Re: Publishing Nimda Logs == BAD IDEA

From: Deus, Attonbitus (Thorat_private)
Date: Thu May 09 2002 - 10:03:54 PDT

  • Next message: Seymour, Keith: "RE: Publishing Nimda Logs"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    At 11:27 AM 5/8/2002, Dug Song wrote:
    
    Not withstanding the veneration with which I hold you and your 
    accomplishments, I would like to make some counterpoints:
    
    >we will NOT, however, be publishing a comprehensive list of infected
    >IPs (we have over 5 million of them, since September 2001). here are
    >the reasons why:
    >
    >1. such a list would be useless to the general public. NOBODY in their
    >    right mind would try to block all the individual IPs in such a
    >    list, for they change far too much, and are far too widely
    >    distributed to effect useful filters. these worm infection attempts
    >    are more of a nuisance than a threat to sites that would actually
    >    block them, anyway - so the ORBS/RBL analogy is pretty weak.
    
    I don't recall the entire list blockage being proposed... Administrators 
    would be able to choose relevant netblocks to selectively act upon, and the 
    entire process could be easily automated.  And while I agree that those 
    with the security mind-set required to know of the list and how to use it 
    would already be secured against the attack, I believe that the posture of 
    avoidance is stronger than that of defense.  People would at least have a 
    choice of if and when they wanted to use the information.  In this case, it 
    would be better to have the information and not need it than to need the 
    information and not have it.
    
    
    >2. such a list would only benefit remote attackers. because Nimda is
    >    fairly localized (it only attempts a completely random jump 1/4 of
    >    the time), many of its infected hosts are actually out of the
    >    purview of many attackers (at least, those that aren't on cable
    >    modems themselves in 24/8). by publishing a list of Nimda hits
    >    you've seen, you're basically handing out a map of the vulnerable
    >    houses in your own neighborhood, inviting trouble (do you really
    >    want your local bandwidth to be wasted on massive DDoS floods?).
    
    You are not evil, and you are not malicious, yet you have still collected 
    over 5 million infected IP's.  Logic dictates that those who are evil and 
    malicious, and who place a much higher value on that information, would 
    have done the same.  The future theoretical threat of a DDoS is mitigated 
    by the fact that the sources for such an attack would have already been 
    blackholed by those who chose to do so.  Additionally, if an flood were to 
    occur, the aggregate information would have already been compiled, and 
    could be easily assembled by the ISP or admin to block the attacks as 
    opposed to building that data on the fly.
    
    You already know what machines are attacking the rest of us, yet will not 
    publish that information based on the presumption that those with malicious 
    intent do not already have the information, and once they do, they will use 
    the information to make the machines that are already attacking us attack 
    us.  I disagree with that logic.
    
    
    >3. to clean things up, we (as a community) need to act in a
    >    coordinated fashion. if you have your own lists of infected hosts,
    >    please, send them to your local CERT to deal with. why bother with
    >    tracking down contacts for thousands of IPs yourself? let someone
    >    else deal with the bureaucracy, that's what they're there for.
    
    If they were dealing with it appropriately, this thread would not have 
    started.  The fact is that we are still under constant attack, and after 
    all the press, all the bulletins, and all the fury of activity surrounding 
    the publication of this information and the education of the user, it is 
    not working.  Not only can I not count on other administrators to properly 
    set up their boxes, but I can't count on CERT to tell the ISP about it, and 
    I can't count on the ISP to take any further action.  I can count on a Perl 
    script to blackhole someone.
    
    What would be immensely valuable would be for you to offer a sign up option 
    where you can verify my contact information, and allow me to pull IP's for 
    my netblocks from your massive database in an automated fashion. At least 
    in this way we can see what will really happen rather than living in theory.
    
    Thanks for your posts, Dug.
    
    AD
    
    
    
    
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.1
    
    iQA/AwUBPNqr+ohsmyD15h5gEQLbUgCfYOFROEircDJ9z8sMqhmCfBA9haEAn2tT
    BSuJF1dUZaNWk1Qw1+msUtLl
    =I37Y
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu May 09 2002 - 16:35:01 PDT