North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: "Information Warfare"

  • From: Brian Bruns
  • Date: Sat Mar 06 12:50:26 2004

On Saturday, March 06, 2004 4:46 AM [EST], william(at)elan.net
<[email protected]> wrote:

> Here is a quote from their press-release I especially like:
> ... "Symbiot has introduced the first and only tool that intelligently and
> accurately responds to hostile attacks against enterprise networks", said
> Richard Forno, former chief security officer for Network Solutions, and a
> noted information warfare specialist. "While other companies offer only
> passive defense barriers, Symbiot provides the equivalent of an active
> missile defense system" ...

Lovely.  So not only do we now have to fend off attacks from script kiddies
and packet monkies, we now have to fend off attacks from idiot sysadmins who
set this tool up and allow it to go all out on supposed 'attacks' against
their systems.

I'll share my favorite goober with firewall story.    When I was a
sysadmin/netadmin at a large ISP, I used to get these 'attack' reports from
clueless users all the time.  I could identify which tool they used just by
how the body of the message looked and how the 'attack' was described.  Got
ones saying that my performance testing server (which sometimes did ping scans
across the dialups to see what the general response time was) was 'attacking'
the user's machine with a single ICMP echo.  Or how our IRC server was trying
to attack the user on the ident port every time they tried to connect.

Of course, the best one was when a supposed 'security expert' called up and
complained how my two caching DNS servers for the T1 customers was attacking
his entire network on port 53 UDP.  He had naturally filtered the 'attack'
because it was obvious that our Linux DNS servers were infected with one of
the latest Windows viruses going around, and suddenly noone on his network
could browse the web anymore.

So, let me ask the question, do we really want people like that having a tool
which autoresponds to attacks with attacks?  At least when he filtered out our
DNS traffic, it only affected his network...  But imagine if he had launched
an attack against my DNS servers in response?   Yeah, thats a great idea.

Of course, now that the AHBL does its own proxy testing, we get all sorts of
fun reports from end users about our 'attacks' against their machines.  Latest
one demanded I tell her why we had scanned her, but wouldn't tell me her IP
address or when the scan happened exactly, claiming that I had done the scan,
so I should know what IP she is.  Too bad I test over 100,000 IP addresses
daily for open proxies....

Lets not even get into the legal consequences for a tool like this, especially
if it backfires and launches an attack against the NIPC, for example.
-- 
Brian Bruns
The Summit Open Source Development Group
Open Solutions For A Closed World / Anti-Spam Resources
http://www.sosdg.org

The Abusive Hosts Blocking List
http://www.ahbl.org