Home page logo

nanog logo nanog mailing list archives

M$SQL cleanup incentives
From: William Allen Simpson <wsimpson () greendragon com>
Date: Thu, 20 Feb 2003 12:51:52 -0500

M$SQL is different from other infections mentioned, as it hits the 
entire net so quickly.  The only thing keeping it in bay is widespread 
backbone filtering, which isn't feasible in the long term.

Just like random source addresses, the only answer is edge filtering 
(preventing the bad packets from reaching the backbones).  

Worse, it only takes 1 infected host to re-infect the entire net in 
about 10 minutes.  So, the entire 'net has to cooperate, or we'll see 
continual re-infection.

Unfortunately, this is a cost that prevents pain to others, rather 
than self-inflicted pain.  Another pollution of the commons issue.

Johannes Ullrich wrote:
We are doing that with the reports we get for DShield. However, in particular
with consumer ISPs, there does not seem to be too much effort to notify
infected customers.

That is the problem!  There are only 2 incentives that I'm aware of:
 1) blocking routing to that AS (fast).
 2) sue the AS as a nuisance (slow).

It has been 3 weeks.  Those that haven't implemented edge filtering are 
bad actors, and need an incentive to clean up their act.

On the other hand, how hard is it for an ISP to monitor port 1434 and call
up a customer whenever there is a 'flareup'? I think this would be the easiest
way to get rid of this problem. I see that port 80 / code red is harder as
it essentially requires content inspection. But Sapphire should be rather
easy to detect by watching outbound traffic.

I agree!
William Allen Simpson
    Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]