Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
News

Killing Others' Malicious Processes 468

Roland Piquepaille writes "This opinion is not mine, but the one of Tim Mullen, from SecurityFocus Online. In this story, he expresses some strong ideas regarding systems infected by worms. "I believe you should have the right to neutralize a worm process running on someone else's infected system, if it's relentlessly attacking your network. I've even written code to demonstrate the process. Though the initial news coverage of the concept was grossly inaccurate in conveying my ideas, it has stirred up a constructive dialog. I knew my idea was controversial, but I was wrong about something -- I figured everyone in the security biz would "get it" and that the hard part would be convincing everyone else that if they can't or won't secure their machines, we as the defenders would have the right to terminate the process attacking us. It has turned out to be the opposite." The author then looks at the criticisms about this strikeback idea raised by some security experts -- to dismiss them of course. Check this column for a summary or read the original story for more details."
This discussion has been archived. No new comments can be posted.

Killing Others' Malicious Processes

Comments Filter:
  • by Gyan ( 6853 ) on Wednesday January 15, 2003 @10:01AM (#5087150)

    RIAA : Great. Now, who's running Kazaa ?
    • by karmawarrior ( 311177 ) on Wednesday January 15, 2003 @03:17PM (#5089318) Journal
      When I wrote [slashdot.org] a proposal for keeping system administrators accountable - ensuring tht if someone puts a machine on the Internet, they take the necessary steps to secure it, it generated howls of outrage from people who clearly felt that there is no onus on admins to keep their machines secured and that blaming them in any way for the damage they cause is wrong.

      Jokes about the RIAA aside, which has indeed asked for laws to allow it to do exactly what you deem jokeworthy, the fact is that most people consider their PCs their own property but not their own responsibility. The view appears to be that it's ok for someone to leave a machine on the Internet available for anyone to take over, that the person who puts it there has no responsibility, and that anyone who complains, tries to get it fixed, etc, is in the wrong.

      Friends, I know that we all consider those who crack computers to be the ultimate culprits in any situation where a computer is damaged, but that doesn't mean that people shouldn't take responsibility their own parts in allowing this to happen. Someone who quite blatently leaves his or her keys in their car and parks outside bars would not be viewed by most people as completely blameless in the event that a drunk staggers out, takes the car, and drives it into a shop window.

      Leaving a machine unsecured and unmonitored on the Internet is a sure-fire way of ensuring it is hacked and used to attack other machines. We know this. Yet people continue to do it. They do not secure their machines once hacked, and they allow their own machines to attack others once hacked. This is negligence, pure and simple.

      This quagmire of negligent sysadmins not securing their machines, not allowing their machines to be shut down by victims yet not willing to consider the consequences of their failure to secure their machines and to turn off machines that attack others will not disappear by itself. Unless people are prepared to actually act, not just talk about it on Slashdot, nothing will ever get done. Apathy is not an option.

      You can help by getting off your rear and writing to your congressman [house.gov] or senator [senate.gov]. Tell them that negligent sysadmins who are happy to keep their computers connected to the Internet all of the time but aren't willing to take basic, simple, security precautions to ensure they play with others are a danger to the security of the Internet, a menace to other 'net users, and cause billions of dollars of damage every year. Tell them that you appreciate the work being done by groups like Security Focus, BugTraq, and even the efforts made by Microsoft to secure their systems and provide easy ways of keeping their products secure, but that if those responsible for computers that are on the Internet do not make use of the tools and features made available to them, you will be forced to use less and less secure and intelligently designed alternatives. Let them know that SMP may make or break whether you can efficiently deploy OpenBSD on your workstations and servers. Explain the concerns you have about freedom, openness, and choice, and how incompetent system administration harms all three. Let them know that this is an issue that effects YOU directly, that YOU vote, and that your vote will be influenced, indeed dependent, on whether or not they are willing to propose laws that provide proper deterents to poor system administratorship and allow those attacked by poorly managed machines to fight back.

      You CAN make a difference. Don't treat voting as a right, treat it as a duty. Keep informed, keep your political representatives informed on how you feel. And, most importantly of all, vote.

  • by Anonymous Coward on Wednesday January 15, 2003 @10:01AM (#5087151)
    yet again under another pretense.

    This will be abused like all the other technology laws.
    • Simple fix (Score:2, Interesting)

      block that IP in your firewall.

      I'm constantly getting hit from taiwan and SE Asia so I block the whole class C if it gets worse I go up from there. Seems to solve 99% of my problems.
      • Re:Simple fix (Score:3, Insightful)

        by bernywork ( 57298 )
        The only problem with this, and it was in the article, is that it wastes bandwidth. For some people with low speed links, virus attacks can take out their whole link. Blocking it at the router is no use, and it still has to get to their router in the first place for it to be dropped. The bandwidth damage is already done.
      • Re:Simple fix (Score:4, Insightful)

        by Tom ( 822 ) on Wednesday January 15, 2003 @11:19AM (#5087643) Homepage Journal
        Seems to solve 99% of my problems

        Yours, yes. Lots of people, and almost all companies, pay for their internet access, often by traffic. Blocking the crap at the firewall doesn't take care of that problem. In many cases, it makes it worse (due to retries).
    • Tim Mullen wants a licence to hack, the entertainment industry want a licence to hack. Here's a rap for them

      Yo Yo
      Ya say ya wanna have a licence ta hack
      That is really whack!
      If ya think we're gonna give ya a licence ta hack
      You be smokin'crack!
      Yo!

    • by sniggly ( 216454 ) on Wednesday January 15, 2003 @12:55PM (#5088496) Journal
      it's not a law. This is an international problem for which a law will most likely never come into being.

      Imagine I am your next door neighbour and I have a dead animal on my porch, the stench and health hazard is more than an annoyance to you. You can take action against that by removing the dead animal from my space but you would enter my premises doing so. Instead you can call the police or any other agency that might take the trouble to show up and deal with it.

      On the internet there is no 911. There is an uplink admin that might take action but the uplink might have a legal obligation to keep the link up. If the attacks take up a significant portion of your bandwidth you are seriously compromised, you are probably paying for the bandwidth the attacker is using while trying to compromise your system.

      Taking out the worm on the attacking system is what one could call a "surgical strike", you deal with it.

      It could be illegal to do so and for this you take responsibility.

      But is it immoral? Those here who seem to argue from a moral perspective saying it's wrong to try to stop worm attacks by entering and killing the worm on the attacking machine apparently are not server admins themselves. When you are under attack all you want is for it to stop.
      • by GMontag451 ( 230904 ) on Wednesday January 15, 2003 @04:37PM (#5089856) Homepage
        The way I see this is akin to a self defense plea when you are charged with murder. If someone is coming at you with a gun, you have the right to stop him/her with any available force. However, if you are charged with murder, the burden of proof is on you to show that you were acting in self-defense. The same should go for an attack on the internet. If some computer is attacking you, you should be able to react with reasonable force. But the burden of proof should again be on you to show that you were acting with reasonable force.
  • by mirko ( 198274 ) on Wednesday January 15, 2003 @10:02AM (#5087152) Journal
    You should not interact with other's machines :
    Let them fix their worm problems themselves or they may not appreciate it.
    It is normal and nice to tell them they have a problem but your work stops here !
    • by rmadmin ( 532701 ) <rmalek@@@homecode...org> on Wednesday January 15, 2003 @10:18AM (#5087244) Homepage
      I agree with this! I work for an ISP, and when we come across a user that we cannot contact to notify of problems, we simple disconnect them untill they can prove they have resolved the problem. Its worked wonders. We see so much less virus activity trying to hit our mail servers, and we've had alot less complains about people having a virus or worm.
      • by sfled ( 231432 )

        That is bsolutely the correct way to go, rmadmin. I report the problem server to abuse@problemserver'sISP and they usually inform the server's sysadmin/dork and disconnect the server until the problem is fixed.
      • by caseyc ( 559060 )

        I'm not sure that this is what the author of the article was talking about. But, I think you're more on track than he is.

        Maybe I'm missing the author's point, but it didn't seem like he offered any clear solutions? Who will have authority to kill the said processes? Will the ability for those authorities to do so be implemented in the OS?

        It's a noble idea, but certainly not ready for prime time. Holding people legally accountable for their own systems seems like a better solution, although nobody really sees that happening in the near future. For now, shutting the trouble machines out of the network while the user of the machine isolates the problem seems to be the easiest, safest, and most reasonable way to deal with worms and whatnot.

      • I used to work for an ISP where the policy was to inform the sysadmin, and if the complains against him/her were too many, disconnect it. However, if the customer was a large one (say... a public entity) and, as usual, had no one clueful enough to fix the problem, the bosses would send someone over from our office to help fix it...

        "But sir... I know nothing of exchange!"

        "No matter, go over there and run some antivirus or something"

        "...sigh..."

        I've ever since moved on to greener pastures. Still, my belief is that if there's no one at the offending site that can solve the problem, leave them alone unless they ask for help and pay you for your services.
      • by walt-sjc ( 145127 ) on Wednesday January 15, 2003 @11:37AM (#5087769)
        Um, and what about the guy who has to wait for days, his network being hammered, piling up and network usage charges, while you take you sweet time in the disconnect process? Do you cut your customers off if you can't reach them in 10 minutes or do you give them a while?

        Of course then you also have ISP's that are so backlogged that they don't respond to a security issue for days to begin with, or the ISP's in China that can't read english so just ignore you.

        Though rose-colored glasses this is fine. In the real world it fails.

        A good example was code-red. It wasn't just one server once in a while trying to infect your server, it was HUNDREDS. Simultaniously. How the fuck do you handle that though notification? How long are you willing to let your business be offline?

        Code-red was just another wake-up call. The next worm might be MUCH more malicious and do MUCH more harm to the internet.
    • by Pii ( 1955 ) <jedi @ l i g h t s a b e r.org> on Wednesday January 15, 2003 @11:15AM (#5087608) Journal
      There is a concept in law called "No Duty to Retreat," and I see no reason why it cannot be applied in much the same way to cases like this.

      This concept relates to self-defense, and deadly force. Follow along with me...

      If a person is in public, and is threatened, that person must make every reasonable effort to avoid the use of deadly force as a means of self defense, prior to useing such force. He must attempt to leave the scene, etc. In short, there is a Duty to Retreat.

      If, however, that person is in his home, his own property, that person may use deadly force as a means of self defense without having to exhaust every means of escape or avoidance. On his own property, a person has No Duty to Retreat.

      How is the scenario for Cyber-attack any different? Unlike most of the people commenting on this article, I believe you do have the right to take active measures in protecting your property.

      Obviously, we're not talking about deadly force... We're simply talking about electronic countermeasures.

      If an unsecured system on the Internet has been infected by a malicious program, and is now launching it's own attack against your system, your property, denying you the use of bandwidth or resources that you are paying for, I think you're perfectly within your rights to put the attack down, and if necessary, the offending system.

      A person utilizing the Internet has a certain responsibility not to cause harm, either through action, or inaction. Most people on the Internet today seem tragically unaware of this. Without this, the Internet is ripe for a tragedy of the commons situation.

      Is it wrong to still believe that with Rights come Responsibilities, or that with Priviledge comes Obligation?

      Your rights to swing your arms around recklessly ends at the tip of your fingers, and at the beginning of my nose.

      I think Tim Mullen is 100% correct, and I'm surprised there aren't more people that agree with him.

      • by regen ( 124808 ) on Wednesday January 15, 2003 @01:32PM (#5088676) Homepage Journal
        But the situation is not exactly analogous. Imagine two neighbors, each armed with guns. A theif breaks into neighbor 1's house, and the theif and neighbor 1, start shooting at each other. The theif shoots a bullet that travels into your house. Thinking that you are under attack in your own house, you start shootin at neighbor 1's house. Maybe, you even relise that there is a theif in neighbor 1's house and you are trying to shoot the theif, but instead you shoot neighbor 1, killing neighbor 1. I don't think that you can claim self defense in the murder of neighbor 1.

        This situation is a much closer analogy.
      • by TFloore ( 27278 ) on Wednesday January 15, 2003 @01:38PM (#5088693)
        "No Duty to Retreat" is also generally called the "Castle Doctrine" as in, Your home is your castle.

        It is very much a state-specific concept. For instance, Florida has Castle Doctine in it's law, you have no duty to retreat from your home if someone is attacking you. New York has no such law, and actually specifically states that you must retreat if you have any possible option to do so. If you get trapped in your basement by a home invader, and you have a 16"x16" window in your basement that you might possibly be able to squeeze through to get away, you *must* try to get out through that window before you may legally use deadly force to defend yourself.

        Also note that, for businesses and private individuals, there is nothing resembing Castle Doctrine for a place of business, only for a personal residence. Physical security forces are a special case, as they are nearly quasi-governmental.

        But this proposal raises several other interesting problems. One of the neat statistics that 2nd Amendment supporters love is the accidental shooting statistics comparison between police and people that legally carry a concealed weapon. Police are much more likely to shoot an "innocent bystander" or similar than someone with a CCW permit. The reason for this, if you look into things, is that a CWW permit holder is usually involved in the assualt/crime from the beginning and knows exactly who the bad guys are. The CCW holder is usually the one *being* assualted, and can see the assaulter right in front of them. The cops come in in the middle of things, and have to figure out who the bad guys are in mid-stream, sometimes under extreme time pressures.

        This relates to the Strikeback proposal rather directly. How many DDOS attacks use IP spoofing? Will you know who is attacking your system with certainty? How many systems are you allowed to incorrectly strike back at before you are legally liable?

        Which incompetent admins that can't secure their own systems are you going to let decide who to strike back at???

        Think of this in terms of the sniper attacks in the DC area last year. How much worse would it have been if 10 people nearby had pulled out guns and started randomly shooting at nearby vehicles that looked like they might be able to hide someone with a rifle? Thankfully, most people that carry a concealed weapon have more sense than to shoot at targets they are unsure of. I don't believe that of BOFHs on the internet.
        • by Pii ( 1955 )
          This relates to the Strikeback proposal rather directly. How many DDOS attacks use IP spoofing? Will you know who is attacking your system with certainty? How many systems are you allowed to incorrectly strike back at before you are legally liable?

          Which incompetent admins that can't secure their own systems are you going to let decide who to strike back at???

          Think of this in terms of the sniper attacks in the DC area last year. How much worse would it have been if 10 people nearby had pulled out guns and started randomly shooting at nearby vehicles that looked like they might be able to hide someone with a rifle? Thankfully, most people that carry a concealed weapon have more sense than to shoot at targets they are unsure of. I don't believe that of BOFHs on the internet.

          You raise valid questions, and so have some others. Most of them, however, seem to think I'm out to shoot someone that sends an ICMP Echo Request in my general direction. :) As tempting as that may be, from time to time, we're not actually talking about killing anyone in this discussion.

          How many DDOS attacks use IP spoofing? Probably a great many of them, but for most worms, IP spoofing is impossible, because the initiator in most cases needs to get responses back from the victim host. Using a spoofed IP address would make that nearly impossible.

          Obviously, electronic countermeasures would have to be very specific. A set of counter responses would have to be tailored to counter a specific worm.

          As an example, when NIMDA was running rampant, fully 5 months after appropriate patches had been offerred my Microsoft, and it was clear that there were a number of system administrators that had no interest in updating their systems, I put the NIMDA countermeasure on my system (I'd seen it posted here, as a matter of fact. That one had a problem, but I modified it to simply shut down the remote system, rather than disabling IIS first, and then attempting to shut down the system (That wouldn't have worked.)).

          My logfiles were filled with invalid queries from infected systems... Hundreds of log lines per system. After employing the countermeasure, I'd get 5 or 6 lines in my log, and then silence from the infected host. My script left a message in the offender's log files stating that they were infected, and containing the URLs to all of the appropriate Microsoft documents, and the patches that needed to be installed.

          Was I wrong to do so?

          I'm sure there are plenty of people that think I was. I fully understand their perspective.

          On the other hand, I think I was within my rights. It's pretty clear that 5 months after the outbreak, the people operating those systems were either unaware of the problem, or unconcerned about it's impact on others.

          Let's say your auto manufacturer issues a recall about an unsafe braking system in your vehicle, directing you to take the vehicle into an authorized service center for corrective measures at no cost, and you choose not to do it. Months later, you experience a brake failure, and slam into another car. In my book, you're guilty of negligence.

          I view the people that failed to patch their systems, 5 months after the NIMDA outbreak, when patches existed even prior to the NIMDA outbreak, in the same manner. Negligent. You've allowed your property to become a public hazard through inaction.

          It isn't as if I built a scanner, to go out and sweep the Internet for people with infected systems, and attempted to shut hosts down at random. My script sat in wait. It retaliated only against systems that had brought the malicious code to bear on my system, and my bandwidth.

          (As a result of NIMDA, to this day I am still unable to receive inbound connections on Port 80, because my ISP has set up filtering.)

          • by TFloore ( 27278 ) on Wednesday January 15, 2003 @03:50PM (#5089522)
            No, I don't really think you want to go out shooting anyone that pings your system. I do think most people that want this law want to have their systems running reliably, and don't really care what damage they have to cause to other people's systems for that to happen.

            Your comparison of Nimda to a brake recall on a car is actually rather interesting. It allows us to consider a lot of things that might actually make sense here, and some that don't make much sense.

            First, your comparison to a brake recall would make more sense if the people driving the vehicle didn't know their vehicle *had* brakes. Many (not most, I believe, but a large minority) of the people that were running non-patched systems when Nimda became a problem didn't know they were running IIS. This is one of the reasons MS switched to services off by default.

            Second, the manufacturer found the problem, but didn't actually send out notices, just put a note on a web site somewhere where most people don't even know to look. Unless you make a specific effort to become aware of security issues, you won't know. You either join a mailing list and wade through way too much traffic for people that have real work to do also, or regularly visit a website and, again, read through too much traffic. Yes, I'm assuming these are not dedicated sysadmins, which is the case for most small and medium-sized businesses and homes.

            Third, for people that get regular service done at a dealer service center, the driver may not know or care about recall work, the dealer does it for them. That's supposed to be one of the reasons you get regular maintenance done by the dealer. Not just because you like paying horrible prices for an oil change. :)

            This is actually worth thinking about from the point of view of computer services companies. If IBM Global Services has a support contract with your company to maintain computers, and doesn't supply a patch, they are probably negligent. If IGS doesn't do it, is the company that owns the computers negligent, if they though IGS would? (No, I don't work for IBM, they are just a convenient example.)

            Does a home user have a requirement to have their computer serviced regularly by a professional? How about a small business owner?

            If a small business buys a microwave oven for the break room and that microwave is subject to a recall because it causes fires... If the business never hears about this (never sent in their warranty card so they don't get notices, and they don't check an online recall site) and doesn't replace it, if someone dies in a fire caused by that microwave oven, is the business liable for not exercising due dilligence?

            Frankly, I don't know. I just know this is more complicated than we'd like to pretend it is. I'm looking for a quote here, something along the lines of "For every complicated problem, there is a solution that is simple, easy, and wrong."
          • by 0xA ( 71424 )
            Most of them, however, seem to think I'm out to shoot someone that sends an ICMP Echo Request in my general direction. :)

            I don't think you would do that but I have met some people that would.

            About a year ago I got an email from some guy telling me I had I virus on one of my company's computers and it was trying to hack into his system. He was rather upset. When I investigated I found that it was actually just an SQL replication agent that I had put the wrong IP address into. I guess he had one of those personal firewall programs that pops up a dialog any time somebody tries to connect to your computer so it looks like it is actually doing something. I sent him a message saying I was sorry for the mistake, it won't happen again etc. He wrote back that saying I was obviously an idiot, I tried to hack him and if it happened again he would call the cops.

            A week later I am starting a replication manually and I enter the IP wrong again, same one, it was very similar. Buddy flies off the handle, emails me 6 times, emails abuse@myisp 10 times, calls my office etc. I spent a week explaining this to people.

            Now you know, and I know that a couple connection attempts to your machine on a port that is not open is no big deal. It is almost always a mistake. Your average user does not know this. I don't even want to think about what would have gone on if this guy had access to "Evil Hacker EZ Revenge Kit" or something like it.

            I agree with this idea in a theoretical sense but I think it is too dangerous to become a common practice.

      • by evenprime ( 324363 ) on Wednesday January 15, 2003 @02:00PM (#5088818) Homepage Journal
        Pii said:
        There is a concept in law called "No Duty to Retreat," and I see no reason why it cannot be applied in much the same way to cases like this. This concept relates to self-defense, and deadly force. [....] If, however, that person is in his home, his own property, that person may use deadly force as a means of self defense without having to exhaust every means of escape or avoidance.

        On his own property, a person has No Duty to Retreat.


        What you say is correct in many, but not all jurisdictions in the USA. For example, in Florida [directedfire.com], your statement would be correct, since they allow the use of deadly force to protect any of your property. In contrast, Massachusetts [geocities.com] residents may not use deadly force to protect their property, although they can use it in self defense. Specifically:
        According to what I just googled [nwmissouri.edu], Kentucky, Massachusetts, Maryland, Missouri, Ohio, South Carolina, Virginia, Washington, Wisconsin and Wyoming don't even allow the use of deadly force to protect a dwelling. Surprisingly, it looks as though Maryland [direct-action.org] actually allows more latitude in the use of deadly force to protect your business than it does to protect your home. (If someone in one of those jurisdictions has better info, feel free to correct me.)

        Anyway, the short version here is that jurisdictions differ widely in a) what you are allowed to defend, and b) what means you are allowed to use in defense.

        How is the scenario for Cyber-attack any different?

        First off, this idea is a defense of property. It is not a matter of defending you or your family against death or bodily injury. All states allow the use of deadly force in to protect you and your family, but they differ widely in what *else* they let you protect with deadly force; i.e. you may not be allowed to use deadly force to protect your property.

        Obviously, we're not talking about deadly force... We're simply talking about electronic countermeasures

        You correctly noted that computer strikeback is not the same as the use of deadly force, but you failed to note that the states have similar disparities in computer laws. For example, the Oklahoma Computer Crimes Act of 1984 makes it a felony to
        Why strikeback is a bad idea.

        What is legal in your jurisdiction may not be legal in your targets jurisdiction, or in the jurisdictions of the computers, switches and routers that your attack travels through enroute to the the target

        It may not be effective in eliminating the problems your network is having from the target site - if you strike back against a machine and accidently harm it, you could find yourself in a protracted feud with the owner of that system (a la "hatfields vs. mccoys") which ends up being more of a bother to you

        If you cause collateral damage, you could be liable for it - e.g. someone is flooding you with easily spoofable ICMP and UDP packets and you foolishly DoS the machine whose IP address appears in the header, thus shutting down a small business owner's website. There's a good chance you'll get sued if they know what happened.

        it may not be cost effective to accurately trace and identify the machine that is attacking you.

  • actually (Score:2, Interesting)

    by Anonymous Coward
    I'd rather see a set of worms released that infected machines on the scale of say code red or nimbda - but actually patched security holes, and or closed all the ports on the host machine. If the ports already closed by the machine were in actual use, the user would have the option to open the ones needed manually.

    • Re:actually (Score:4, Informative)

      by greechneb ( 574646 ) on Wednesday January 15, 2003 @10:08AM (#5087192) Journal
      I seem to remember such a thing for unix/linux systems a while back, a search on google would probably find it.

      I'm pretty sure no one liked it.(I think the creator got bashed for it actually.) Mainly for the reason that changing something to fix a worm might break another process running on your machine if not done the correct way.

      If you are so worried about another machine trying to break into your own, I'd be securing yours better so you wouldn't have to worry...

      • Ok, I found it. The one I was thinking of was Cheese, the friendly worm

        Read about it here, including a nice set of pros and cons here [sans.org]

      • Re:actually (Score:2, Informative)

        by bpfinn ( 557273 )
        I'm pretty sure no one liked it.(I think the creator got bashed for it actually.)

        That's probably because the author, "Max Vision", programmed his worm to leave a backdoor open on your system - after it patched BIND to a safe version. He's in jail now.
  • Vigilante justice? (Score:5, Insightful)

    by grub ( 11606 ) <slashdot@grub.net> on Wednesday January 15, 2003 @10:04AM (#5087164) Homepage Journal

    Exactly who decides what constitutes "relentlessly attacking your network"?
    A simple NMAP scan? What about Netbios scans? @Home scans for open NNTP servers... etc etc..
    • they would decide over time a set of precedents just like for defending oneself from physical attack.

      If you slap me I can't just shoot you, but if you stab me: you'd better be ready.

  • by Sheridan ( 11610 ) on Wednesday January 15, 2003 @10:04AM (#5087170) Homepage
    Bruce Schneier has more discussion of this in the latest Crypto-Gram [counterpane.com] issue, both in the main section and in the letters (including a letter from Tim Mullen).

    There is a good justification in Mullen's letter as to why this proposal is different from the RIAA's proposed attacks on computers that they suspect of hosting unauthorised copyrighted material.

    • by JPawloski ( 546146 ) <jpawloski@gmail.com> on Wednesday January 15, 2003 @10:21AM (#5087263)
      "Since the owner of a system has no responsibility for the actions of a worm, or any malicious process, that runs without their knowledge, I submit that they also have no rights to the process. No responsibility means no rights.

      So, if they have no rights to the process, there is no infringement against them when we neutralize it. If someone wants to claim that their rights were violated by our taking out the attacking process, then they should be held accountable for the actions of the process from its inception. They can't have it both ways. "

      That, I think, is a good point. The solution, however, is not to make the counterattack legal, thus continuing to absolve people of responsibility, but to make the owners of the systems legally responsible for their failure to secure their systems. If your system is 0wn3d and used to launch a DDoS attack on AOL (or Slashdot, Kuro5hin, whoever), then AOL should have the right to sue you for damages. Your incompetence caused their loss.

      You say you can't afford to pay? Tough. Should have thought of that before you put your insecure system online. You say it's the fault of the manufacturer for selling the insecure system in the first place? Take them to court. Too expensive? Well, if their system is too expensive to use, then people won't use it.
      • who's competence is at stake did you say?

        I'm sorry but my brain comes with a EULA :

        This brain is supplied "as is" without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose and the accuracy of the information contained within it

      • Treating computer processes and network connections as extensions of human being ignores the great complexity of computer systems and the irreducible nuances to responsibility, origin, and intent such machines introduce.

        Translating your argument into the world of atoms, that would be like holding someone responsible for a vandal who goes into someone's unlocked car, releases the emergency brake, and lets the car go careering into a crowd of innocent bystanders. Just because computers seem to "act" does not mean that their actions are always the fault of their owners, secure systems or no.

        The key is to hold those who crack systems accountable for their actions and to educate victims about how to better secure their systems. Those users unwilling or unable to secure their systems should pay third parties to secure their systems for them.

        Even the best secured system is not uncrackable. Would you hold the best sysadmin in the world responsible for a script kiddie's lucky guess?

        Your post says you would.

        • by MalleusEBHC ( 597600 ) on Wednesday January 15, 2003 @12:53PM (#5088485)
          I don't think it is a matter of holding everyone responsible for any attack that may come from their machine. It is about holding negligent users responsible for their negligent actions.

          For exameple, if someone owns a gun but keeps it locked in a safe in their house and stores the ammo somewhere else, yet some master thief manages to steal their gun and use it in a crime, I doubt anyone would say that is the fault of the gun owner. However, if the same gun owner left the gun loaded and laying around on their front lawn and someone came by, picked it up, and shot somebody, they would be sued and/or arrested for their negligence.

          The problem is determining at what point is a computer user negligent. Is your average consumer negligent for connecting their Windows box to a high-speed connection and not using any firewall software? Or is it someone who turns on various services like file sharing without knowing full well what they are getting into? Or is it anyone who takes reasonable precautions, but when they get cracked they don't realize it until their box has had a chance to eat up tons of somebody else's bandwidth?
      • Stealing someone else's insightful post [slashdot.org].
      • While I may agree with some of this, I think it should be pointed out that securing your systems is not a binary operation; you can be a competent sysadmin and still get owned by the latest exploit if you didn't find out about it quickly enough. You can also get nailed by some obscure exploit that a duly diligent admin might not have known about.

        You might also get nailed if you run an insecure application or allow users to run code on your system. My concern is that if you have a precedent like this, no one who can't afford an army of lawyers could afford to take the risk of being online, because the risk of getting sued into penury is too great.

        Do we want to foster a system where only the very wealthy or highly-connected can afford to run a server on the Internet?

    • SchneierZilla vs MegaMullen? No contest!
  • Duty of care (Score:5, Interesting)

    by benjiboo ( 640195 ) on Wednesday January 15, 2003 @10:05AM (#5087171)
    It could be argued that people who hook up to a public network owe a duty of care to other users of said netwotk-

    At some point, being stupid becomes negligent.

  • Well (Score:2, Informative)

    by Pros_n_Cons ( 535669 )
    Security guys are some of the most paranoid on the planet, were talking about guys that wont run LIDS cause they don't trust it. Why would they be for someone remotely screwing w/ thier machine. Sounds good in theory but not applicable in the real world, say for instance this new service starts a new worm that rely's on killing processes. Just stick with the best idea to date.. KNOWLEDGE
    • Re:Well (Score:5, Interesting)

      by mccalli ( 323026 ) on Wednesday January 15, 2003 @10:19AM (#5087252) Homepage
      Security guys are some of the most paranoid on the planet, were talking about guys that wont run LIDS cause they don't trust it. Why would they be for someone remotely screwing w/ their machine.

      Because they're being arrogant enough to assume that it would be them screwing with your machine, not the other way round.

      Obviously, security experts are perfect and would never have malicious processes running on their machine. Whereas you little people are obviously weak and fallible, and need the demi-gods to come in and hack you. In your best interests of course. And they won't ever make mistakes whilst they're there, promise.

      I'm entirely against this proposal. If there's a problem with particular machines, it should be dealt with at the ISP level. Now eforcable rules and remedies there I'm completely in favour of.

      Cheers,
      Ian

  • by Patman ( 32745 ) <pmgeahan-slashdotNO@SPAMthepatcave.org> on Wednesday January 15, 2003 @10:06AM (#5087181) Homepage
    ...I think he's a pompous ass.

    Let's check this quote from his page:

    I think the main reason for the knee-jerk criticism from the likes of Schultz is that they work largely in a theoretical rose-colored world of security, where all problems are solved after a cup of coffee and a bit of pontification. Those who actually work in the operational end of network and system security see things as they really are.


    In other words, "if you don't agree with me, you're not a real security guy".


    I, personally, feel that breaking into someone else's machine without permission is an ethical violation. But, according to this schmuck, that's not valid because I don't see things "as they really are".

    • by LostCluster ( 625375 ) on Wednesday January 15, 2003 @10:27AM (#5087292)
      "Things as they really are" is that the guy stuck in the server room when a DDOS happens is blamed for the downtime by the people around him, but he has zero power to make it stop. This is a problem for your average power-tripped server admin, who's used to being root and having nobody get in his way.

      The fact is, there's nothing a DDOS victim can directly do to stop the attack. They have to call their ISP to plant a firewall upstream of their wire so that useless data doesn't clog the connection. Maybe it'd be better to automate that in the router protcols, something along the lines of "xxx.xxx.xxx.xxx has requested that trafic being sent to it by yyy.yyy.yyy.yyy be routed to the bit bucket for the next 6 hours." That'd effectively make the attackers disappear from the attackee, and could be sent out as soon as the attack is realized.
    • I, personally, feel that breaking into someone else's machine without permission is an ethical violation.

      I completely agree. It is also, and more importantly, a criminal violation. This isn't the Wild West Internet anymore. You're perfectly able to block all incoming packets from any infected worm host at your gateway router. Anyone who believes that vigilante justice is either legal, or ethical needs a wakeup call. I hope this guy actually tries it and gets himself landed in court for his trouble.
      • by phil reed ( 626 ) on Wednesday January 15, 2003 @11:07AM (#5087543) Homepage
        Anyone who believes that vigilante justice is either legal, or ethical needs a wakeup call. I hope this guy actually tries it and gets himself landed in court for his trouble.

        Here's an interesting distinction (found in the letters on Crypto-Gram): If you reverse-attack a machine that's attacking you, is it vigilante justice or is it self-defense? Vigilante justice is when you hunt somebody down after the fact, self-defense is when you stop somebody during the act. Both have significant case law, and self-defense is quite justifiable under certain circumstances (action was done to avert a threat of immediate, significant harm, harm caused by the action was not disproportionate to the harm avoided, etc). I think a strong case for self-defense can be made here.

  • by oliverthered ( 187439 ) <oliverthered@nOSPAm.hotmail.com> on Wednesday January 15, 2003 @10:08AM (#5087190) Journal
    Well, he singing one song quite loudly during the day time and it keeps me awake. (i'm a night worker)

    Tomorow I'm going to pin the fucker down and cut out the bit of his brain that makes him sing that horrible song over and over again.



  • So what, I'm going to have to build in a SOAP [w3.org] interface to give a potential stranger the right/authority to wack processes on my system or web site? I can't even begin to list the number of security issues this raises.

    No way. If you think I've got a worm, call my IT guy and block my IP on your firewall until it gets fixed.

    • Too right.

      I mean how are they going to enforce this? You'd better believe I'd take every effort to nuke the server on my own boxes. If someone thinks I'm DOSing them then of course I'll take steps but they go through me to get to my machine.

      And if a user a can disable it (and they will be able to - there is no such thing as 'client side security') then an attacking worm can surely do the same . . .
  • loss of business (Score:4, Insightful)

    by KDan ( 90353 ) on Wednesday January 15, 2003 @10:08AM (#5087193) Homepage
    The only problem with this strikeback thing is what if the machine which is infected is business-critical?

    If you're going to take it on yourself to fix other people's machines, what if this causes them loss of business? And there's also varying definitions of what "strikeback" or "fixing" could mean. What if someone decides to "fix" your database server by shutting it down? Shouldn't they be held liable for the damages caused, just as someone who does that maliciously can be held liable?

    There's just too many holes in this strikeback philosophy. It opens the door to tons of abuse too: "I only broke into this machine to fix it, I swear, gov'nor!"

    I think it would also result in pretty dire situations when a machine equipped for strikeback mistakenly decides another machine (also strike-back-enabled) needs to be "fixed", and starts attempting to hack into it - and then the other one detects it as well, and they start concurrently trying to hack into each other... probably saturating the network with crap on the way...

    Daniel
  • by EvilAlien ( 133134 ) on Wednesday January 15, 2003 @10:09AM (#5087199) Journal
    At least they can act to contain the spread of a virus, but not by killing processes on customer PCs. they can, however, disable service, whether it be a cable, *dsl, or dialup modem account. Shutting off service and forcing customers to take measures to clean their infected computers is allows by the acceptable use, terms of service, and other policies which protect the ISPs rights to take action.
    • But they don't. That's one of the basic foundations of Mullen's whole argument. Furthermore, as someone who's running his own servers on a DSL connection - and therefore someone who keeps watch of blocked connection attempts - I know only too well how true his other point on this topic is: most of the time, you can't look up the IP address and find who's responsible for it. Furthermore, even when it's resolvable, only a fraction of those IP's will have an "abuse" email address to which to submit complaints. I use "psad" for watching these things. It makes it a lot easier to keep track of these events than the collection of scripts I had to munge the logs. I investigate real scans, and save all the emails in case (God forbid) I need them to help with a forensic investigation.
  • by katre ( 44238 ) on Wednesday January 15, 2003 @10:10AM (#5087201)
    If parents don't vaccinate their children, the state takes them out of school. If a dog consistently attacks people, the authorities put it down. If someone commits three felonies, they are put away for life. This is because the rights of the many outweigh the rights of the one.

    This is an interesting point, because it shows the essential flaw in this logic. In all of these examples, who is acting? "The authorities", namely, the government. In this absurb "strikeback" proposal, who is acting? Vigilante sysadmins. If anything, his examples prove that we need a national cybersecurity enforcement agency, which is responsible for taking machines offline when they get virus-infected. Clearly, this is a bad idea, and that's why strikeback will never work.
    • Strikeback's just slightly misplaced. It's clear attacking computers need to be stopped, but it's much easier to have DCMA-style takedown process where legal notice is served on an ISP to takedown the offender, and filing a false report opens the false reporter to legal liability.
    • some logic problems (Score:3, Interesting)

      by Lovejoy ( 200794 )
      Yes, and.. one point I haven't seen made yet: The government can't vaccinate your children without your permission. They can kick them out of school, isolate them and make your life pretty miserable, but they can't invade their bodies without due process of law, which is missing in this equation.

      And now DUCK, because here comes the straw man:
      I think the main reason for the knee-jerk criticism from the likes of Schultz is that they work largely in a theoretical rose-colored world of security, where all problems are solved after a cup of coffee and a bit of pontification

      While it's valid to argue that Shultz is responding knee-jerkedly (somebody have a better adverb?) It's not valid to attack him by virtue of the fact that he's an academic and to denigrate him with the cheap-shot coffee comment.

      Academics study things like unintended consequences, the big picture, etc.. These are things most geeks can't be bothered to consider. While stupid academics tend to rise to the top in the media, very few are actually addle-headed theoretical bloviators. These smart people can contribute a lot to our discussions.

      As for the actual argument about killing others' rogue processes, I don't have anything original to say, but in the "real world" it would be called vigilantism and trespassing.
  • He send us the bomb!

    Next you will be telling us that it's ok for government A to overthrow government B if it thinks B is destabilizing to it.

    HHOS

  • The money quote (Score:5, Insightful)

    by wiredog ( 43288 ) on Wednesday January 15, 2003 @10:11AM (#5087206) Journal
    Since the owner of a system has no responsibility for the actions of a worm, or any malicious process, that runs without their knowledge, I submit that they also have no rights to the process. No responsibility means no rights.

    So, if they have no rights to the process, there is no infringement against them when we neutralize it. If someone wants to claim that their rights were violated by our taking out the attacking process, then they should be held accountable for the actions of the process from its inception. They can't have it both ways.

    That, I think, is a good point. The solution, however, is not to make the counterattack legal, thus continuing to absolve people of responsibility, but to make the owners of the systems legally responsible for their failure to secure their systems. If your system is 0wn3d and used to launch a DDoS attack on AOL (or Slashdot, Kuro5hin, whoever), then AOL should have the right to sue you for damages. Your incompetence caused their loss.

    You say you can't afford to pay? Tough. Should have thought of that before you put your insecure system online. You say it's the fault of the manufacturer for selling the insecure system in the first place? Take them to court. Too expensive? Well, if their system is too expensive to use, then people won't use it.

    • Auto insurance is like that. My liability insurance covers whoever is harmed by my car, because ultimately I am the one who will be sued because my name is on the registration. At least in Pennsylvania, that also includes if some numbnuts steals my car.
    • Re:The money quote (Score:5, Insightful)

      by Tall Rob Mc ( 579885 ) on Wednesday January 15, 2003 @10:39AM (#5087353)
      I think you make a very good point, but I don't believe it follows the right course. The best way to attack a problem is at its root. As much as we would all like to have 100% of online computers running completely securely, we cannot expect such a large user base to do this.

      If your car is stolen because you left it unlocked in a parking lot and used in a hit-and-run accident, the car owner should not be held responsible. Yes, it is his fault that he didn't lock his car, but it shouldn't be illegal for him to leave his car unlocked. The crime committed here was by the thief.

      Likewise, if your computer is used in a DDoS attack on a commercial website, you should not be held responsible unless you intentionally left it vulnerable specifically for use in an attack. The insecure computer has done nothing wrong, the blame is in the hands of the person who used the computer for a malicious attack.

      Blaming the owner of the insecure computer is simply cutting one head off of a hydra.

      • Re:The money quote (Score:5, Insightful)

        by tsg ( 262138 ) on Wednesday January 15, 2003 @11:26AM (#5087686)
        If your car is stolen because you left it unlocked in a parking lot and used in a hit-and-run accident, the car owner should not be held responsible. Yes, it is his fault that he didn't lock his car, but it shouldn't be illegal for him to leave his car unlocked. The crime committed here was by the thief.

        Likewise, if your computer is used in a DDoS attack on a commercial website, you should not be held responsible unless you intentionally left it vulnerable specifically for use in an attack. The insecure computer has done nothing wrong, the blame is in the hands of the person who used the computer for a malicious attack.


        Just to pick a nit, the difference is that, in the case of a DDOS attack, once the owner of the system becomes aware of the problem, he has the power, and therefore the responsibility, to correct it. If someone allows his system to continue attacking someone elses, even if he didn't cause the problem, he should be held responsible.

        Once the car is stolen, the car is no longer under the owner's control. Once the system is compromised, the sysadmin can still control it, even if it means pulling the plug.

        That said, I still don't think it gives the victim of an attack the right to go in and muck about in someone else's machine.
    • Re:The money quote (Score:4, Interesting)

      by Whispers_in_the_dark ( 560817 ) <rich,harkins&gmail,com> on Wednesday January 15, 2003 @10:41AM (#5087359)
      Sounds like a great scam to me. Here's how the dance could go:

      1) Create a worm that will at some point perform a DDOS attack on my machine. Make sure it's nice and quiet so that it isn't detected until attack day.

      2) Wait until my site is attacked by the worm. Whine and moan about the lack of security on the other machines.

      3) Pick from among the richest "attackers" and sue their pants off...

      (Oh yeah, ... profit!)

      A friend of mine once said, "The only secure system is one that's not connected to the wall outlet." The hackers will always find something new to break into and everyone else will diligently (sometimes) try to stop them. The problem is that everyone's idea of diligence is different and someone with an itchy trigger finger killing off my processes at the drop of the hat isn't my idea of better security.

      Plus, whatever means the security patrol uses to shutdown the offending processes will likely be exploitable in itself. If ssh is getting hacked then certainly this little back-door will too.
    • Re:The money quote (Score:4, Interesting)

      by Xugumad ( 39311 ) on Wednesday January 15, 2003 @11:22AM (#5087665)

      I maintain a small number of servers, for a research project. All of these run the minimum of services for our purposes, have their own firewalls (in addition to the main organisational firewall), and once I apply the new packages for RHSA-2003:001, they will be up to date with all available patches.

      This does not mean that they are unhackable. While it may be unlikely that someone will write a worm that uses a previously unknown bug, it could happen. By what you're saying, I'd still be liable. Should I have checked every single line of code my box runs?

      As much as it may frustrate people when they get DDOS by wormed systems, this is not the solution. Better arrangements for having ISPs disconnect wormed systems, in my opinion, is the solution.

      • Re:The money quote (Score:3, Insightful)

        by Otto ( 17870 )
        Uh huh. And yet Nimda continues to spread.

        What about those boxes that are essentially never updated? These are the *vast* majority of machines on the network, causing all the problems and eating all the bandwidth.

        It's fine and great that you keep your box patched and up to date, but at some point, failure to do so should be considered negligent. You put a box on the network, don't keep it up to date, eventually it gets rooted, and starts attacking everyone else. Everyone else is justifiably pissed off at you now for not taking care of your own shit.

        Either they need to have a legal recourse for your negligence, in order to force you to stop being so negligent, or they need to have a legal means of self defense. You won't fix your box, they should be able to.

        The key is not is this right or not, it most certainly is right. The key is where is the line drawn? How up to date with patches and fixes should be required to keep it? Exactly at what point does stupidity become negligence?
  • It's next to impossible to determine what defines an attack or not... and I don't want people other than me shutting down my webserver thank you very much.

    Wouldn't it be nice if there were programs that could automatically determine what's a worm or virus, and then attack the process from within the machine? No need for an outside user, just have the system kill its own rogue process as soon as it starts. Oh, it does exist. It's called Anti-Virus...
  • by tbmaddux ( 145207 ) on Wednesday January 15, 2003 @10:13AM (#5087221) Homepage Journal
    In his Dec 15th Cryptogram [counterpane.com] Bruce Schneier provides his argument against counter-attack, and there are some interesting reader responses to this in today's issue. [counterpane.com]
  • Hell no (Score:5, Insightful)

    by Reality Master 101 ( 179095 ) <<moc.liamg> <ta> <101retsaMytilaeR>> on Wednesday January 15, 2003 @10:14AM (#5087222) Homepage Journal

    I think this guy lives in the world of theory, where everything works "in theory".

    I don't want some idiot out in the world thinking he knows more about my system than I do going in and thinking he's doing everyone a favor -- when he's actually doing damage to my system. Intentions don't mean a crock of dog doo.

    If my system is spewing garbage, then it should be the right of the ISP to pull the plug until I get it fixed. That's the way these things should work.

    But there's no way I want fools poking into my computer, no matter what.

    • Nah, he works in "the real world" and is upset that the "theory" guys haven't adopted this idea, which would make life oh, so easy for him. What he forgets is that rogue machines are not going to honor "stop the attack" requests, as by definiton they are not playing nice with the rest of the world. Furthermore, how is he going to feel when it's his machines feeling a strikeback... and who or what will decide if a strikeback is fair or unfair? This is what happens when people start pushing theories without thinking about the other people's viewpoints.
  • by EkiM in De ( 574327 ) on Wednesday January 15, 2003 @10:14AM (#5087223)
    I read this the other day when it was posted on "The Register" [theregister.co.uk] and I didn't like it then and I don't like it now.
    Why?

    Well it all boils down to an attempt to legitimise hacking. If it was allowed that we could "strikeback" ( which is just a cute word for hack ) and disable the attacking process, then where do we draw the line. I think we can all agree on the extremes, but lets consider another example.

    What if a website was posted on slashdot, would all of the rampaging geeks be classed as attacking processes and therefore be liable to be struckback and eliminated. I am certain that the website administrator would consider the massive increase in traffic to be an "attack" as their poor server disappears in smoke.

    Personally if you are likely to be attacked get better security. You can't enter somebody's house just to close an open window.
    • Hmm... I smell an interesting scam here. Under strikeback rules, I could legally hack. Let's say I go out and create a virus or a worm that is designed to intentionally go out and attack one of my own sites, then anonomously release it into the wild. Why would I do this? Because then, I'd have legal authority to hack any infected system. And, while I was in there fixing things, perhaps some interesting and useful data could turn up.

  • by vaidhy ( 14207 ) on Wednesday January 15, 2003 @10:15AM (#5087225)
    There are two independent issues:One is a ethical issue. Is it morally right to attack (it is attacking, irrespective of defensive or offensive reasons) somebody else's machine?

    The second one is a legal issue. Does the attacked person(both sides) has any legal recourse? Do they have any credible claims for damage?

    Vigilante justice, at best is stupid and at worst, can lead to a more dangerous society than one without.
    • Is it morally right to attack .. somebody else's machine?
      I think this is similar to the question, "Is it morally right to deadly force against another human being?" At first kneejerk impulse, the obvious answer is "No, of course not!" But then you'll probably realize the real answer is, "It depends." If someone shoots at you, most people think you're justified in shooting back.

      But if we're willing to concede that it depends, when talking about killing people, then why not also concede it in situations where the stakes are much lower? If I can kill a person who is attacking me, why can't I attack a computer that is attacking mine?

  • Errant Machines (Score:4, Insightful)

    by Anonymous Coward on Wednesday January 15, 2003 @10:15AM (#5087229)
    What we have here is no accountability and no responsibility. A ship's Master (Captian) is responsible and accountable for the ship in his charge and the actions of his crew. The owners, or administrators should also be responsible and accountable for the machines network in their charge. Hold them to account for their malicous machines - otherwise the problem will just get worse. Who then determines a malicious process on my network? The RIAA and other large political contributors? Remember, in the U.S. at least, money controls everything. Those with it get what they want and those without it suffer.
  • well... (Score:2, Insightful)

    by bonovoxpsu ( 570513 )
    if you're that "good" and can kill a process on someone else's network, how about you use that excellent knowledge and contact the owner of the machine?

    hacking (don't paint it any other way, you're breaking into someone's system) someone else's machine is not the answer. the system is not any more secure after you've killed it's process, it is still wormed, and the most important thing is that the admin of that machine hasn't learned a thing!

    but then what do i know, i'm not a security expert...
  • by KjetilK ( 186133 ) <kjetil@@@kjernsmo...net> on Wednesday January 15, 2003 @10:18AM (#5087246) Homepage Journal
    I didn't RTFA, but I think a valid point discussing in this context are things like the PHP-scripts that where posted when Code Red [slashdot.org] was riding high.

    Would they be OK?

  • I'm sure some people could draw a vague parallel with protecting your home using lethal force here... but i don't buy it. I certainly believe if a hacker is inside your system you have every right to st0mp his ass out of there by whatever means necessary, but if your neighbor is coming round ten times a day knocking on your door you call the cops and get a restraining order taken out - you don't go over there and shoot him.

    I don't think it's ever right to trespass, whether it's for the "common good" or not. If it's not yours, stay clear. If a worm is hammering your system, call the offending ISP. If they don't reply call their upstream provider. If they don't reply call your ISP and tell them to block it before it gets to you. If they don't reply - tough shit, get a new ISP. It's the same thing as the spam blacklists - ISPs will never learn to provide better service if people don't start voting with their wallets.
  • I've done it before. (Score:3, Informative)

    by GoNINzo ( 32266 ) <GoNINzo.yahoo@com> on Wednesday January 15, 2003 @10:19AM (#5087251) Journal
    I had a botnet using my irc server as their jumping off point. I wasn't too happy with it cause I saw an attack happen. So I went through and removed them all. I wrote up the story here [granzeau.com] if anyone wants to know how to take down a subseven network.
  • by Branc0 ( 580914 ) on Wednesday January 15, 2003 @10:19AM (#5087254) Homepage Journal
    Having runned a small defacement archive [syners.org] for the past year, one thing I learned is that people don't like you mess with their computers. In fact they don't even want to know that you know they have a problem. I once found a portuguese .gov site that was defaced for over a month in a sub-directory, even if i warned them just few days after it happened.

    I also find out that what people think is "if you know someone hacked into my server, then it must have been you that hacked my server". And this brings up the next point, if you start hacking people's computers to stop the worms, they are going to think that it was you who unleashed the worm, it is logical, they just don't know better.

    What must happen is not System Administrators "hacking" every computer in the internet infected by code red or nimbda. What must happen is legislation that makes every person running a computer personably responsible for the security of that same computer. If people don't secure their server they must be penalized, instead of letting us fix the problem... even if they want us to.

  • by telstar ( 236404 ) on Wednesday January 15, 2003 @10:20AM (#5087257)
    This guy wants to give the power to kill remote processes to everybody. Everybody includes the people that he's saying can't secure their systems to begin with. Do you want them touching your box? Didn't think so.
  • by funkman ( 13736 ) on Wednesday January 15, 2003 @10:22AM (#5087268)
    How do you get counter attack software and whose to say that software is safe?

    What if the counterattack software has its own buffer overflow? Then we get a cat and mouse game of one machine simulating an attack and when the counter attack is made the attacker could send a response to force a buffer overflow making the counter attack ... the attack itself.
  • Whose rights?? (Score:5, Insightful)

    by Ratface ( 21117 ) on Wednesday January 15, 2003 @10:30AM (#5087300) Homepage Journal
    If parents don't vaccinate their children, the state takes them out of school. If a dog consistently attacks people, the authorities put it down. If someone commits three felonies, they are put away for life. This is because the rights of the many outweigh the rights of the one.

    In your country perhaps, but where I live not all of those suppositions are true. And here one sees an inherent problem that such a system would create - you may be operating within the legal framework of (for instance) the US, but does that give you the rights to close down a process on a machine in Iraq, or North Korea, or any other country for that mattter?
  • Flawed logic (Score:5, Insightful)

    by StormReaver ( 59959 ) on Wednesday January 15, 2003 @10:31AM (#5087304)
    "Logic dictates that anyone who opposes a bill allowing corporate entities to attack our systems should support a technique to stop worm-ridden systems from doing the same."

    This is flawed logic. The correct logic flows like so: Anyone who opposes a bill allowing corporate entities to attack our systems should oppose any technique that allows any other organization or individual to do the same.

    Mr. Mullen's proposal is almost identical to the proposal made by the RIAA: let someone legally crack into a computer that is being used to do inconvenient things.

    While I sympathize with Mr. Mullen's intent, this approach was wrong when suggested by the RIAA and it is wrong when suggested by Mr. Mullen.

    Unfortunately, the best approach I can suggest that both contains the problem (eventually) and protects everyone's privacy to the largest possible extent is to isolate the offending computer from the rest of the Internet (possibly shutting down the user's outgoing Internet feed) until that user fixes the problematic system.

    Of course, the details are the killer. How is something like this accomplished quickly enough to minimize the damage done to systems receiving the barrage of data? And does a Slashdotting result in Slashdot's Internet feed being cut?

    This type of problem definitely needs a solution, but vigilante attacks are not the solution.

  • Mullen has been stoned since day one. This wacked out idea is just another bit of proof of that.
  • The real problem. (Score:3, Insightful)

    by jellomizer ( 103300 ) on Wednesday January 15, 2003 @10:31AM (#5087310)
    Becideds the blaten privicy issues etc. Lets assume computer A is attacking computer B with Worm1 which uses uses application X as its transport. The person who sees the worm attack his system he imeadeatly thinks it is work2 which uses application Y as its transport. So he gaines access of computer A and kills application Y. So he hasent killed the worm and he also killed an inocent application that may have been dooing something very important.
    It is stupid to think a random person will be able to properly fix your system. Even if he is "Skilled" enough to break in he may not undertand what the system is for or what it is used for. Just because he thinks he is smart it dosent nessarly mean he is.
  • I've often longed for a good "passive strikeback" tool. Every time I look at the tons of IIS-worm-crud in my Apache logs, or see spammers scanning for open proxies/relays, I yearn for such a tool.

    By "passive strikeback", I mean a tool that does nothing more than respond to an active attacker in such a way that it turns the tables. I assume that most worms and spammer-tools are as poorly written as the buffer overruns and other assorted security holes they exploit. That being so, I would love some respectable white-hats to write open source tools which target weaknesses in the offending malware, so that when said malware comes a-knocking at my server, I might gently rip out its intestines and strangle it with its own entrails.

    I'll settle for strikeback tools that do nothing more than neutralise the malware, although I'd be sorely tempted to do more in the case of spammer tools. Sending the malware into a flat spin, hang, or deadlock may be preferable to simple termination in many cases.

  • "Since the owner of a system has no responsibility for the actions of a worm, or any malicious process, that runs without their knowledge, I submit that they also have no rights to the process. No responsibility means no rights."

    • How does he make the leap from the system owner having no rights, to somebody ELSE having rights to that process. He's claiming that HE should have rights, yet by his logic ... the only person that really should have a right to kill the process is the person that is responsible for its existence or the person that initiated the worm. That means that the only person that should have that right is either the worm writer, or the person that launched the process. In many cases, this actually IS the user, since they executed a piece of malicious code on their system.

    "If parents don't vaccinate their children, the state takes them out of school. If a dog consistently attacks people, the authorities put it down. If someone commits three felonies, they are put away for life. This is because the rights of the many outweigh the rights of the one."
    • He fails to mention what the punishment is for electronic system intrusion. Whether his motives are nobile or not, laws regarding kids and dogs have absolutely no bearing on laws addressing electronic worms.
  • The same holier-than-thou attitude that exists in Police and Intelligence services towards the public exists in the so-called security professional community.

    Let's say my next-door neighbor and I live in a old neighborhood with big trees. If my neighbors tree has a disease that is affecting my tree, I do not have the right to trespass on my neighbors property and chop down or treat his tree.

    The interests of security do not give someone the right to trespass on my property without due process. If Mr. Mullen wants to get some sort of court order, fine, but he does not have the right to screw with other people's computers for some perceived security problem.

    If Tim Mullen can be identified hacking into any computer I am responsible for, he will be arrested and sued for computer crimes. Whether he is wearing a "white" hat or a "black" hat is irrelevant.
  • Gray Areas (Score:2, Interesting)

    by JSkills ( 69686 )
    Is the use of "strikeback" ever warranted - this is a difficult topic to render a definitive decision on.

    Having been the victim of the effects of Code Red (our Linux boxes we not affected, but the hosting facility we were in was overwhelmed with traffic from all of it's unpatched IIS servers), I can certainly see the reason as to why this software was developed. Our site was inaccessible for close to half a day, because of other people's inability to keep security at the forefront of their minds. We were powerless to do anthing but wait for our hosting providers to track down all of the offending servers at our location and fix them.

    I remember being so angry at the time and I would have welcomed the scenario where a "strikeback" type of application would have put a stop to this problem in an automated fashion. I'm sure part of the creator's reasoning is that if people's systems are left vulnerable to various worms, then there should be no problem allowing his software to "fix" the problem. Perhaps an applicable anaolgy would be a fire spreading from house to house on your block and "strikeback" acting as the firemen putting a stop to it. Firemen often make a huge mess of buildings when putting out fires (cutting through walls and roofs, dousing everything with water, etc), but the ends justify the means.

    On the other hand, the "strikeback" process could almost be considered like a vigilante mob, having the best of intentions, but essentially operating outside the bounds of the law. Secretly, we might root for them, but in essence we really need the police to do the job, thereby obviating the need for the vigilante mob.

    In regards to the world of crimes committed against servers, I just don't who the actual police are. So many of these attacks happen without anyone being punished. The FBI has a policy of not even spending any time investigating any computer crimes where the damages cannot be proven to exceed US $20,000. That leaves a great deal of smaller businesses / websites essentially unprotected by anything except for their own ability to manage their security efficently.

    Strikeback is just a reaction to the frustration of having to deal with all of these continuously spawning worms / attacks without anything being done to counteract them other that react after the carnage is already done. I'm not saying it's the right solution, but I certain can see why it is here ...

  • by juuri ( 7678 ) on Wednesday January 15, 2003 @10:46AM (#5087397) Homepage
    This is just a guy out looking for kicks and fun. If someone is "probing/attacking" your network thanks to a worm and you can't contact them, the solution is simple:

    You simply block off their traffic.

    Close your blinds, your door, or whatever real world analogy you would like to try and apply. You have the right to send the same traffic back to them, monkeyseemonkeydo, but in no way is it possible to justify altering the running of their machine. Doing so, is no better than the malicious process already causing the damage.
  • Happened to me (Score:3, Interesting)

    by octalgirl ( 580949 ) on Wednesday January 15, 2003 @11:06AM (#5087539) Journal
    I can't remember the name of the company, but last year I had just installed IIS, then ran to the store. By the time I got back, around 45min later, I had already been hit by CodeRed. There was a message on my screen saying 'You have been infected by CodeRed. We did not infect you. Your server is trying to infect us. Please look on your hard drive to prove how open your system is. You can click here for more help. Again, we did not infect you.' (something like that anyway.) They left a small folder in my WINNT/system folder that had a link to them. Once I clicked their link they had other links on how to remove it, you could download the script they wrote so you to could load it and detect other people infecting you. And they had stats on how many servers had tried to infect them already (around 2000), and they explained more how they were only trying inform those that were attempting to infect them to be more aware about codered. I have the link and script at home, not with me here. Sorry.
  • Analogy (Score:3, Insightful)

    by nmg196 ( 184961 ) on Wednesday January 15, 2003 @11:20AM (#5087651)
    Here's an analogy:

    A guy in the apartment above you has left his door unlocked and then gone away. A malicous child walks in and turns the tap on for a laugh and then leaves. A while later the apartment is flooded and water is pouring though the ceiling into your property. Do you have the right to walk in though his unlocked door and turn off the tap?

    I know what I'd do. It might not be legal, but I don't think anyone would stop me or arrest me and I don't think the owner would mind that much either.

    Nick...
  • by Digital_Quartz ( 75366 ) on Wednesday January 15, 2003 @11:43AM (#5087848) Homepage
    The idea of writing "strikeback" scripts, as you describe, has been tossed around before. I recall reading a quick-and-dirty script for Apache posted on slashdot some time ago that would detect attacks from machines infected with Code Red, and would then exploit the security holes Code Red had opened on those machines to clean them. I used to support this idea, but I'm afraid after some thought, I've changed my mind.

    I'd agree that if a worm is running on someone's machine without their knowledge, then the owner of that machine has no rights to that process (the obvious exception being the person who is spreading the worm, who runs it intentionally on his or her own machine, but we'll ignore him or her for now). In order for you to terminate that process, however, you have to break into their machine, and run your own process. You are, in effect, creating your own worm. Your worm may only run for a short while, and may be "for the greater good", but that doesn't change the fact that you are running code on other poeple's machines without their consent.

    Even if we opt to ignore the ethics and look at this from a more practical angle, can you guarantee that your strikeback process is not going to adversely affect the machines it cleanses? What if your strikeback process causes a machine gathering scientific data to reboot, or kills the wrong task? This has the potential to set someone back by several days in their work. What if it reboots a machine monitoring medical equipment? You could end up killing more than just a process, if you catch my meaning, however unlikely that may be.

    Since you are intentionally running a process on someone else's machine, you are accountable for it's results. If you cause damage to a machine, or cause data to be lost, even if it is inadvertant, you open yourself up to litigation from the owners of those machines.
  • by Rand Race ( 110288 ) on Wednesday January 15, 2003 @11:51AM (#5087961) Homepage
    I believe you should have the right to neutralize a worm process running on someone else's infected system, if it's relentlessly attacking your network. I've even written code to demonstrate the process.


    Code that will neutralize South Korea!?

  • by djembe2k ( 604598 ) on Wednesday January 15, 2003 @12:00PM (#5088066)
    All this talk about rights and self-defense and vigilantes and vaccinations and putting down dogs is taking this conversation wildly off course. Computers are property, and this is about property rights.

    Computers don't have rights or responsibilities. Processes don't have rights or responsibilities. If computer A attacks computer B (via a worm or whatever else.) and computer B "strikes back", self-defense is a fair metaphor, but it isn't a relevant legal or ethical argument, because the computer don't have rights.

    Computers are property. More specifically, my computer is my property. I have a right to keep my property, and you have a responsibility to keep your hands off my property, and if you don't keep your end of that agreement, you've broken the law and I can bring the government into it.

    Yes, your property rights are violated if my computer has a worm that attacks yours. Maybe the government will acknowledge that and step in, and maybe it won't. If you don't like the way the government handles this, elect somebody who will change it, write a letter to your legislators. But the government's refusal to step in doesn't mean, as Mullen asserts, that the owner of the attacking computer has no responsibility. It just means that the government has opted not to hold him responsible. The only way to fix that is democratically.

    But suppose Mullen is right about that, and this person has no responsibility. He says "no responsibility means no rights". Wrong. The constitution says that no person shall be deprived of life, liberty or property without due process of law. In practice, that limits the action of government, not offended sysadmins. But the principle here is that my rights are my rights, and nothing I do, however, bad, foreits them automatically. Maybe, after a fair legal process, society (i.e. government) may decide to take away some of my rights (i.e. lock me up, fine me, whatever). But not before. That's a fundamental part of the social contract which makes us civilized.

    Then Mullen makes a different argument: the rights of the many outweight the rights of the few. (Thank you, Spock.) Maybe. But the same principle applies. My rights are my rights. Maybe you can get a court order to require me to donate blood, if it will save 100 lives. But if you take my blood without getting the court order, you have still violated my rights and broken the law.

    Now, if the guy who took my blood is a real hero, and believes what he did was right and necessary, then he'll say that going to jail is a small price to pay for saving 100 lives. Good for him. If Mullen really believes this is a case where the law runs contrary to ethics and morality, he can wear a grey hat and illegally hack systems for the greater good. But unless he's willing to wear a black hat, he'd better admit what he's doing it illegal, and a violation of rights, and be prepared to take the punishment when he does it.

    IANAL, yadda.

  • by The Evil Couch ( 621105 ) on Wednesday January 15, 2003 @12:05PM (#5088122) Homepage
    his idea is a hell of a lot more invasive and more "wrong" than simply noting an attack, blacklisting the source and sending the ISP an email notifying them of the situation.

    I realize that it's frustrating as a sysadmin to see attacks from the same place, by the same virus/worm all the time, but the answer isn't a counter strike. it's to simply contain the virus and let the people that are infected unfuck themselves and learn from their mistakes.

    besides, even if it weren't morally and ethically wrong, just who would control such a program? would sysadmins have to be federally or state liscensed, much like concealed weapons holders? who would be there to ensure that the vigilante sysadmins weren't abusing their abilities and crushing boxes left and right, then claiming that they were being attacked.

    no, a knee jerk reaction of "wtf! this mother fucker's infected and trying spread it on to me! fuck him! I'll fuck his box up for that shit! stupid dumbass n00b!" isn't going to advance the Internet community, sysadmins or users anywhere. just stick to blacklisting IPs and domains. it works.
  • by Perianwyr Stormcrow ( 157913 ) on Wednesday January 15, 2003 @01:23PM (#5088651) Homepage
    This policy would be irresponsible to both the owner of the system and the vigilante cracker.

    System owners get in trouble because suddenly someone has another reason to mess with their machine. It's not clear-cut for even an expert- You might say that it's criminal negligence to leave a system unsecured. Actually, no. We don't have the legal definition for these things yet. Furthermore, there's already an incentive for system owners to secure their own machines- the integrity of their own services and data.

    Vigilantes are also on thin ice because it's easy to do more than you intended when "defending the law", and even the cops are in danger when they fuck up. What will you do when you accidentally cause collateral damage in the commission of your act of citizen policing? What if you just have the totally wrong machine? You don't have the authority of a uniform and a department to back you up.

    All in all, this is a thoughtless proposal that should never be accepted by any legal authority worthy of the name.
  • by Jester99 ( 23135 ) on Wednesday January 15, 2003 @04:01PM (#5089610) Homepage
    with Mr. Mullen's proposal, is this.

    He sees the world this way: 1. People are negligent, and allow machines to become compromised, which allows harm to come your way. 2. Therefore, if people will not defend their own machines, you should be able to defend yours by disabling theirs.

    This is a little like the following: 1. People are negligent, and allow their cars to get stolen, which allows hit-and-run drivers to take you out with them. 2. Therefore, if people will not defend their own cars, you should be able to defend yours by being given a rocket launcher to disable theirs.

    The second example sounds kinda weird, doesn't it?

    I've watched "World's Scariest Police Chases" and suchwhat. If a driver's acting like a maniac, the police bust out these cars with large ramming devices on them, and beat the crap out of the offending vehicle. If someone is driving recklessly on the highway, I can't just take my SUV and ram them off the road myself.

    While I may have justification for doing so -- after all, that driver is endangering me and those around me -- I do not have authority. There is a reason that only police are given the power of arrest and other various things they have. (Just try walking around with a pistol in broad daylight in Philadelphia, for example.)

    Mullen would have us all issued shotguns, to defend ourselves from any would-be vandals and thieves who enter our homes. While it is justifiable for us to use these weapons against those who would cause us harm, is it really wise to give everyone a shotgun? There are most certainly those who would use them improperly. The obvious solution, of course, is to give everyone some sort of shield, that prevents them from being hit by a shotgun shell, to protect us from bad users of shotguns. But, uhm, then shotguns don't work against the vandals, because they have shields too. So a perpetual arms race against ourselves would develop.

    There's a reason weapons aren't issued to us for our own defense -- collectively, we are not responsible enough to operate that way. Only special agencies are given the Authority to administer Justice; justice itself does not belong to the rest of us. Unfortunately, we don't have an "internet police force", nor would one even be desirable.

    But ISPs can still pull the plug on users who aren't operating "correctly," and University and other networks can block down a MAC address if it's causing trouble. And that's about as close as we really should want.
  • by TekPolitik ( 147802 ) on Thursday January 16, 2003 @02:32AM (#5092618) Journal

    I believe you should have the right to neutralize a worm process running on someone else's infected system, if it's relentlessly attacking your network.

    Technically speaking, you do. No, I'm not kidding. It's called the right of "abatement", and it's a right dating back a millenium or so. It's even a defence to criminal charges that you were exercising your right of abatement in a manner that was reasonable in the circumstances.

    The problem with this is that they might still charge you.

    Now if you're willing to take the risk, the right of abatement is a right to take steps to prevent a trespass or nuisance affecting your property or your enjoyment of your property, even if this requires violating the property rights of somebody else from whose property the trespass or nuisance originates. For example, if somebody sits outside your house at midnight, playing a ghetto blaster at maximum volume, and refuses your request to stop, you can slap them around until they stop, or smash the ghetto blaster. Legally, you will be exercising your right to abate a nuisance.

    Yes, theoretically this could be applied against spammers and open relays too.

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...