Microsoft Worms and Global Routing Instability 215
James Cowie writes: "Fresh analysis here indicates that worm propagation periods correlate very strongly with global BGP routing instability, as measured by sustained exponential increases in the number of prefix announcements and withdrawals seen in BGP message traces."
Story misleading? (Score:3, Informative)
Re:Story misleading? (Score:3, Informative)
Re:Story misleading? (Score:2)
Re:Story misleading? (Score:4, Insightful)
If you're trying to suggest that the story submission is unfair in alleging that Microsoft worms are causing this instability... well, that's exactly what the paper is saying, eh?
Re:Story misleading? (Score:2, Informative)
However, further down in the article they mention that people might need to give BGP packets some preference so that they don't get dropped when something like a microsoft virus sweeps through your routers, causing BGP reconnects (and thus BGP instability)
Leto
Re:Story misleading? (Score:1)
Re:Story not misleading (Score:2)
Well, that's an oversimplified and slightly misleading characterization. But I don't remember the exact formula for correlation at the moment.
It's essentially a normalized measure of the product of the deviations from their individual means of measurements of two variables (typically the amount of two phenomena). Positive correlation implies that when one goes up the other also tends to be up (either more likely to be up or occasionally way up), negative means that one up implies the other tends down.
Also... and *not* off topic. (Score:5, Offtopic)
The most obvious conclusion to be drawn (Score:2, Funny)
Global Routing is dying.
Microsoft x Worms (Score:2, Funny)
Is the Worms cause or effect?
Is IIS the cause or effect?
If we shutdown one of them, net becomes stable?
Is it easier shutdown worms than IIS?
hmmm... it's a hard decision. Has anyone scanned Internet for viruses?
:-)
"Nobody is real - Powerman 5000"
Re:Microsoft x Worms (Score:1)
I forgot say :
Microsoft IIS {=== net instability ====} Worms
Re:Microsoft x Worms (Score:3, Funny)
If IIS gets r00ted in a forest where no one's around, can you still hear the nimda flood it unleashes?
Good report, but what's the point? (Score:3, Interesting)
I've personally had a particularly poor router lossing my packets for the last week, and have been trace routing it from all over the country to triangulate the problem. Doing a tracert from Maine, California and Texas seems to provide a reasonable picture of what's going on with a specific router by triangulating in on the offending router... so I'm a bit unclear on why this study was called for, unless it's just to point fingers at microsoft...
Re:Good report, but what's the point? (Score:4, Insightful)
It's an analytical tool called a scientific proof. Believe it or not, anecdotal evidence (like you suggested) is not enough to prove your intuition that IIS worms influence global routing stability. You need scientific evidence to prove a hyptothesis such as this.
- j
Re:Good report, but what's the point? (Score:2, Interesting)
To me, the point of research like this is to point fingers at Microsoft. Microsoft can claim not to have a problem with security all they want. But if it is shown that security vulnerabilities in their system are causing instability in global internet routing, that could provide a way to show liability. Because dammit no software company should be doing anything that could degrade global internet routing.
Currently it's hard to argue in court that a reasonable programmer might not leave some of those vulnerabilities. But if those vulnerabilities were responsible for crippling the net? I think any court would hold that any reasonable programmer would make sure their program can't cripple the internet. Meaning the billions in dollars it costs everyone attached to the net when these viruses spread, not just MS users, could be recovered from MS and give them a real impetus to build security into their systems, which is currently missing. Many of you hold spammers to be responsible when they use your network resources without your permission. Microsoft is doing the same thing by leaving these holes. Why haven't the limited patches they have been pushed by critical update? Why has Microsoft come out in the press to say that millions are unnecessarily downloading these patches in an apparent attempt to dissuade people from downloading the patches? In the same week that critical update kept insisting I download patches for Win2k that are only relevant to servers when I only use my box as a workstation?
Re:Good report, but what's the point? (Score:4, Insightful)
The point, is clearly stated in the article: Contrary to conventional wisdom, what were thought to be purely traffic-based denials of service in fact are seen to generate widespread end-to-end routing instability originating at the Internet's edge.
Maybe the "highway" analogy works here. Everybody knows that the Internet goes all flaky during worm propagation, but it's been assumed that this is simply due to too much traffic. This report is saying that it's more fundamental than that: during worm propagation, for as yet unknown reasons, many of the direction signs disappear at the intersections! Not only are the roads full, but many of the cars can't find where they're meant to be going...
Msft is definitely guilty (Score:5, Funny)
Re:Msft is definitely guilty (Score:5, Interesting)
But seriously, if a company makes a product that costs large numbers of other companies money they get fined. If a company's negligence causes a public resource to be degraded they get sued. Has anyone heard anything about some of the major service providers or any of the major uses launching a class action against MSFT ? It seems that they would have at least a start for a case here.
Yeah Well, Except... (Score:4, Insightful)
so why weren't they in criticalupdate? (Score:2)
Explain please how that makes sense?
Re:so why weren't they in criticalupdate? (Score:3, Informative)
If you're a server admin and you get your security updates from criticalupdate, your intranet is in big trouble.
We're NOT talking about server admins (Score:5, Insightful)
The majority of the IP addresses spreading these viruses show the default homepage if you go to them. Because the home or casual business users running these boxes DON'T KNOW what IIS is, or that they have it enabled, they DON'T KNOW that they're vulnerable or infected. These are the people that criticalupdate would reach. These are the people that need the patches. By NOT pushing this patch, MS is leaving the situation as it is, and it will never get better. To repeat - security conscious server admins are having their network hammered by this virus not because other server admins are lazy - but because many non server admins have operating systems with IIS enabled by default, and MS is making no attempt at all to reach those people despite the fact that the situation has not improved.
Uh....no? (Score:2)
Can you provide some sources?
I don't use IIS, so I can whine, can't I? (Score:2)
On the last few months I got more requests from IIS worms than requests for my home page during the past year.
"Oh, I'm sorry, all TV sets we've produced were found to generate RF interference and degrade the signal on all the TV network. We made a circuit patch available on all our distributors. If you bought one of our TVs, please come get one and install it yourself. Now you are the one to blame."
yk
216.35.116.87 - - [22/Sep/2000:07:04:47 -0300] "GET
yk
216.201.108.18 - - [28/Sep/2001:12:19:38 -0300] "HEAD / HTTP/1.1"
yk
13395
yk
4167
yk
3281
yk
11765
(obs: no, I don't have a
Re:Yeah Well, Except... (Score:5, Interesting)
We've got tens of thousands of PCs running hundreds of applications - some internally developed, some externally developed.
For MS security patches (or anything else) that we release into "production" we need to engineer the build to make sure it works with our OS build, then test against Tier 1 applications.
Once that is complete, the development groups need to sign off saying that their application runs with that code.
Specifically in terms of IE 5.5 SP2, Quicktime is no longer compatible. Sure, there's an update to Quicktime, but my point is this - how many other things stop working? Which of our internal apps are dependent on IE or subcomponents that no longer work with IE5.5 SP2?
We don't know. Frankly, even if we thought that we knew, we couldn't be sure outside of testing.
IE has seen 7 security patches in the last 8 months. Particularly in this economy, we can't afford the testing staff to nail each of these as they are released.
Of course we're at risk. Now is the time to question our continued use of MS products. I'm doing that.
Regards,
Anomaly
Bah... what's so special? (Score:2, Insightful)
Artificial life (Score:1)
Who said AI is not for tomorrow? The beast is already among u
Caching and port-scanning (Score:3, Informative)
Consequently, since routes time out after a while (and get cached), the IP adress sweeping increases the necessity to figure out more seperate routes than usually (or FIFO caches are too small so routes get purged from the cache faster?).
This would logically increase the load on route discovery protocols such as BGP. A whole new class of DoS attacks...
Re:Caching and port-scanning (Score:5, Interesting)
as an aside, i don't mean the above preamble as a negative statement about the specific poster i'm responding to.
"Consequently, since routes time out after a while
...This would logically increase the load on route discovery protocols such as BGP."
well...not exactly. when 2 routers are set up in BGP partnership they exchange an initial set of rotes which are statically set by the AS administrator, there's no dynamic discovery process. those routes are only changed under a few specific conditions : explicit changes announced by the BGP partner, or the loss of connectivity to the partner (too many missed hello packets). BGP route exchange is not based on some kind of dynamic route timeout/refresh algorithm as that would be horrifyingly inefficient.
a few words on how routing and route caching work (this is assumed to be on an defaultless internet backbone router) :
a packet enters the router destined for some ip address, a lookup against the routing table is done, the appropriate outbound interface is selected (this set is known as path determination), the packet is then sent to the appropriate outbound interface, re-framed, and sent out to the next hop (this step is known as switching); route caching associates a destination ip address with an next hop interface, thus bypassing the redundant route table lookup. a definate gain in efficiancy, cisco makes a number of advanced caching/switching engines that are used in thier high end core routers.
to summarize/explain the BGP/worm paper : worms generate excessive traffic; the traffic overwhelms some routers and wan links; thus, BGP hello packets get lost or never sent depending upon traffic or router load; consequently the BGP routes are being announced/withdrawn at a high rate (this is known as route flapping). this is bad, having a route fail is not a problem, as long as it stays failed. rapidly changing states creates extra load on the router. route dampaning policies help, but with a worm creating these conditions everywhere at once the cumulative effect is instability.
check these sites out to learn networking :
http://www.cisco.com/univercd/cc/td/doc/cisintw
http://www.merit.edu/mail.archives/nanog/
anyone who writes a wise ass follow up to this had better include a CCIE number.
Re:Caching and port-scanning (Score:2)
#7066
Re:Caching and port-scanning (Score:2)
These same high-end routers often have traffic shaping/prioritization features. You'd think that they could be configured so that the routing-protocol packets have a very high priority so that they're among the last to be dropped even at high load. If not, someone screwed up.
Re:Caching and port-scanning (Score:3, Informative)
> These same high-end routers often have traffic
> shaping/prioritization features. You'd think >that they could be configured so that the
>routing-protocol packets have a very high
>priority so that they're among the last to be
>dropped even at high load.
Not necessarily. In a lot of cases, mostly with multiple exit routers, it's more desireable for a hosed router to withdraw it's own route, presumably because you have another un-hosed router which can pick up the slack. In most cases, withdrawing a route is a lot better than advertising a route that doesn't work.
Re:Caching and port-scanning (Score:3, Informative)
I think you missed the point of what I was saying. The problem that the original article talked about was BGP traffic getting dropped due to load. If that's happening, you can't add routes, you can't modify routes, you can't withdraw routes. What I was talking about was using existing facilities that allow you to prioritize traffic by type to ensure that the BGP packets get through even if nothing else does. Once you've done that, you can manipulate routes however you want to adapt to conditions.
What's happening now is like allowing emergency vehicles to get stranded in traffic because they don't have lights and sirens. I say give them lights and sirens, let them zip past the regular traffic so they can do something about the conditions that led to the traffic jam.
Re:Caching and port-scanning (Score:2)
Ciscos have the ability to traffic shape, but that does exactly that, traffic shaping. Most of the problems that i'm seeing because of codered/nimda/etc, isn't traffic saturation, but cpu overloads due to excessive arp requests. So what we're probably actaully looking for is some sort of cpu prioritization by process instead of necessarily traffic shaping based on routing/routed protocol.
Re:Caching and port-scanning (Score:2)
Er, um, NO.
BGP is designed for multi-pathed networks -- You have to have at least two paths into your network to be allowed to use bgp. This also means (usually) that you have at least two routers.
If your router is so saturated that it's dropping BGP packets, this means that it's also dropping other packets. This is considered bad. Under normal circumstances, 'flapping' your route for a short period (the document indicates that BGP has a 30 second minumum) will cause some of those packets to take the 'back' route, and will (hopefully) cause enough of a strain relief on the overloaded router for it to catch up to the (normally transient) overload.
The result of these worm attacks is that this presumption doesn't hold too well. everyody, everywhere (more or less) is experiencing overload. Quite often the traffic is internally generated, so it's quite possible that many/all of your bgp routers/routs are at or near overload. Under these conditions, flapping one router may cause your back path to overload and, in turn flap too.
Giving a higher than normal priority to BGP packets might increase the survivability of the network under a virulent worm attack, but it would also break the inherent load-limiting effect of flapping, and generally break the network worse under normal ovarload conditions. Given how uncommon these worm attacks have been (so far), It's probably better to keep the flap effect in place.
______
The article doesn't describe the flapping effect as bad. It simply uses logs of this well known and (I believe) normally benefecial effect as a way of measuring what's going on, and determining why it's happening.
As was said in the article. Some people originally thought that the outages were delayed effects of major (localized) traumas to the net. That this isn't the case, actually indicates that BGP is working pretty well for the normal case.
It would be nice to find a solution that can help the network to survive another worm-initiated overload, but if it's at the cost of more general stability of the network then I doubt that it would be worth it.
Putting enough smarts into the protocol to realize when a flap-dance is taking place because of worm-type general network overloads would add more CPU load to the protocol. This might cause more cpu-overload problems, over time, than it would solve. Another solution might be to have meta-routing machines that watch the logs of BGP packets, and initiate modifications to the BGP protocol parameters to handle the change. I don't know, for sure, how much work that would be, and if it could be done within the current confines of BGP. If it requires modifications to BGP, then it could be a long time in the pipe.
Re:Caching and port-scanning (Score:2)
It's unfortunate that your talent for stating the obvious is not matched by your ability to understand the less obvious.
Flapping is undesirable. Period. Any routing protocol that didn't support load balancing across routes, without explicit route changes to flap back and forth, would be laughed out of the standards bodies. Fortunately, BGP is not in fact so poorly designed as you seem to think.
Now you're just totally talking out your ass. Flapping is not an intentional method of limiting load; it's a pathological behavior that routing protocols including BGP try to avoid. "Normal overload" is of course an oxymoron, and even in more common (but still abnormal) overload conditions there's no reason whatsoever to suppose that the incredibly minimal CPU overhead associated with giving BGP a higher priority would have the effect you suggest.
I just don't know where you get that kind of crap from. That kind of buzzword-laden but unconnected-to-reality BS might have dazzled some fresh-out MBAs back at the height of dot-com mania, but don't expect anyone with even a minimal amount of technical knowledge to be fooled.
P.S. Either your web site is down, or your profile contains a broken link. Nice going either way.
Re:Caching and port-scanning (Score:2)
Re:Caching and port-scanning (Score:2)
Thanks mdouglas.
-Pat, CCNA
Re:Caching and port-scanning (Score:3, Informative)
Assuming that the router has an interface with a larger than
While you suggest that saturated WAN links could be the problem (and it very well could be given enough infected machines and a small enough link), the data i have indicates that most, if not all, of the problems within our organization are because of excessive the excessive arp requests. A router at one of our pops doesn't run bgp and our traffic data shows it had plenty of bandwidth, but it's cpu usage was at 100% for 3 hours during the first nimda attack. We see similar cpu increases on other CPE equipment with no dynamic routing or any significant increase in traffic.
(ccie in progress
Re:Caching and port-scanning (Score:2)
Same here. However, the AC does have a point. Starting your post with "the userbase having no experience with the subject" and ending it with "better include a CCIE number" is going to piss a lot of people off. The people who design Cisco boxes and the protocols they use probably don't have formal CCIE credentials either; should we not listen to them? The CCIE program is actually very good as such things go, but at the end one is merely competent with regard to administering a particular implementation of the technology. Knowing which switches to flip isn't the same as knowing how the technology actually works or how it might be improved.
That said, I think targeting mdouglas was somewhat unfair. Despite his unfortunate choice of opening and closing remarks, his article was quite informative and technically correct. On this very thread there have been others - e.g. darkonc, cotu - more guilty of the crimes laid at mdouglas's doorstep.
Here's a great idea! (word association) (Score:5, Interesting)
In this online note, we summarize our preliminary analysis of the surprisingly strong impact of the Internet propagation of Microsoft worms (such as Code Red and Nimda) on the stability of the global routing system.
Look on AP, Yahoo, MSNBC, CNN, and you always see "the Nimda virus" or "the Code Red virus," but I prefer the way the article said it. So from now on in your conversations with others, refer to each virus in this category as a "Microsoft Virus" and hopefully by word of mouth word association we can sway public opinion away from this crappy MS software.
Re:Here's a great idea! (word association) (Score:4, Insightful)
Re:Here's a great idea! (word association) (Score:1)
How about Microsoft-targeted worm?
Re:Here's a great idea! (word association) (Score:4, Insightful)
I completely disagree.
'Cancer', 'Intellectual property destroyer', 'viral like' these (amongst others) are all terms that Microsoft has associated with the GLP and hence linux when communicating with their customers. And look how effective they've been - they have got loads of press coverage about it. And the terms are misleading, and in the case of 'cancer' just downright offensive.
To describe the Nimda virus or the Code Red virus as Microsoft worms is not misleading at all - it is difficult to argue that they are not Microsoft worms, after all.
I think this is a great idea. May I also suggest 'Outlook viruses' as a term we should use to cover Outlook specific email attachment viruses.
No: Microsoft worms are NOT "web/email viruses"! (Score:3, Interesting)
Whats propaganda here? They are telling the truth. Those viruses only propagate and damage Microsoft systems. They are there because Microsoft systems are so vulnerable. If it weren't for IIS, Windows 2000 etc. those worms wouldn't exist. (And don't "but others would" me - I don't see any reason why Unices, Apache, etc. would be unsafer without Windows.)
Tell the truth. Don't hide behind words. That's a journalist's job, isn't it? And anyway, now with Microsoft distributing reports that claim Apache is also vulnerable, citing relatively harmless directory listing bugs from 1999, why should we not try to educate the public?
Re:No: Microsoft worms are NOT "web/email viruses" (Score:2)
Besides: If someone blows up your house with a bomb, they usually call it a bomb attack, not a house attack.
Distortion ? (Score:4, Insightful)
Calling it a Microsoft worm is really a distortion, and it's the kind of thing that can damage the credibility of the author.
And what is being distorted ? Truth ?
Until worms start to propagate efficiently on other platforms, this problem is strictly limited to Microsoft products and calling it "Microsoft worm" is a reflection of reality.
root cause nothing to do with credibility (Score:5, Insightful)
Nope, sorry a tabbaco virus is a tobbaco virus because it destroys tobbaco crops. These worms are MS worms because they destroy MS boxes which then attempt to destroy everything. It's time the world knew about it.
You won't hear the popular press refering to "another MS worm", however. They would not risk losing their piece of the $1,000,000 advert budget MS has for XP. As you see, "professionals", and those writing formal papers are free to call the thing what it is and should. The popular press will get it sooner or later.
You and I should not censor our own speech for MS and their sloppy wares.
Re:root cause nothing to do with credibility (Score:2)
Logic alert! (Score:2)
So, if there was only one Microsoft Worm you'd be willing to call attention to the fact that it only affects Microsoft boxes, but because there are lots of them we should obscure the fact by calling them by made up names like Alto-Muffy and PeachFuzz-37?
-- MarkusQ
Re:root cause nothing to do with credibility (Score:2)
Not true. It simply happens that those were the two viruses that hit during the period what was being studied. If Code Red 1 had hit in the same period, it's might have had a similar effect). (though slightly less pronounced).
Their classification is worms. Their more specific classification is Microsoft worms. MS worms are going to continue to plague us -- both because MS Windows is so common, and because MS Windows is so much easier to exploit.
Re:Here's a great idea! (word association) (Score:2)
Then why should we hesitate to describe it as a Microsoft Worm. Perhaps one should say Microsoft(tm) Worm rather than Microsoft Worm(tm), as the second form is inaccurate. But Microsoft Worm is an accurate and correct description of the phenomena (given that the term worm is correct).
Re:Here's a great idea! (word association) (Score:2)
VAXen were the norm on the backbone. Suns were just starting to break into the backbone. I still remember some of the the machines on the net, like decvax ucbvax and (the mythical) moscvax (used in an April fools joke -- the fact that people would automatically take moscvax to mean a vax located in Moscow would indicate the state of The Internet back then). These days, the backbone of the internet is a bit more diverse, so it would be a lot harder to describe a worm as an internet worm., unless it was very multi-platform.
Up until the Morris worm, people cared about security, but it was generally believed that you could trust other machines on the net... At that time, to get your site on the net, you had to have someone who was already on the net vouch for you and back you. As such, you could generally trust the administrator of each machine you were talking to.
This was, however, the time of the ascendency of the PC. These machines were owned by the user. Now you not only had to trust the network administrator, you had to trust each and every user with a PC. Even after plugging the holes exploited by the Morris worm, people were starting to deal with the fact that you could no longer presume (or even hope!) that a packet from a low port number could be trusted to come from a secure program. It really was the dawn of a new age in the internet world -- not entirely unlike what seems to be happening in North America in the wake of the WTC attacks.
The morris worm also opened up people's eyes to the problem ofbuffer overflows. This was the first really widespread exploit of buffer overflows. After the worm came out, people started going through code, weeding out potential buffer overflows. It's not that people didn't care about security. There was, instead, a certain presumption of trust that -- these days -- would be considered naive. The Morris (internet) worm woke people up to the naivete of those presumptions.
Re:Here's a great idea! (word association) (Score:2)
Separately, they are the Nimda work and the Code red II. Together, one of the things that they have in common is that they're Microsoft based. Chances are, in the future, that most of the worms that are going to have this sort of effect are going to be Microsoft based.
I can think of two (OK, three) reasons why:
1) There are lots of MS machines out there that are just RIPE for infection.
2) Microsoft has (throught negligence and/or design), set things up such that the default configuration of these machines is to be very insecure.
3)Even if someone were to come up with a worm that could breach each and every Linux box out there, it would not, at this time, have the kind of volume effect on things that these MS worms have had.
They are Microsoft viruses. The description is succinct and accurate. There are also likely to be more of them. It also puts some PR pressure on Micro$oft. The PR department is the one department that seems most in charge of Microsoft. If we're lucky, they will respond to it by starting to pay some real attention to security for their software.
Re:Here's a great idea! (word association) (Score:2)
Worms, by their nature, have a surge propogation distribution. Sometimes, if the propogation is slow, the surge gets eaten by the noise of system trafic. In cases like the two worms caught in this study, the worms propogated fast enough and were active enough that they were able to affect overall internet communication as a side effect.
Re:Here's a great idea! (word association) (Score:3, Insightful)
Some people refer to them as MSTDs which I think is pretty funny and accurate.
Re:Here's a great idea! (word association) (Score:2)
Re:Here's a great idea! (word association) (Score:2)
/. effect in action! (Score:2, Informative)
What will be done? (Score:2, Interesting)
I understand that to serve people, telecom and internal IT departments can't very well restrict ports and such based on response to each and every exploit that causes problems...
so what can telecoms and large corporations do to cut down on meaningless uses of bandwidth?
Viruses, terrorism and Microsoft (Score:5, Funny)
If it is true that viruses create BGP instability, one can extrapolate that this is a form of
terrorism, by disrupting international communications.
Now - as Microsoft has done almost nothing to effectively eliminate the threat of viruses, and
hence a form of terrorism, MS can then be seen as "harbouring terrorism".
Didn't George W himself say that those who harbour terrorists will receive the same fate?
It's therefore in the international communities best interests to destroy Microsoft!
Doesn't that... (Score:2, Interesting)
So, does he go after the hand that fed him? Or will he leave MS alone and thereby in effect harbour someone who's harbouring terrorism. We all know what he promised to do to those
Re:Viruses, terrorism and Microsoft (Score:2)
The last two big worms had patches available before they started spreading... It's the folks who put freshly installed boxes on the Internet without applying the latest patches who are guilty. (Are they terrorists? Does buying Windows and installing it at home make you a terrorist? Or maybe you become a terrorist without even realizing it when someone exploits your box!)
The only thing Microsoft has done here is make it easy for unqualified people to set up and run boxes with open, exploitable ports...
If a particular Linux distro was as widespread as Windows is, and the default install left things exposed (which has happened on numerous occasions) then the virus authors would be exploiting holes in that distro the same way these worms are exploited.
The thing saving Linux from worm attacks right now is low marketshare among novice users.
- Steve
Re:Viruses, terrorism and Microsoft (Score:1)
At the time of the most recent worm outbreak (the one that used multiple exploits), I believe that there was no reliable patch available. Is that true?
In any case, these are bugs that should never have made it into the system. I think Microsoft should have issued a recall, and made an aggressive effort to contact its customers (by real mail) in order to get this problem fixed. If the brakes on my Toyota have a major flaw, Toyota doesn't sit back and wait for me to check their web page.
Re:Viruses, terrorism and Microsoft (Score:4, Interesting)
Linux has anti-virus software, for windows.
FreeBSD has anti-virus software, for windows.
Solaris has anti-virus software, for windows.
Open, exploitable ports are nothing compared to the design flaws inherent in the Office document format and the Outlook family, that cause wave after wave of new virus to saunter past anti-virus software, laughing.
Re:Viruses, terrorism and Microsoft (Score:2)
If you've ever read hitchhikers guide to the galaxy, there's a scene (repeated in variation) where Arthur Dent (and then, in the variation, Earth) gets informed that the plans of immanent distruction have been on public display for a long time:
In a locked cabinet in a dark room in the abandoned depths of the basement with a sign on the door saying "man eating tiger -- stay out!".
The plans for Earth's destruction were on display on Alpha Centari
In any case, the Microsoft patches were available, but not on their push list, and I'm seeing reports that Microsoft weenies were describing attempts to download the fix(es) as "unnecessary".
The larger question, as well, is one of Microsoft not having security very high on their list of priorities. Given a choice between a whiz-bang feature, or a secure system, they seem to go for whe whiz-bang, and hope (wrongly - time and again) that hackers won't notice yet-another gaping hole.
The problem that Microsoft users face with respect to security is not just that MS windows is a common system. It's that Windows is a common system built like swiss cheese. If Linux and Unix were designed and maintained with the lax attitude towards security that Microsoft products display, we'd have more Linux worms than a dead gnu carcas.
Re:Viruses, terrorism and Microsoft (Score:2)
what?!? (Score:2, Funny)
Prelimary list of reasons (Score:1, Redundant)
Microsoft is killing the Net! (Score:1)
Mind you, Nimda is probably gentler to non Windows systems, because it checks if the victim is vulnerable first, whereas CodeRed sent itself anyway. So although Nimda fills your logs quicker because it checks 16 or so backdoors for each attack, it probably, IMO, sends less data.
Re:Microsoft is killing the Net! (Score:2)
Fortunately, Apache is immune, and I haven't had any real problems. But with Nimda, and to a lesser extent, CR, I have to lose email service for about an hour a day while the error reports clog my inbox.
I want the logs to give to our ISP (since most of the top probers are on our subnet) but I'm thinking I may have to compromise my IDS to cut out some of the crap...
GTRacer
- Apache on WinNT...Mmmm!
Re:Microsoft is killing the Net! (Score:1)
slashdotted (Score:2, Informative)
I've put up a mirror [panix.com] (article there now, images should be up by the time you read this).
As for the article itself, this kind of published analysis is what makes the internet great - compare with the telephone system where each company keeps (more of) their analysis to themselves and engages in more finger-pointing.
Oh, wow. (Score:3, Interesting)
I'd never have guessed.
Seriously, though, this does strongly suggest that merely using NAT and crude approximations of heirarchical routing are not enough. The networks aren't capable of tolerating the kinds of loads even a humble skript can put on them.
In short, we need a better routing system, better IP stacks, a more stream-lined structure, and better load-balancing. In short, we need IPv6, if we're to survive anything but these relatively feeble virus attacks.
(And they are feeble! In comparison to what could be done. The world is very, very lucky.)
Oh, and we also need a stronger backbone. T3's don't cut it, in a world where T4's are "standard items" and high-speed optics of up to 4 Tbs are potentially usable tomorrow.
When you start upping the bandwidth across the board by 2-3 orders of magnitude, the impact of a few flea-bag packets will not be noticable. For that matter, the impact of a major world event (such as the Starr Report, or the WTT disaster) would not bring the information infrastructure to its knees.
*Orator Mode On* Now, more than ever in the history of humanity, our society, our economy and our security depend on good lines of communication. No expense is too great, because the price of failure is greater still. This truth has tragically shown itself these past few weeks, and no amount of money can undo a single death, reverse a single bereavement, or heal a single injury.
Forty billion dollars has been allocated to the cause of chasing shadows, yet we know that shadows can never be caught. A mere four billion, on shining the light of information around the world, would have gone a long way to prevent the shadows from being there to start with.
Terror, fear - these are weapons that rely on ignorance and superstition. Without ignorance, terror has nothing to hold onto. Yet ours is a society that lives in ignorance. We have computers on our desks that are many hundreds of times more powerful than the ones used to put man on the moon. Yet those computers can be crippled by a simple forwarder virus, and the users of those computers do not wish to know. The dark is much more comforting than the light, even though it is the dark, not the light, that these viruses can grow in. Perhaps, because in the light, you do not need comforting. There is no fear to be comforted over.
Someday, maybe, people will become less frightened of living in understanding. When that day comes, the terrors of the night will no longer threaten.
*Orator mode off*
Re:Oh, wow. (Score:2, Insightful)
Isn't that a little like calling a forkbomb "a humble process"?
We can start now, by not rebuilding the WTC (Score:2)
Let's spit in the terrorists' eye by presenting them with smaller targets, and doing business more efficiently to boot.
Re:Oh, wow. (Score:2)
I am all for using IPv6 where appropriate, but it's irrelevant here. Putting in bigger pipes is expensive, and may well just make things worse (a Pentium III can just about saturate a gigabit ethernet link - what if some well-connected hosting centres get infected and start spamming the net via these larger pipes?).
MSGP (Score:1, Redundant)
"MSGP has taken a few days to develop this great technology using some of the brightest minds from around the world. Incorporating transfer of information using FEP (http://www.ietf.org/rfc/rfc3093.txt), we can ensure that when a virus hits, all internet traffic will come to a screaching halt" a Microsoft spokesperson said at yesterdays press conference.
Cisco has announced they will have firmware revisions tomorrow to incorporate this into all their products.
Re:MSGP (Score:2)
It has to be said... (Score:2)
Viruses and evolution (Score:3, Insightful)
We have two choices to fight this problem:
1: We can try to fight it using antivirus-programs, which is equivalent to using medicine to cure our viral diseaces. We already know that this means fighting an uphill-battle, because protection against the unknown is hard, if not impossible.
2: We can try to bring more diversity to the operatingsystems and programs we use. This would automatically decrease the viruspopulation, because a virus designed to infect more than one program/os/specie, would have to be far more advanced, and would thus lower the probability for it's existance. And in the case of computers, the bugs on one platform/program is rarely the same as the bugs on another.
Embrace and Extend (Score:3, Funny)
A Simple Solution (Score:5, Interesting)
By implementing a low throughput (say 64K -256K - this requires more analysis) management network, the ISPs could be certain that the state of the BGP peering sessions and the integrity of the UPDATE messages are always intact.
One of the key aspects/benefits of BGP is that unlike other routing protocols it does not advertise routes in the simple - "here's my routing table" messages that protocols such as RIP and while less so, but similarly, OSPF and ISIS use. BGP relies on TCP sessions between peers. On connection the entire known (or filtered via policies) short test path routing table is exchanged. After this the link stays idle, with the exception of TCP keepalives, until an UPDATE message is sent to communicate that a new route is added or an existing route is removed from that peer's routing table. Also BGP does not assign any significance to the port that receives the information - merely the peer. This all makes BGP inherent scaleable, stable and reliable - unless resources are not available (CPU, memory, buffers or links). TCP is the reliability mechanism here. The presence of the TCP session validates all the routes learned via that session. The absence of the TCP session invalidates all the routes and causes them to be withdrawn for that TCP session.
Maintenance of the TCP session stability is key to the stability of the routing table. With over 80,000 routes on any BGP full update, the processing needed to cope with multiple TCP sessions failing or starting is immense (and probably better servered by a UNIX platform than by a router to be honest).
SS7 uses a mechanism whereby UNIX servers process the routing information and create the core routing table - note: table is the key - it is not the path the data or calls follow. Building a similar architecture within the Internet would allow routers to have one or two TCP sessions to BGP servers (a concept already grasped with route reflector servers) and dedicate their CPU to forwarding packets etc. The dedicated servers never need to see a packet to be forwarded - it's just not that important to BGP, so they have no need to be on the same physical cables/links as user packets. This architecture would take some rethinking but not would not be outside the plans of most ISPs, and definitively not outside the skillsets.
Clearly the next problem then becomes low speed customer connections. Again the Telco industry has addressed this problem with ISDN - with the B channels. For these lower speed connections, there is no need to change the existing model. Losing one customer here or there is nothing (UPDATEs on BGP are typically well over 100 a second at NAPs) and would be catered for simply.
The NAPs could merely serve as routing table peering points, and not data transfer points - again another area of congestion.
The Internet is proving to be reliable and a trustworthy international communications medium, the next step is to make it even more robust, and truly scalable. Using OOB management is the obvious next step to this goal.
GMPLS is being touted as the next step for ISPs in terms of exchanging routing information in an OOB network. This is only one aspect of the work that is being done there.
Re:A Simple Solution (Score:2)
Excellent informative post BTW.
Re:A Simple Solution (Score:2)
The real solution is to also dedicate some CPU to the router's routing processes, so that even when the forwarding path is being heavily hit by a worm, there is no impact on the routing side's use of CPU. QoS will then make sure that the BGP and other updates get through OK.
Re:A Simple Solution (Score:2)
Most routers in the Internet today are Cisco or Juniper, which have fairly reasonable CoS support - high-end Cisco routers have no trouble handling a few more queues, and Junipers can do four queues at wire speed through hardware support for CoS. The ability to throttle back worm-generated (or other) DoS traffic, or protecting routing traffic's QoS, is worth spending some CPU cycles for, as it avoids the massive load of BGP sessions stopping and then re-starting (every restart involves a full routing table update, which is very expensive in router CPU time).
CoS implementations are getting much simpler due to the availability of policy-based network management (PBNM) tools, which enable thousands of routers to be configured for CoS within less than an hour. (Disclosure: I work for a company that makes such tools.) The real issue is whether CoS is enough - as you suggest, an OOB network is better, particularly with respect to denial of service attacks. However, an OOB network is very expensive, and the trend is towards in-band management in packet networks for this reason, so a combination of IP QoS and extra IP security might be enough. You might also want to run IPSec between all BGP peers, and to have extra ACLs, so that only IPSec-authenticated BGP peers can connect using BGP. However, IPSec is quite an admin hassle, even though PBNM can help as well here - might be better to put anti-DoS features into routers to protect BGP, e.g. rate limits on inbound BGP traffic.
Finally, MPLS is not really about out-of-band routing - it does decouple routing and forwarding, but the routing (control) packets travel over the same network as the data packets. You could separate control traffic onto a separate network, but that's not something that MPLS requires or encourages. The main reasons to use MPLS are for traffic engineering, VPNs and harder end to end QoS, not OOB management.
The concept of OOB management is useful, but IMO it's best to consider building a 'virtual OOB network' that uses QoS and security to partition its resources, while using the same links and routers as the main traffic on the network.
Re:A Simple Solution (Score:3, Interesting)
Lost packets cause retries -- which cause even more traffic. If your problem is overload, you are far better to try another path than to lose packets and generate (overall) more packets through retries on the shorter path.. If all inbound paths to a network are overloaded, then the whole network is overloaded, anyways. You might as well just drop the packet, and give the overloaded routers that 30 second flap time to catch up to the backlog.
If you took those packets out of band, then you'd be needing another method to measure packet loss... This would require more CPU and/or more packets (bandwith) -- thus making the whole problem even worse.
Fascinating... (Kill Whitey!) (Score:4, Insightful)
Actually, though there may be a direct connection between routing problems and Code Red/Nimda activities, it's still a routing problem and to my regret, I can't lay any direct blame on Microsoft for this one.
Okay, it only runs on Microsoft platforms... That's not enough. If the probes/propogation (as opposed to sheer traffic) are responsible for this then it's an issue that should be addressed with the router people. Clearly their firmware isn't written well enough and should be patched to handle this problem.
Additionally, ISPs should start cutting off infected users without hesitation now. The attacks are now more than simply annoying in the way it fills up my logs. They are now affecting the whole damned internet. This affects just every commercial interest and should be motivation enough I think... (complaints of the people are never enough, but start playing with or threatening money and you will get someone's attention eh?)
What are the positives surrounding Code Red/Nimda? Well, though they have managed to keep their sunglasses on it's still a black eye for Microsoft. And while the argument has been made that patches have been available long before this mess has started, blame can be placed on Microsoft for a different reason.
It's not the presence of patching that is at issue. Rather, it's about default configuration(s) at install time and Microsoft's neglect over issues of reasonable expectation that its users are smart enough to to know how to turn things off or even know they are running.
Microsoft's users, as Microsoft is aware, tend to install "everything" when installing their OS. Why? A number of reasons -- because they don't want to miss out on any cool toys or because if they need something later, they don't want to be forced to reboot to use it. Microsoft is aware of this.
Microsoft knows that a majority of its usership is not trained to understand the implications or potential problems of running services on the internet. These same users cannot be reasonably expected to understand beyond "if it ain't broke don't fix it." Unpatched, their servers appear to be working JUST FINE don't they? So the infected users probably don't believe they have a problem either because they don't see the symptoms or they don't realize they are running IIS at all.
Microsoft, as a mature and responsible technology company marketting to idiots must share more blame than they have been accepting at this time. This might be seen as Microsoft serving its "MS Coffee" too hot for its customers. (ref: the lawsuit where the woman sued McDonald's for serving coffee that was too hot and was negligent in affixing the lid on the container.) They have overestimated the intelligence of its usership for far too long and now this is the price we all pay.
Re:Fascinating... (Kill Whitey!) (Score:4, Informative)
Some ISPs do. I know because I get to cut them off after giving them a warning and ample time to fix the trouble. What's the problem with all of this?
Imagine the following...
Hi, this is Joe Tech from ISP X's Network center, we're seeing that your machine on x.x.x.x is infected with Nimda and this is affecting our network. Your service will be suspended if you don't take care of this.
Customer: uhhhh... how do I fix that? Will the guy at Dell fix it? Why can't you just fix my server and keep this from happening again?
My point, for every 10 business customer's I have only one of them knows A) they even have a web server on their connection B) they had their server's pants down to the whole world C) what nimda is.
besides, people paying business T1 prices don't like being shut off right or wrong.
Re:Fascinating... (Kill Whitey!) (Score:2)
Re:Fascinating... (Kill Whitey!) (Score:2)
If any of your customers are in the Dallas/Ft. Worth area, my email address is:
fix-nimda@d-n-a.cc or fix-codered@d-n-a.cc
Have them send me an email and I'll take care of them for a fee!
I saw this at ms downloads.. (Score:2, Informative)
Top Downloads
1. Internet Explorer 6
2. Internet Explorer 5.5 Service Pack 2
3. Windows Media Player 7.1
4. Internet Explorer Security Update: (IE 5.5 SP1 and Internet Tools)
5. DirectX for Windows 95, 98 and Windows Me
6. MSN Messenger Service
7. Internet Explorer 5.01 Service Pack 2
8. Internet Explorer Security Update: Late May 2001 5.5 SP1
9. Internet Explorer Security Update: (IE 5.01 SP1)
10. Office 2000 Service Release 1a (SR-1a) Update
Yes.. about half of this list comprises security updates to the MS browser.
latency on the internet (Score:2)
This is just plain wrong. It is quite easy to obtain latency measurements of the edge starting from the core.
Let E1 and E2 be points on the edge. If you have enough agents in the core, you will find an agent A in the path from E1 to E2. Then you can easily compute the latency from E1 to E2 by ping from A to E1 and from A to E2.
Death of the 'net predicted. (Score:2)
BGP is: (Score:2)
Re:New law (Score:1)
So lets forbid linux.
s/linux/your favourite stable OS/g
D'uh.
Back on topic: Couldn't routing protocols be changed to only cache routes for significant traffic flows - especially if the worms typically send small amounts of traffic to large network segments? Or better still to ignore worm-like activity (scans) at least for route caching purposes?
Re:I have a very short attention span (Score:1)
If you want to read something informative, check THIS POST [slashdot.org] out - it's the only post so far with any information. If you know bugger all about networking and just want a laugh, read this post's parent. If you don't know anything about networking, but your parents have let you boot up into Linux for a quick play on Lynx, then I suggest writing a post along the lines of 'Microsoft should be sued for letting this happen' Don't worry, you've got plenty of company.
</rant>
Re:Funny stuff! (Score:3, Interesting)
This would then cause the session to start flapping, the upstream provider to dampen the session and routes being advertised, and their address space being removed from the global routing table.
This doesn't mean that there was routing instability due to the worm, it just means that a lot of networks running unpatched IIS boxes became unreachable.
BRILLIANT!! (Score:2)
Re:Class Action (Score:2)