I get really irritated with companies that put absolutely no effort into cleaning up their services on their own. When nearly 20,000 of No-IP's accounts are being used for malicious purposes, crying about how Microsoft didn't give them any warning just makes them seem incompetent. There was another article recently on HN about some free tunneling service whose creator tried to automate account shutdowns whenever his ISP sent a complaint letter, which I found to be similarly annoying -- these services are essentially forcing other companies to spend money to do the work that they themselves should be doing.
IMO No-IP is responsible for its legitimate customers' outages. Waiting around for other companies to do your job for you will result in ham-handed solutions like this one.
Lets be honest about the problem and this isn't some slashdot-esque rant:
a) Windows is a piece of crap when it comes to staying clean. If it wasn't, Microsoft wouldn't have to go after people like this. Not joking but I clean out a fair number of PCs every year and they are crawling with malware.
b) Users are dumb and install any old crap on kit if prompted to. Microsoft's SmartScreen did very little to prevent this.
In the fallout from this, people are getting hurt. End users are getting their PCs and data stuffed and companies like this lose their reputation and business because they are a convenient mule (as are the end users) for malware pushers who's job has been made easy.
And don't give me the crap about probability based on the sheer number of windows machines or the plain bullshit security statistics. They're a pretty easy target as the architecture of Windows is incredibly complicated and they're playing plug the holes rather than designing it properly to start with. For ref, I know the NT kernel, win32 and CLR inside out and no longer would I poke it with a stick.
So, there's nothing here that's unique to no-ip.com's case. The problem is that Microsoft spewed out crap for years and people are suffering because the only way they can contain it is to scorch the earth.
>Windows is a piece of crap when it comes to staying clean. If it wasn't, Microsoft wouldn't have to go after people like this.
It doesn't help that Google is making money from infecting their users with malware. It's basically impossible for people to find popular Windows software though Google without begin directed to malware.
For example if you do a Google search for 'firefox', usually the top result (actually an ad) , will be a link to a site that downloads a copy of Firefox bundled with malware. This is from a search I did a few moments ago: http://i.imgur.com/lzKU3FO.png
It would be trivial for Google to block these malware sites and Adwords accounts - a lot of the ads that show up look to be pointing to the same sites as they were 6 months ago. Adwords has manual review of ads and the sites they link to. There is just no way that they don't know about these heavily profitable Adwords accounts that are running on hugely popular keywords.
That's a pretty scary thing really when you think about it. Thanks for outlining it. Good job I stick adblock on every machine I ship so these things don't even get seen.
> Windows is a piece of crap when it comes to staying clean.
All operating systems at the face of the earth are a piece of crap when the users have admin rights and install every piece of sXXt they can put their hands on.
"But mom! Why did you 'sudo sh LOVE-LETTER-FOR-YOU.txt.sh' in the first place? Didn't I tell you not to trust email?". Security's no1 problem is the user.
>They're a pretty easy target as the architecture of Windows is incredibly complicated and they're playing plug the holes rather than designing it properly to start with. For ref, I know the NT kernel, win32 and CLR inside out and no longer would I poke it with a stick.
Not sure what you mean by that. Does Linux have any protections beyond Windows to stop malware? Why does Android have a malware problem?
This is the text of a post I made yesterday in reply to a similar comment:
How can they patch it in their product without turning desktop Windows into something like iOS or Windows Phone/RT?
Even Android has a ton of malware so the notion that Windows is somehow more hole ridden than other platforms stopped being true starting about 10 years ago with their Secure computing initiative. If the user can install Firefox, they can install malware.
If Firefox doesn't need to get permission from MS for their next version, Windows cannot distinguish between Firefox.exe and Codec_Flash_Shady.exe. Sandboxing will disable system level utilities.
MS is capable of making secure OSes. How many viruses and trojans do the 3 Xboxes, Windows Phone and RT have? Even Windows Server is pretty secure(atleast as secure as Linux) unless the admins start browsing on it. Malware is a real threat to any popular OS unless third party apps are entirely blocked or restricted by the use of a approval based App Store. Windows gives much more control to the user, which is why many users are able to stay away from infections.
Remember the shitstorm that was raised against MS on here and elsewhere when they tried to secure users by preventing undetectable rootkits by enabling Secure Boot?
1) Linux and other unixes were created with the idea of privilege separation and permission baked in. Windows had to add it later, while keeping compatibility
2) Linux has a variety of kernels and libraries versions across its base, making it difficult to exploit it uniformly
3) MS is indeed capable of making secure OSes, I don't deny it, but you should not use Xbox, Windows Phone and RT as examples, since all three of them can ONLY install approved software (less for RT, but it's not used by end users in the same way)
4) MS could have used the same approach used by Linux and Android (and partially OSX): have a central approved and monitored repository of software, but giving the possibility to add external software by jumping a few hoops, i.e. inserting a password, or checking a couple of checkboxes before allowing untrusted installations.
5) To prove the point, Android has malware almost exclusively outside of the google play store. Never heard of someone getting malware by using android, while I know an handful of people getting malware on windows (this is anecdotal experience, but I don't have any other data)
6) The shitstorm was raised because on some Secure Boot implementations it was impossible to disable it
1) IIRC, The Windows NT family had more granular level permissions than Linux. Granted before XP Windows was quite insecure, as I said in my original comment
2) Still we do see a lot of bugs and exploits that affect large swathes of Linux machines.
3) My entire point is that popular OSes that are used by nontechnical users that allow third party installs
4) Even OS X got a lot of burn for sanboxing apps and making third party apps difficult to install. They tried difficult UAC with Vista and it didn't go so well.
Heck, even kernel.org was rooted and they still haven't revealed what happened. Not to mention other distros which were also compromised at some point.
I agree in general with all your point, apart from 4 and 5.
Malware in linux repositories is "practically" impossible. Software is most of the times peer reviewed and patched in different ways by different distros. And if a particular software becomes more popular it also comes under scrutiny by more people that want to change the source to add their own features. All the packages are checksummed and repositories have cryptographic keys to establish authenticity.
Of course bugs and security vulnerabilities exist, but the same applies to other OSes as well. And I do understand that UAC is obnoxious for users, but they didn't care about creating problems for legitimate users with the no-ip case since it was posing danger.
That android report makes two assumption: a very wide definition or malware (also installing java should be considered a malware because toolbar), and the fact that a malware doesn't usually last more than a day before being removed automatically.
> Not sure what you mean by that. Does Linux have any protections beyond Windows to stop malware? Why does Android have a malware problem?
This is the key question that I'd like to hear the answer to.
People often claim Linux/OS X/et al are more secure but they struggle to explain WHY. What technical mechanism is in place in those systems that is not in place in [current] Windows? A few years ago you could definitely name a few things (i.e. before UAC, and a few other things) but now?
I'm certain something like SELinux or AppArmor makes for a more secure system, but last time I installed a consumer distro (namely Mint and Ubuntu) they weren't shipped as standard and often broke quite a lot of default packages upon their installation.
As an aside: In my experience Windows has become less "malware ridden" since XP. Vista, 7, and 8 often survive much longer without anything bad happening. It does still happen, it just isn't as common as it used to be (e.g. 1/5 consumer PCs now instead of 3/5 or more).
Ubuntu ships with AppArmor enabled. Fedora ships with SELinux. It's been that way for a long time. Other distributions like Arch come with packages for other frameworks, including grsecurity.
But I think the primary "technical mechanism" that makes Linux more secure is the fact that users install software from distribution repositories, rather than from the web. The repos are basically impenetrable since packages are signed and contributor identities confirmed with WoT (I've never heard of there being malware in a major distribution) and security updates are deployed to everybody very quickly.
privilege separation and permission since the beginning
only super user was allowed to install new software
(simplifying) different distros and different versions created diversity making it difficult for an attack area to be widespread across all installations
typing a password for additional privileges requires more attention than clicking a button
apparmor has been enabled by default since a couple of years, it used to break some stuff but not anymore
(simplifying) new files are not executable, and they don't rely on extensions to determine the associated program
since linux is not the default it requires a learning curve that people using windows don't have, so users are more tech savvy
since the source code is available, more people COULD have a look at security vulnerabilities, and in case of emergency the don't have to wait for someone else to provide a patched binary
That said, I don't consider security on windows to be a disaster. It certainly is improving and in general they also pay a lot more attention to security.
It is a very dangerous notion that the federal courts can seize the domains of one company and just hand them over to another company...
It was bad enough when ICE was doing it, this takes that bad practice to a whole other level......
What is even worse is they got the order ex parte, meaning No IP did not have a chance to defend or explain themselves to the judge before their business was irreparably harmed by the actions of their competitor.
Even if the malware claim is true (which I doubt because I trust MS about as much as the NSA) No IP should have been given basic Due Process to explain their side to the Judge before their business was harmed.
Courts never contact anyone. It is normally up to the Plaintiff to "Serve" the defendant. Except when the Plaintiff seeks an ex parte motion,order,etc which allows to court to act with out contacting the defendant.
Further if this would have been a situation where contact was attempted and failed it would have been a "default" judgment/order not ex parte
HN has an international audience. Many people here do not speak English as a first language and you could help those people by being a bit clearer with your communication.
Goguen said while Microsoft claimed that there were more than 18,000 malicious hostnames involved, no-ip.com could only find a little more than 2,000 from that list that were still active as of Monday morning.
And how is No-IP supposed to find these malware hosts? Seems to me like they'd have less capability to do so than an antivirus company that collects thousands if not millions of malware samples each day.
How many of Microsoft's customers are being used for malicious purposes? Am I as an ISP allowed to summarily disconnect all Microsoft customers from my network?
I don't think I could possibly disagree with you more.
It is in no way No-IP's job to protect Microsoft from malware yet by all accounts they employed both automated detection as well as a (very timely) manual reporting option. How can you possibly sit back and claim they're "incompetent" when you have absolutely zero knowledge of what happened within the company to address this issue? Microsoft wants to complain No-IP wasn't doing their job to their standards as if how they feel about it matters in the slightest.
Oh, and from the numbers I saw it was 12,000 accounts were deemed to be complicit in malware distribution by a 3rd party security firm. Another user posted they have ~4 million accounts total. If those numbers are accurate that means only .003% of total accounts had anything to do with malware; Sounds like a damn good job from the No-IP guys to me.
Even if you manage to delude yourself into thinking Microsoft is in the right in their domain seizure then you still can't justify the sneaky way they approached this with no forewarning to No-IP customers or even No-IP themselves. Had they actually established a dialogue maybe I wouldn't be experiencing any outages since they could have actually set up sufficient infrastructure in advance to handle the No-IP server load.
And yes, I actually used No-IP domains myself for completely legitimate purposes and am still unable to make use of any of the seized domains. No-IP is absolutely not responsible for this, that blame falls 100% on Microsoft and I honestly think you'd need to be misinformed or a Microsoft employee to feel otherwise.
What I read from this whole thing, is that Microsoft wants to privately monitor some of the subdomains. This makes me believe they aren't mainly interested in malware but in legitimate though "illegal" traffic. Be safe out there hacktivists
This is even more ridiculous than I thought, given TFA -- Microsoft could have just asked them to change the IP associated with the relevant accounts, disable update for them and/or hand over access to those accounts.
To quote myself from the other thread, the approach they did take is more than slightly bizarre:
"There are serious problems with this, firstly that it's technically impossible to implement effectively, beyond that it's extremely impractical. Any benefit will be so so transient as to render the entire exercise pointless.
For the moment, let us ignore the scary implications of the court's part in this and consider this from a technical perspective in a logical manner:
The hypothetical sub-domain abc.no-ip.org resolves to 1.2.3.4, a host somewhere that contains malicious payloads, is botnet C&C or is a member of a botnet. In any case, he's the bad guy - one of the people Microsoft are looking to exclude from the Internet.
So how can this be accomplished? Let's ignore for the moment that the bad guys are free to use any other dyndns service they please and assume that no-ip is the only one.
Approach 1
----------
Every time a host connects to no-ip to update its IP, Microsoft scans tcp & udp ports of the host looking for known C&C services, scans hosted data (public web or ftp). This will simply result in the bad guys hiding all of this in an undetectable manner, many bot-nets already use either Tor or SSH for C&C - without authentication it will be impossible to differentiate Joe Average with an SSH or Tor exit from the "targets".
As for scanning for content, this is possible assuming the content has to be public (ie. malicious payload) but even then, it's not practical - payloads can be hidden in anything and obfuscated beyond detection. Essentially all that's accomplished is another arms race based around signature detection for malicious content, with the disadvantage that unlike AV solutions this scanning is conducted remotely and the scan source is known. So the malicious guy with 2 or three lines just uses a stateful firewall to point microsoft's "scanning service" to good content, everyone else to the bad.
So what other options are there? A blacklist of IPs? Well, they're dynamic IPs, sooner or later you'll end up with every dynamic IP in the entire ipv4 range blacklisted as the bad dudes just release/renew.
Then there's banning the sub-domains/users! Also impractical because for each user and domain you ban, another will emerge.
Approach 2
----------
Microsoft resolves every request for abc.no-ip.org to their own service, all the time, this service performs stateful packet analysis before forwarding it on to the destination host. Impractical because you're essentially routing all no-ip traffic via Microsoft and once again you can only filter what you can detect -- and once the requests themselves are encrypted, that becomes impossible. This is effectively a MITM attack.
All the while we've assumed no-ip is the only alternative, it's not - and many others are beyond Microsoft and the courts jurisdiction. So ultimately the only way this "approach" could be temporarily feasible is if all Internet traffic were routed through Microsoft's service. So effectively you need to give control of every domain, TLD, ipv4 and ipv6 range to Microsoft. Not workable.
Someone is bound to point out that Microsoft's approach in this may be distributed, agents running on installs of their operating system which does address some aspects of my points above, but once again -- if Microsoft is capable of implementing effective detection on the workstation, remind me again why any of this is needed?
While I do think Microsoft's approach here is pretty insane, your proposed solution would not have helped at all:
>Microsoft could have just asked them to change the IP associated with the relevant accounts, disable update for them and/or hand over access to those accounts.
The botnet operators are using this service because of how transient it is. They likely have hundreds of accounts, each with thousands of domains, and can make more accounts and more domains on the fly.
What Microsoft should've done is worked with no-ip's team to implement some code in the account and domain registration process to catch these kind of patterns, in a way where the botnet operator thinks he's configured them correctly, but Microsoft is actually using no-ip's nameservers to point those domains to their sinkholes. After setting this up, they could've then generalized this checking process to catch and automatically ban (or shadowban) other registrants who appear to be using no-ip for botnet command & control or malware distribution. They also could implement evercookies and browser fingerprinting to track threat actors who keep making new accounts in combination with the heuristic detection.
They could've achieved a lot of good by doing this; but now every miscreant out there knows all about this due to the publicity, so they're not going to touch no-ip with a 50 foot pole.
If no-ip refused to implement something like this, then maybe Microsoft could've gotten a temporary court order so that they could basically force them to. But instead they forced them to give up control of their entire DNS space, all to take down 1 botnet.
I think it would, from Microsoft's technet article [1] -- the reason they went this route seems to be because they're having detecting these two worms (they're polymorphic) -- so they went for decapitation: kill the C&C.
Besides, knocking out no-ip still doesn't "fix" anything - there're a billion and one easy ways around it - C&C lists in alternate dyndns providers, 3rd party namespaces,Tor based C&C, pastebins, public/anonymous forums, hidden in bit-torrent blockchain etc etc etc
Heck, pushing an update to every Windows machine that simply resolved *.no-ip.org to 127.0.0.1 would be better than this. At least then folks that wanted to use it would have an easy recourse.
IMO No-IP is responsible for its legitimate customers' outages. Waiting around for other companies to do your job for you will result in ham-handed solutions like this one.