Hi,

[apologies for this being so far off-topic]

On Thu, 25 Sep 2003, Peter P. Benac wrote:

> And this lack of response is due to what???

Lazy, stupid, apathetic, incompetent, or ambivalent members of the law
enforcement and ISP community? Insufficient network diagnostic and
security tools, making effective response difficult, assuming the best of
intentions on the part of the ISPs and law enforcement?

> When I worked for Cisco one of Cisco's customers detected a potential hacker
> to his system.  That customer called the TAC and with-in minutes the FBI was
> notified and that hacker was dealt with.  This customer was a small mom and
> pop business in the middle of Arizona.

This does not seem to be the typical response to abuse and security
issues, not from the posts I've read on SPAM-L, spamtools, and the like.

Unless you have connections, you're not going to get a direct line to a
provider's NOC no matter how badly your system is being attacked.

Regardless, dealing with thousands of compromised hosts is much, much more
difficult than handling a single intruder. Nobody was trying to break into
monkeys.com; they were trying to bury it under forged traffic.
Unfortunately, they succeeded.

> Interesting thing about DoS attacks is the attackers get away with it
> because the people they attack do exactly what these two Black Listers did.
> They rolled over and shut down.

Please don't blame the victim. This is not the first DDoS that Ron has
ridden out; the scale of the recent attacks on Osirusoft and monkeys.com
were massive and sustained. FWIW, sorbs is under attack; I don't expect
they'll survive much longer.

The attackers get away with it because law enforcement won't act unless
there's over $10-50,000 in damages or some political capital to be made,
you can't get an ISP's attention without renting a backhoe and digging up
their OC-48s, and (less sarcastically) when 10-50,000 compromised hosts
are involved in the attack, each contributing 0.01% or less to the attack,
identifying and stopping it is difficult.

I don't know how much background information you have about RFG and
monkeys.com; Ron was operating an open-proxy honeynet, pulling in great
volumes of hard data on the source and magnitude of proxy server abuse.
He not only published this information on a regular basis but called the
security departments of each ISP involved. Sometimes he got a spammer shut
down;  more often than not he got a shrug or a "oh, we got rid of them"
while the abuse continued. Apparently he was effective at getting
spammers shut down because they DDoS'd him off the net.

I can't imagine Ron just sitting in his basement moping that he was being
attacked. One of two things happened: either Ron couldn't get the time of
day from anyone with enough clue and authority to stop the attacks or the
attacks were large enough to overwhelm whatever response the ISPs could
muster to stop them. That should give you pause because it has serious
national security implications, no matter what nation you're in.

Of course, it's well known that ISPs have signed 'pink contracts' with
spammers (Topica is still on the net, for example; Ralsky, Scelson, Marin,
and Bevelander keep getting connectivity somehow) and providers collect
charges on all that bandwidth, abusive or no. Not to suggest that ISPs are
in on the attacks, just pointing out other factors besides overwork,
spite, incompetence, and technical difficulty that could explain why ISPs
might not respond to security incidents in a prompt and effective manner.
One doesn't run a DNSBL without making enemies, especially at ISPs
knowingly taking spammer money and getting called out for it.

> In doing so they black list the whole world.

Huh? monkeys.com just pulled the plug; they didn't blacklist the world.
And even if they had done so, nobody would have known since the attacks
prevented legitimate queries from getting through.

[aside on bounce spam, viruses, virus notifications and other
non-traditional forms of spam (UBE) deleted]

Spam has nothing to do with junk in your individual mailbox; it has
everything to do with interfering with legitimate mail service on a global
scale. Spam has nothing to do with content; it's all about behavior. Maybe
this week will drive home the point that spam is a serious security issue,
a denial of service attack (often but not always low intensity as
dictionary attacks show) against mail systems, increasing to DDoS attacks
against effective anti-spam resources.

SA keeps mailboxes mostly useful but does absolutely nothing to stop
networks from being choked with "noise" email. Even if you reject mail at
the SMTP level, you still have to accept the DATA phase of the message to
run header and body analysis with SA. You've accepted the traffic and
hence have lost; as mail operator, you've paid to receive the mail
regardless if it gets delivered or routed to /dev/null. I think that SA is
a great program, the most effective means of preserving the usability of
one's personal inbox. But make no mistake, it does almost nothing to stop
spam.

> We should encourage these blacklisters to report these DoS attacks and even
> if possible assist them in identifying the attacker.

And if we report attacks to ISPs and law enforcement who in turn can't or
won't lift a finger to help us, then what?

> If we don't, we are going to find them going away one by one. Then what
> is next - the spammers attacking anyone using SPAM blocking software.

Believe it. There's a war on.

-- Bob


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to