Forum Articles
  Welcome back Join CF
You are here You are here: Home | Forum | outbreak.ntli.net

You are currently viewing our boards as a guest which gives you limited access to view most of the discussions, articles and other free features. By joining our Virgin Media community you will have full access to all discussions, be able to view and post threads, communicate privately with other members (PM), respond to polls, upload your own images/photos, and access many other special features. Registration is fast, simple and absolutely free so please join our community today.


Welcome to Cable Forum
Go Back   Cable Forum > Virgin Media Services > Virgin Media Internet Service
Register FAQ Community Calendar

outbreak.ntli.net
Reply
 
Thread Tools
Old 12-04-2005, 08:09   #16
BBKing
R.I.P.
 
BBKing's Avatar
 
Join Date: Jun 2003
Location: London
Services: 20Mb VM CM, Virgin TV
Posts: 5,983
BBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny star
BBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny star
Send a message via ICQ to BBKing
Re: outbreak.ntli.net

Quote:
Well first I'd start by identifying whether the OS is capable of hosting the virus
How?

1) Get every customer to keep you updated every time they change computers? You'd need to get down to details of which patch level they had.
2) Port scan every PC on the network (have to ban firewalls first) and try and fingerprint them?
3) Analyse everyone's web traffic and see if you can get it from headers?
4) Employ a team of people to ring up thousands of people a day and ask them?

It's all very well saying this, but I don't think it's actually feasible.

Quote:
At the moment they're just using the system to score points as a "family friendly" ISP that takes its responsibilities seriously bla bla.
This is total poppycock - would you prefer an ISP that didn't take its responsibilities seriously?

It was done partly because we were getting hammered by traffic from worms and viruses, and partly because it became obvious that people don't fix their own PCs. We had to take steps to make them aware of it and how to do it. We could have just banned them, of course, as they were breaking their terms and conditions.

If we wanted to score points as family friendly, surely we'd block porn sites at the proxies and take naughty newsgroups offline, filter all email, etc. Quite what's so bad about trying to stop worms and spam I'm at a loss to understand.

Of course, I'd like to see us encourage Linux use at home by putting out our own distro with remote access tools built in for diagnostics and upgrades, but that's not going to happen, unfortunately.
BBKing is offline   Reply With Quote
Advertisement
Old 12-04-2005, 10:07   #17
KraGorn
Inactive
 
Join Date: Nov 2003
Location: Warrington
Posts: 37
KraGorn is an unknown quantity at this point
Re: outbreak.ntli.net

Tell me something here.

Given most (all?) 'botnets' are controlled by IRC and only a vanishingly small percentage of internet users actually use IRC ... no, I have no stats, but I stand by that assertion .. why don't ISPs simply block IRC until a customer asks for it?

I doubt many calls would be made to get it un-blocked.
KraGorn is offline   Reply With Quote
Old 12-04-2005, 10:38   #18
Toto
Inactive
 
Join Date: Dec 2004
Posts: 3,403
Toto has a bronzed appealToto has a bronzed appeal
Toto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appealToto has a bronzed appeal
Re: outbreak.ntli.net

Quote:
Originally Posted by BBKing
How?

1) Get every customer to keep you updated every time they change computers? You'd need to get down to details of which patch level they had.
2) Port scan every PC on the network (have to ban firewalls first) and try and fingerprint them?
3) Analyse everyone's web traffic and see if you can get it from headers?
4) Employ a team of people to ring up thousands of people a day and ask them?

It's all very well saying this, but I don't think it's actually feasible.



This is total poppycock - would you prefer an ISP that didn't take its responsibilities seriously?

It was done partly because we were getting hammered by traffic from worms and viruses, and partly because it became obvious that people don't fix their own PCs. We had to take steps to make them aware of it and how to do it. We could have just banned them, of course, as they were breaking their terms and conditions.

If we wanted to score points as family friendly, surely we'd block porn sites at the proxies and take naughty newsgroups offline, filter all email, etc. Quite what's so bad about trying to stop worms and spam I'm at a loss to understand.

Of course, I'd like to see us encourage Linux use at home by putting out our own distro with remote access tools built in for diagnostics and upgrades, but that's not going to happen, unfortunately.
Excellent post, some straight talking common sense.

Not too sure about the Linux distro thing thougj, but still, bang on the money.

Toto is offline   Reply With Quote
Old 12-04-2005, 11:40   #19
Rakhal
Inactive
 
Join Date: Mar 2005
Posts: 18
Rakhal is on a distinguished roadRakhal is on a distinguished road
Re: outbreak.ntli.net

I can certainly vouch for most botnets being controlled via IRC. I adminster an IRC server and I'm always having to kick them off (I hate botnets). However blocking irc isn't that simple, there is no one port that it uses (there is a default one though). And you can be sure that the botnet owners will rapidly change port numbers on you. Better to make sure/encourage people to keep their machines clean. After all, being part of a botnet and ddossing someone may be bad, but having your personal data stolen via a keylogger e.t.c is worse.

I could wish that IRC admins were a little more proactive about booting botnets off their servers. I often see signs of them on varius servers but no-one seems to take action Admittedly my server is a small one (we focus on creative writing) and so when a channel with 100+ weirdly named people turns up on it. it's a bit obvious
Rakhal is offline   Reply With Quote
Old 12-04-2005, 13:13   #20
Stuart
-
 
Stuart's Avatar
 
Join Date: Jun 2003
Location: Somewhere
Services: Virgin for TV and Internet, BT for phone
Posts: 26,546
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Re: outbreak.ntli.net

Quote:
Originally Posted by greencreeper
Quote:
Originally Posted by BBKing
I know them well and they're *very* smart - try defining how you'd identify who has a virus or not
Well first I'd start by identifying whether the OS is capable of hosting the virus
Easy to say. Not so easy to do.. I can think of one way they can do it remotely. When you access something with a browser, your browser sends a series of headers that include the platform, OS and browser sending the request. You could (theoretically) check for all Windows PCs this way.

I can think of two problems with this.
  • It relies on the application accessing the net actually sending these headers. I am pretty sure that only web browsers do.
  • It is easy to forge/alter these headers. Opera does this so that it can appear to be Internet Explorer. I am pretty sure virus writers would find a way to use these headers to make it appear the machine being checked is running Linux.
Stuart is offline   Reply With Quote
Old 12-04-2005, 16:01   #21
BBKing
R.I.P.
 
BBKing's Avatar
 
Join Date: Jun 2003
Location: London
Services: 20Mb VM CM, Virgin TV
Posts: 5,983
BBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny star
BBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny starBBKing has a nice shiny star
Send a message via ICQ to BBKing
Re: outbreak.ntli.net

Quote:
You could (theoretically) check for all Windows PCs this way.
3) It doesn't determine 100% that a particular machine can host the virus - two Windows PCs returning the same string could have one vulnerable, one not, depending on whether patches have been installed. It doesn't have enough information to make a certain judgement.

You could force everyone to run an app that walled-gardens them if they've not got all patches installed, but do we really want that?

The surest way is to identify IPs that are sending traffic that looks like it comes from a virus - specific ports, patterns of scanning etc. This can be duplicated by someone on another OS, but it has to be done deliberately and is effectively malicious (if you know how to exploit a vulnerability and program your Linux box to do it, that'll appear indistinguishable from the original infection).
BBKing is offline   Reply With Quote
Old 12-04-2005, 16:23   #22
Stuart
-
 
Stuart's Avatar
 
Join Date: Jun 2003
Location: Somewhere
Services: Virgin for TV and Internet, BT for phone
Posts: 26,546
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Re: outbreak.ntli.net

Quote:
Originally Posted by BBKing
Quote:
You could (theoretically) check for all Windows PCs this way.
3) It doesn't determine 100% that a particular machine can host the virus - two Windows PCs returning the same string could have one vulnerable, one not, depending on whether patches have been installed. It doesn't have enough information to make a certain judgement.
True, and the only way I can think of (without monitoring ports used and scanning patterns) would be hack into the machine, and check (in the registry) which patches are installed. Of course, this raises a little issue of privacy, and is illegal..

Quote:
You could force everyone to run an app that walled-gardens them if they've not got all patches installed, but do we really want that?

The surest way is to identify IPs that are sending traffic that looks like it comes from a virus - specific ports, patterns of scanning etc. This can be duplicated by someone on another OS, but it has to be done deliberately and is effectively malicious (if you know how to exploit a vulnerability and program your Linux box to do it, that'll appear indistinguishable from the original infection).

Just imagine the situation... Techy people leaving/avoiding AOL because "you have to run their cr*p software", only to join NTL and find they have to run NTL's cr*p software...

BTW, I'm quite happy with the system NTL have in place. Nice to see an ISP actually try and DO something about unpatched users.
Stuart is offline   Reply With Quote
Old 12-04-2005, 17:30   #23
greencreeper
Inactive
 
Join Date: Nov 2003
Location: Leeds - the dog house
Age: 48
Services: Email me for a current price list
Posts: 8,270
greencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny star
greencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny stargreencreeper has a nice shiny star
Re: outbreak.ntli.net

Quote:
Originally Posted by BBKing
It doesn't determine 100% that a particular machine can host the virus - two Windows PCs returning the same string could have one vulnerable, one not, depending on whether patches have been installed. It doesn't have enough information to make a certain judgement.
Exactly - so why write the software in the first place if they know it (a) cannot work because there's no way to identify infected PCs; and (b) users can leave the garden by downloading patches - no installation necessary.
greencreeper is offline   Reply With Quote
Old 12-04-2005, 20:37   #24
Stuart
-
 
Stuart's Avatar
 
Join Date: Jun 2003
Location: Somewhere
Services: Virgin for TV and Internet, BT for phone
Posts: 26,546
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Stuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver blingStuart has a lot of silver bling
Re: outbreak.ntli.net

Quote:
Originally Posted by greencreeper
Quote:
Originally Posted by BBKing
It doesn't determine 100% that a particular machine can host the virus - two Windows PCs returning the same string could have one vulnerable, one not, depending on whether patches have been installed. It doesn't have enough information to make a certain judgement.
Exactly - so why write the software in the first place if they know it (a) cannot work because there's no way to identify infected PCs; and (b) users can leave the garden by downloading patches - no installation necessary.
They may not be able to determine which PCs are patched with 100% efficiency, but they can detect machines acting suspiciously (port scanning, bulk emailing etc). I personally think this is a good thing, and, frankly, don't understand why you don't.
5
Stuart is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 08:52.


Server: lithium.zmnt.uk
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum