score:2, Informative)
Use the RIAA's own tools against them... (Score:1)
Re:Use the RIAA's own tools against them... (Score:1)
If they were going to be exploiting some bug in the filesharing software that they discovered, then the only way to stop that would be to block the port to your filesharing program.. which means you wont be sharing anyway, so, they get what they wanted. It would be possible to block incoming connections from riaa.[org/com] and friends, but they could get round that.
Asking for trouble... (Score:4, Interesting)
"Well, his computer pinged me a few times, so I used a buffer overflow to gain access to his machine, and formatted his harddrive."
As you can see, there are two issues that are left unresolved: what defines an illegal attack, and what defines an appropriate "counter attack".
As for this falling under a self-defense part of the law, I would suggest looking at the goal of self-defense: stopping an attack against you. Self defense does not mean kill someone, does not mean detain someone, or anything else. Although it is possible that those could be necessary in an act of self defense, in most cases they are not.
With all this in mind, take a look at how you can stop the attack on you. The best way would be with a firewall or patching the problem. From there on, you should report the problem to the authorities (ala "real life"), probably being the machine's isp, and possibly the police/fbi.
Vigilanties are not protected by the law, and their best hope is to convince a jury/judge that they were doing the "right thing". Unfortunately, most of them aren't qualified to make that decision :]
Re:Asking for trouble... (Score:2)
And then there's the problem of someone retaliating against a dynamic IP address. It may have been the right person at the very moment of an intrusion, but by the time the admin gets around to checking their logs, it's whoever else happened to dial into that POP. Then someone totally innocent gets nailed instead, just because they happened to get assigned the same IP address as yesterday's miscreat.
Re:Asking for trouble... (Score:2)
Yeah, hard to believe there's someone in the DoD with common sense, eh? Don't worry, he won't last.
Ask for Jack Burton. (Score:2)
AFAIK I get to beat on him till he quits, unless I want to skip right past go, and land my ass in a place where "getting doubles" has nothing to do with dice.
Isn't it obvious? (Score:2, Interesting)
To protect ourselves, we need to make justified hacking legal!
God knows the world doesn't have enough hackers.
Now, seriously... if it's possible to do something nasty, like spreading a virus or disabling a remote system, someone will do it - regardless of what the law says. This is true of all laws, whether we like it or not. There are two important differences in the 'digital' world:
- The Internet is such a hopelessly confused tangle of metaphors that often we have trouble telling exactly how our normal ideas apply.
- The Internet is not like the physical world, and often our ideas don't apply.
Now, the point here is that while laws can help protect the Internet, the actual solution - perhaps the only solution - is for our machines to protect themselves. No - that's the wrong metaphor. There's no reason a computer needs to start running a bit of malicious code just because of a bunch of bytes it happens to read through the network. Our computers can only be hurt by others if they themselves allow it.
I told my wife (Score:1)
Leave all those papers where they are,
Don't touch anything, I like my computer room this way.
Now, I should go to my rep. and told him not to touch my computer. If it is full of virus, leave it like that. I like it the way it is. Thanks.
same old script, different character names (Score:2, Insightful)
Basically, even if you take away the factor of 'trade offs' (of security/privacy vs freedom) and personal freedom in general, the fact is that history has proven that such tactics in the end not only fail to accomplish their goal, but the cost to achieve this failure only adds more injury. What finally adds insult is the fact that the vast majority of time, the problems actually become WORSE, whether from direct or indirect results.
Now the part that pisses me off is people's response to this little historical lesson. Many refuse to actually heed the lesson but only bastardize aspects of it to fit their self centered needs. This is much akin (in many ways) to the situation where a child will justify (instead of reason) with very hand selected 'facts' as arguments simply to get some nintendo game, cd, bike, etc. Any sort of logical analysis and use of reason is only mimicked and faked. When people like this never grow out of this but age chronologically they continue to use such 'thinking' to justify positions in things like politics and lifestyle choices.
Well, either way... even if self labled 'heroes of the people' that are in reality only petty whoring thieves choose to use this fact as an excuse I suppose there is nothing to be done about it. The fact remains, regardless of how the short sighted, greedy, and manipulative sheep refuse to acknowledge that their actions cause more problems form them and others down the road (as if they EVER trully think of anyone else), the problem requires education not FUD or their reactive responsive FUD.
my head hurts (Score:2, Insightful)
o -- Lazy System Administrator is paid $75,000 dollars a year to secure a server.
o -- Over worked and under paid factory worker is paid about $15,000 dollars a year and spends his leisure time chating on IRC and hacking unsecure systems.
o -- The later, takes time and helps the aforementioned secure his system. While he spends some quality time at the fairway play 18 holes of golf.
I don't see no problem. I concur that they need to switch jobs.
Back to you Pat.
In other news.. Scientists have unravaled the mysteries of how chocolate pudding will prevent cavaties and reduce heart disease.....
A Possible method to Twart the RIAA... (Score:2, Insightful)
I wonder what effect this would have, really... (Score:2, Interesting)
Using his technique, the computer that launches an attack is paralyzed and requires an administrator to restart it, but it stays online and is not otherwise harmed, said Mullen, who is a columnist for SecurityFocus.com
Requires an administrator to restart it? Do they mean it basically crashes and has to be rebooted? How does that do anything to solve the virus? Sure it temporarily disables it, but if it's a 9x/ME box there is no "administrator" and if it's NT/2K/XP there may be many people with admin rights. Furthermore, your average grandmother-using-aol-on-her-emachine would have no idea what to do, or that she has a virus, or what a virus is. Temporarily disabling machines doesn't do anything to solve virus problems. The only thing that will solve virus problems is educated computer users, and that is unlikely to happen anytime soon.
Re:I wonder what effect this would have, really... (Score:2)
>and has to be rebooted?
Probably, yes. I don't know what exactly Mullen is doing, but I suspect it's similar to one of the "return fire" solutions I've implemented:
HTTP requests for default.ida (of Code Red fame) are redirected to a PHP script via Apache rewrite directives. That script pulls the REMOTE_ADDR environmental variable, which contains the IP address of the infected machine, then sends two requests back to that host:
http://$host/scripts/root.exe?/c+iisreset+/stop
http://$host/scripts/root.exe?/c+rundll32.exe+sh
If you're so inclined, you could use root.exe to do something more conspicuous in the hopes of alerting the user to the problem. For example, instead of shutting down the remote machine, you could create some directories named @ATTENTION_ADMINISTRATOR and @YOUR_COMPUTER_IS_INFECTED_WITH_A_VIRUS in the C drive. That's bound to get someone's attention eventually.
Shaun
Problem with this... (Score:4, Insightful)
I don't think anyone has the right to be mucking around with anyone elses system. To quote from the article:
"It is the DoD's policy not to take active measures against anybody because of the lack of certainty of getting the right person," Chassot said."
I agree with this since you cannot always get the right person. Furthermore, why even attack another machine when you can go about it in more civilized ways. The internet is not the wild west, rather it [was] a place where individuals could be trusted. Unfortuantely, with the boom of the cyberworld we get the not-so-good citizens. But what defines our character? It's the fact that we stick with our civilized ways even when dealing with those who are uncivilized. I don't want my machine to be disabled or attacked just because someone spoofed my IP. That would piss me off and then they would be protected under this law they want to propose.
TO further quote: "This is a type of defense of property," she said. "There is a lot of sympathy for that (kind of action) from law enforcement and vendors because we do have such a big problem with viruses."
I'm sorry, but just because someone pee'ed on your lawn from my lawn doesn't mean that you rip up my front yard. Viruses are written and we will always have to deal with that. The people who should be paying for it are the ones who use the virus for malicious purposes. We shouldn't be targetting the virus writters since one man's virus is another man's utility/shortcut/etc.
As for copyright holders putting decoy files on networks... they can do that all they want. People will just adapt and write software to counteract the flood of this crap. Back in the days of audiogalaxy, people used to rename MP3's and put them online under a new name. But it was easy to spot the crap files since they would be coming from a couple specific hosts. When it got really bad, I just moved on to another network.
Re:Problem with this... (Score:2)
Yeah, but the RIAA doesn't have this worry. Several of their spokesmen have already informed us that everyone is now downloading pirated music. So whoever they attack, they got the right person.
(Do I need a smiley here? Nah
If you value your rights... (Score:2)
If we let them get away with this, pretty soon there will be no more rights.
if we had enough good sysadmins (Score:3, Insightful)
But I would be glad to shutdown some spammers...
----------------
this message has been espeled.
A simple way ... (Score:2)
Just ban all Microsoft systems from the Internet.
The remaining handful of viruses and worms wouldn't be enough of a problem to get the media's attention. We'd want a mop-up operation to stop them, of course. But that would be a minor technical project that the media wouldn't find interesting.
We should have done this five years ago, when it was becoming clear that Microsoft had no intention of fixing the security holes they were building into their systems, and their customers were too clueless to demand fixes.
Dangerous Worms (Score:2)
However, look at it from the worm's perspective. It seeks only to invade and to reproduce. It doesn't care about legalities or consequences. It will do what its designed to do, and will do so indefinitely until its means of propagation has been eliminated. The vulnerable machines are out there. They will always be out there. And as long as they're out there, there will be breeding grounds for worms.
We need to meet halfway on this one. If we can't attack the machines that are already attacking us, we should at the very least be able to stop the problem. In fact, it makes sense to stop the problem before it even starts. If someone is running an unpatched system, they're going to be the participants in a worm redistribution program eventually. If it has to happen, let it be a benign worm that hits it. Invade the machine, fix all known holes, then propagate to a set range of addresses, then die. No more worms for that host, and in a matter of hours, that exploit will have been completely removed from the world, or at least as well as the worms could find it.
Perhaps at least with XP's automatic updates, these patches might be implemented on a regular basis. However, what about all the people that don't allow themselves to use the automatic update features? There are plenty of pirates and security wary but otherwise legitimate users who won't use the automatic update features. Those machines are just as vulnerable. IF the user isn't willing to patch them, then let someone legitimately be allowed to do so. Or at least look the other way when it happens.
-Restil
Use the law? (Score:2, Interesting)
Let's suppose you write an email. While it shouldn't be necessary, perhaps you might include an explicit restriction in the body of the email, or at the bottom like lawyers often do: "This material is copyright by the sender and may not be reproduced in whole or in part by any means, including but not limited to reproducing on paper via a printer, forwarding to any other mailbox, storing on punch cards, paper tape, magnetic tape, optical media, or any other machine-readable form of reproduction. If you wish to reproduce this item, licenses are available from the sender for a nominal fee."
Let's suppose you sent your email to the RIAA. They are entitled to exactly one copy, which will end up in the mailbox of the receptionist. This will pose a dilemma, which will probably be solved by violating your copyright.
You might find it necessary to take steps to protect your intellectual property.
Re:Use the law? (Score:2)
-a
Re:Use the law? (Score:2)
If you're the receptionist, it's your job to send it on to whoever it seems destined for. If it were a snail-mail, you'd send the actual paper letter to legal. If it's an email, you could call legal and say, "Mr. Slimeball, can you come down here and look at the message on my monitor, no, I'm on third floor, no sir, I understand you're very busy..." Or you could just forward (that is, copy) it to him.
And if they're a properly administered system, the sysadmin will be making backups... that is, copies...
I've alresystem ady done this... (Score:2, Interesting)
It uses nimda vonrobility to hit them back and gives them hundreds of popup messages thruout their system, telling them to apply the patch and get some type of security (then the scripts delete themselves).It also applys an "at" command to launch a vbs file on their system to remisystem nd them to get a patch.Just anough to anoy them.
It work seems to work. I impliment this because I work at a very small ISP here in town hosting dsl lines. Our lines are always getting eatten up by nimda, even still. This way it saves on our bandwidth for everyone else to use. The funny thing is that it works. Traffic used by nimda on the network has gone down dramaticly because of it. We applied the program to all the gateways (since they are all linux boxxes). Just added Apache with my scirpt to fish out as many people as possible.
I love it. We get calls from customers yelling and screaming that they didn't have nimda and we prove it to them by emailing them the log file. Some are even thankful. Zac Bowling
Re:I've alresystem ady done this... (Score:2, Insightful)
Suppose your neighbour cranks up her stereo to bone vibrating levels. This is illegal in most neighbourhoods and you have a right to complain. Now, if you walk on her property to knock on her door then technically you _could_ be guilty of trespassing. Most courts would laugh at the idea of prosecuting someone for such a trivial offense mind you - but she would have the legal right to put you into a position where you have to explain your actions to the court.
The proper thing is for you to phone the police and let them deal with the problem.
Similarly, in the case of attacks on your server, the proper response is to phone the police. Of course they probably won't do anything about it so your next step is then to register a formal complaint about the police.
Given enough pressure they might actually start dealing with the situation and the side effect is that a LOT of people are going to react to a cop knocking on the front door and telling them to turn off their cracked machine whereas if you do it many are likely to attack you.
The analogy with the noise complaint is that if you respond to your neighbours bad deeds by turning your stereo up to max - then this simply creates the situation where both parties are breaking the law.
Finally, if you complain to the police and they do nothing and then you follow this up with formal complaints about the police, when you then contact people and nicely ask them to fix their damn machine or turn it off, at least you have a defense to put before a judge. Whether that defense means much is an open question. You might be better off just suing them in small claims court for the damages they cause you.
Much of this comes down to rights that are not clearly defined. For instance when you visit my web server and ask for something you would think you clearly have this right. I did after all put the web server on line for people to access (presumably). But what if the webserver was intended (by me) to be accessable on an intranet and I was too dumb to configure it properly? Do you still have the right to access it?
Suppose we are dealing with open windoze file shares. I do know at least one person who opened her hard drive up. She thought of it as a cheap anonymous FTP service - with read and write access to everyone. She wanted people to be able to distribute music. (seriously).
Well - I warned her. Within a month someone shut her down by running a program that erased the bios. I had warned her about that risk too.
Perhaps most people would not open network shares so that their files can be available to all. But most people do not run anonymous FTP servers and web servers either. Some people do open network shares on purpose and these people are in effect publishing on the net in the same way that a webmaster is (albeit - a far more primitive way).
So, if you happen apon a machine that is open - then you can certainly argue that you thought there was an open house. Thus you would not be guilty of "hacking" you would think. Just don't count on it. Some people will accuse you of trying to break into their machine and some will even argue that you should not tell the management because this might cause an incompetant MSCE to get fired. Some will even argue that if you do tell the management that your _PURPOSE_ is to try to get someone fired. I witnessed this in fact. What a dumb bunny!
Now - if they are customers it would be a very good idea to put a clause into their service contract that "requires" you to contact them in the case of hacks. Of course, write it so that there is nothing wrong if you fail to contact them. By doing this you create a very good defense if someone sues you for damages.
Just be careful _how_ you contact them. Throwing popups into the machine is probably a risky move. Suppose it is some advertizing firm and they are giving a demo to a major client about what a great web site they can build - and suddenly your pop-ups show up and they lose the client.
In many respects I consider these sorts of threats to be analogus to someone being accused of being a peeping tom because he pointed out that someone else's fly was open and his dick was hanging out. But we are still left with the situation where people really are pretty stupid and all sorts of accusations are going to be made - many of which do not make much sense.
So, be careful.
Re:I've alresystem ady done this... (Score:2)
This is a case where size does make a difference. It's a small ISP, probably with a fairly good feel for its clientelle. Workable assuming he keeps an eye out for potential problems. It is a minimum hassle way to control the damage from nimda. Probably does *not* scale to a large ISP.
Did they throw away the throw-away line? (Score:2)
Did they change the original article online? 'Cause I don't see anything like that in the news.com article now.
Yes, do it! (Score:2)
Yes! CNet is the root of all these evils for publishing stuff like this! A good offence at CNet would surely be in the best intrest of the public.
That throwaway line is there, though (Score:2, Interesting)
Bad editing leads to abrupt transitions. Here we go from "Striking back against a computer that is attacking you" with a worm to this:
Whah? Then we back off and contrast that approach (placing "destructive decoy digital files into peer-to-peer networks to penalize users") with the hack-back the story was really written around.
It's almost like the editor wanted to nod in the direction of the latest legislative "anti-hacker" move, whether or not it really had anything to do with his story. That's all. No "bandwagon." Just bad editing. Given the state of /.'s stories, we should relate.
Al Quaeda Records (Score:3, Funny)
Enough said.
Great quote. (Score:2)
It is the DoD's policy not to take active measures against anybody because of the lack of certainty of getting the right person.
Great. I guess we might as well get rid of the Department of Defense, if they're not going to bother to take any active measures. I guess that whole Afghanistan thing with the "unavoidable civilian casualties" was just a figment of our imagination.
Re:Hack THIS! (Score:4, Funny)
Prior to that, you acquired a time machine, I believe...
Re:Hack THIS! (Score:2)
*gzzt! Poing*
GMFTatsujin
Re:its viruses not virii (Score:1)
Re:its viruses not virii (Score:1)
No, the aliens gave it to us!
Re:its viruses not virii (Score:1, Offtopic)
If you're going to be a grammer Nazi Nazi, at least get it right right.
Oh God, I'm confusing myself myself. Easy to do, I know...
Re:it's it, not grammar (Score:2)
Grammer is indeed a word; it's a town in Indiana, and the spelling of the word shall be Grammer. That seemed out of context and was not capitalized, however, so I took the liberty of assuming that you had actually meant grammar.
There's no way out of this, is there?
I think when we both run out of karma it'll be finished.
Re:its viruses not virii (Score:2)
Moral: if you don't know Latin, leave off pretending that you do. "Viruses" is a fine English word.
hyacinthus.
Re:Berman's Bill (Score:2)
US congressman whose salary is paid by the US government.
US congressman whose efforts affect not only directly affect other districts in his state, but the entire fifty states plus assorted territories, etc.
Now if he would only accept campaign contributions from people in his district,