![]() |
Re: outbreak.ntli.net
Quote:
1) Get every customer to keep you updated every time they change computers? You'd need to get down to details of which patch level they had. 2) Port scan every PC on the network (have to ban firewalls first) and try and fingerprint them? 3) Analyse everyone's web traffic and see if you can get it from headers? 4) Employ a team of people to ring up thousands of people a day and ask them? It's all very well saying this, but I don't think it's actually feasible. Quote:
It was done partly because we were getting hammered by traffic from worms and viruses, and partly because it became obvious that people don't fix their own PCs. We had to take steps to make them aware of it and how to do it. We could have just banned them, of course, as they were breaking their terms and conditions. If we wanted to score points as family friendly, surely we'd block porn sites at the proxies and take naughty newsgroups offline, filter all email, etc. Quite what's so bad about trying to stop worms and spam I'm at a loss to understand. Of course, I'd like to see us encourage Linux use at home by putting out our own distro with remote access tools built in for diagnostics and upgrades, but that's not going to happen, unfortunately. |
Re: outbreak.ntli.net
Tell me something here.
Given most (all?) 'botnets' are controlled by IRC and only a vanishingly small percentage of internet users actually use IRC ... no, I have no stats, but I stand by that assertion :) .. why don't ISPs simply block IRC until a customer asks for it? I doubt many calls would be made to get it un-blocked. |
Re: outbreak.ntli.net
Quote:
Not too sure about the Linux distro thing thougj, but still, bang on the money. :tu: :tu: :tu: |
Re: outbreak.ntli.net
I can certainly vouch for most botnets being controlled via IRC. I adminster an IRC server and I'm always having to kick them off (I hate botnets). However blocking irc isn't that simple, there is no one port that it uses (there is a default one though). And you can be sure that the botnet owners will rapidly change port numbers on you. Better to make sure/encourage people to keep their machines clean. After all, being part of a botnet and ddossing someone may be bad, but having your personal data stolen via a keylogger e.t.c is worse.
I could wish that IRC admins were a little more proactive about booting botnets off their servers. I often see signs of them on varius servers but no-one seems to take action :( Admittedly my server is a small one (we focus on creative writing) and so when a channel with 100+ weirdly named people turns up on it. it's a bit obvious :) |
Re: outbreak.ntli.net
Quote:
I can think of two problems with this.
|
Re: outbreak.ntli.net
Quote:
You could force everyone to run an app that walled-gardens them if they've not got all patches installed, but do we really want that? The surest way is to identify IPs that are sending traffic that looks like it comes from a virus - specific ports, patterns of scanning etc. This can be duplicated by someone on another OS, but it has to be done deliberately and is effectively malicious (if you know how to exploit a vulnerability and program your Linux box to do it, that'll appear indistinguishable from the original infection). |
Re: outbreak.ntli.net
Quote:
Quote:
Just imagine the situation... Techy people leaving/avoiding AOL because "you have to run their cr*p software", only to join NTL and find they have to run NTL's cr*p software... :D BTW, I'm quite happy with the system NTL have in place. Nice to see an ISP actually try and DO something about unpatched users. |
Re: outbreak.ntli.net
Quote:
|
Re: outbreak.ntli.net
Quote:
5 |
| All times are GMT. The time now is 05:09. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum