RE: "Default" Internet Service

First are the consumers willing to pay for a "safer" internet
DSL/dial/isdn?
I believe if they were there would be a safer service available. I have
seen several "secure" isp's fail in the last
few years. If you have any data that shows that there is a market for a
more secure dialup/DSL/isdn... please share it.

2nd blaming infected machines on the internet is similar to blaming your
postal carrier for bringing you junk mail and bills. About 1/2 of all of
the large "infection" events on the internet are the result of people
running unpatched unsecured applications on their machines. The other
half of the infections I see are due to an end user opening an email and
running an attachment. Even with a secure OS this simple method of
infection will continue to work.

How and when did it become the responsibility of the ISP to protect the
end users machines?
Do ISP's get paid to protect end user machines?
If you want to blame someone maybe the company that provided the
insecure os that requires monthly patches to fix portions of the broken
code they sold. Or you could blame the end users who open unknown
attachments.

I would like a real solution to the problem. Simply blocking ports is
not successful.
So I recommend 2 steps.

First buy OS's that are more secure out of the box.

2nd Teach users NOT to click on every thing they see.

Donald.Smith@qwest.com GCIA
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xAF00EDCC
pgpFingerPrint:9CE4 227B B9B3 601F B500 D076 43F1 0767 AF00 EDCC
Brian Kernighan jokingly named it the Uniplexed Information and
Computing System (UNICS) as a pun on MULTICS.

Smith, Donald wrote:

First are the consumers willing to pay for a "safer" internet
DSL/dial/isdn?

Why should they have to?

I believe if they were there would be a safer service available. I have
seen several "secure" isp's fail in the last
few years. If you have any data that shows that there is a market for a
more secure dialup/DSL/isdn... please share it.

No, but it won't belong before you will find half a dozen reasons why as an ISP you will want to do it - but then it may be too late.

2nd blaming infected machines on the internet is similar to blaming your
postal carrier for bringing you junk mail and bills.

Crap

About 1/2 of all of
the large "infection" events on the internet are the result of people
running unpatched unsecured applications on their machines. The other
half of the infections I see are due to an end user opening an email and
running an attachment.

Correct

Even with a secure OS this simple method of infection will continue to work.

Correct

However you are ignoring the fact that once the machine is infected, the machine can be used by hundreds of people (skript kiddies) to damage other parts of the internet, further they can (and are) being used by organised crime to extort money out of large financial institutions and companies, and that's not to mention DDoS's on the smaller people who are just in the way.

How and when did it become the responsibility of the ISP to protect the
end users machines?

It hasn't, however the data coming from an ISPs network has always been the responsibility of the ISP.... and I would suggest if you cannot stop the endusers getting infected, then you should look at stopping those machines from abusing other machines on the internet.... If you will not do that you should not be peered.

Do ISP's get paid to protect end user machines?

No, they get paid for traffic, which is the reason some ISPs out there don't care if their customers are DDoSing anothers network.

If you want to blame someone maybe the company that provided the
insecure os that requires monthly patches to fix portions of the broken
code they sold. Or you could blame the end users who open unknown
attachments.

Yup, we've been doing that for years, and they have been fixing things as fast as possible (not always, and not until more recently) however they are making steps in the right direction, so I feel it's about time ISP's started taking some of the responsibility for traffic on their network. As far as the attachments go, education is the only way - and if they cannot be educated they shouldn't be on the Internet.

I would like a real solution to the problem. Simply blocking ports is
not successful. So I recommend 2 steps.

First buy OS's that are more secure out of the box.

That's not going to happen anytime soon, even with Microsoft starting to follow the 'right' road.

2nd Teach users NOT to click on every thing they see.

...and how are you going to do that? If you give a user a $10 account where they have full internet access they click on everything, then they get infected, their machine is controlled by someone else across the world and is used for DDoS attacks or spam (or..hacking, or...?) .. what are you going to do to educate them in the middle....? What is the ISP going to do to make sure that the enduser has been educated? What are you the ISP going to do to ensure the machine that was infected has now been disinfected...?

I don't expect you the ISP to solve all these problems, nor do I expect you the ISP to stop your users from getting infected.... However you the ISP are responsible for traffic coming from and going to your users, and most of us don't care if you want to allow your users to get infected, however we do care if you allow your customers to attack us.... Whether it be an attack in the form of spam, DDoS or trojan/virus spreading.

/ Mat

Smith, Donald wrote:

First are the consumers willing to pay for a "safer" internet
DSL/dial/isdn?

Why should they have to?

Because providing it costs more.

I believe if they were there would be a safer service available. I have
seen several "secure" isp's fail in the last
few years. If you have any data that shows that there is a market for a
more secure dialup/DSL/isdn... please share it.

No, but it won't belong before you will find half a dozen reasons why as
an ISP you will want to do it - but then it may be too late.

Such as?

2nd blaming infected machines on the internet is similar to blaming your
postal carrier for bringing you junk mail and bills.

Crap

It's not crap. Infected machines are no more the fault of the internet than
junkmail in your mailbox is the fault of the post office. There's literally
no difference to the model. The post office delivers mail that is addressed
to you. They don't care if it's junk mail or not. They deliver it.

About 1/2 of all of
the large "infection" events on the internet are the result of people
running unpatched unsecured applications on their machines. The other
half of the infections I see are due to an end user opening an email and
running an attachment.

Correct

Actually, I suspect it's a much larger fraction, more along the lines
of 80 to 90%, possibly more.

Even with a secure OS this simple method of infection will continue to
work.

Correct

And how is an ISP supposed to do anything about this?

However you are ignoring the fact that once the machine is infected, the
machine can be used by hundreds of people (skript kiddies) to damage
other parts of the internet, further they can (and are) being used by
organised crime to extort money out of large financial institutions and
companies, and that's not to mention DDoS's on the smaller people who are
just in the way.

Right... So, you should be working really hard to get people not to allow
their machines to be infected, and, to get ISPs to disconnect infected
sites from the network. I support both of those moves. The rest is just
a way to tax the clueful for the ignorance of the masses with little benefit.

How and when did it become the responsibility of the ISP to protect the
end users machines?

It hasn't, however the data coming from an ISPs network has always been
the responsibility of the ISP.... and I would suggest if you cannot stop
the endusers getting infected, then you should look at stopping those
machines from abusing other machines on the internet.... If you will not
do that you should not be peered.

Sorry... The data ORIGINATING from the ISPs network is the responsibility
of the ISP. The data transiting the ISPs network is just that. The ISP
has no obligation, indeed, no right to look into the data beyond what is
necessary for delivery and operation of the service (ECPA).

I agree that ISPs should shut off sites that are demonstrably spewing
abuse and notify those sites of the problem. I've repeatedly supported
several models for doing just that. However, this is different from making
the ISP responsible for breaking the users connectivity prior to such
an event in the name of preventing the user from shooting themselves in the
foot. I further like the idea of de-peering ISPs who don't do this, and,
if you can get a critical mass of the major ISPs to do that, life will
start to get better. If you can't, it won't.

Do ISP's get paid to protect end user machines?

No, they get paid for traffic, which is the reason some ISPs out there
don't care if their customers are DDoSing anothers network.

No, they get paid for delivering packets. They don't get paid (currently)
for handling abuse complaints. Paul Vixie has proposed, and, I have
supported a model which ISPs could adopt which would change this fact.
Most residential ISPs get paid the same whether the customer spews
abuse or not. Their costs go up some when they get abuse complaints
and when abuse starts using more bandwidth, so, for the most part, most
residential ISPs have no incentive to support abuse, but, not enough
incentive to pay to staff an abuse department sufficiently to be truly
responsive. Further, most abuse departments don't get enough support
from management when the sales and marketing departments come whining
about how much revenue that abusing customer produces each month.
This is one of the unfortunate realities of a free-market economy. It
doesn't always tie profit to doing the right thing, and, it favors
short-term thinking over long-term planning.

If you want to blame someone maybe the company that provided the
insecure os that requires monthly patches to fix portions of the broken
code they sold. Or you could blame the end users who open unknown
attachments.

Yup, we've been doing that for years, and they have been fixing things as
fast as possible (not always, and not until more recently) however they
are making steps in the right direction, so I feel it's about time ISP's
started taking some of the responsibility for traffic on their network.
As far as the attachments go, education is the only way - and if they
cannot be educated they shouldn't be on the Internet.

They continue to develop new and more exploitable services and features.
They continue to improve upon techniques for bypassing corporate firewalls.
They are not fixing things as fast as possible, they are fixing things as
they become widely known and public. They are also showing no commitment
to implementing new features in a secure way, nor, indeed, any willingness
to give up features in order to presreve security. They have convinced
themselves (and apparently the corporate world) that they are untouchable,
and they continue to rake in profits while having no accountability to
the parties that are injured by their actions.

I would like a real solution to the problem. Simply blocking ports is
not successful.
So I recommend 2 steps.

First buy OS's that are more secure out of the box.

That's not going to happen anytime soon, even with Microsoft starting to
follow the 'right' road.

I haven't seen any indication that Micr0$0ft is following the right road, just
that they are bending to some public pressure to pay some level of lip-service
to security. Yes, they have fixed the 100 most gaping security holes in their
code this week. No, they haven't shown that new code is being written with
security as an important consideration.

2nd Teach users NOT to click on every thing they see.

...and how are you going to do that? If you give a user a $10 account
where they have full internet access they click on everything, then they
get infected, their machine is controlled by someone else across the
world and is used for DDoS attacks or spam (or..hacking, or...?) .. what
are you going to do to educate them in the middle....? What is the ISP
going to do to make sure that the enduser has been educated? What are
you the ISP going to do to ensure the machine that was infected has now
been disinfected...?

So, let me see if I have this straight...

The gas company is now expected to somehow stop me from feeding gas
into the water heater they don't know I've installed, or refuse to sell
me gas, until I can prove that I know how to install gas appliances,
because, if they sell me gas without disabling my ability to connect
it to other appliances, I might.

Right... That's going to happen. ISPs are like utilities. They deliver
a service. The service is the acceptance and delivery of properly formed
IP datagrams. If you want something different, that's a separate value-
added service and you should pay more for it.

I don't expect you the ISP to solve all these problems, nor do I expect
you the ISP to stop your users from getting infected.... However you the
ISP are responsible for traffic coming from and going to your users, and
most of us don't care if you want to allow your users to get infected,
however we do care if you allow your customers to attack us.... Whether
it be an attack in the form of spam, DDoS or trojan/virus spreading.

This makes sense. I've supported this. That's not what Adi and others
have been saying, and, it's not what some of your statements above say.

Owen

It's not crap. Infected machines are no more the fault of the internet than
junkmail in your mailbox is the fault of the post office. There's literally
no difference to the model. The post office delivers mail that is addressed
to you. They don't care if it's junk mail or not. They deliver it.

So what about little envelopes with white powder? Does the post office
still have an obligation to deliver it or should they be concerned about
the welfare of their customers? Perhaps they should insist that customers
are properly vaccinated....

Point I am making is that the post office is not responsible and/or liable
for the content of the packages they deliver. However, if they deliver
packages that are obviously visibly dangerous to the recipient they have
an obligation to investigate and not deliver the package.

Most residential ISPs get paid the same whether the customer spews
abuse or not. Their costs go up some when they get abuse complaints
and when abuse starts using more bandwidth, so, for the most part, most
residential ISPs have no incentive to support abuse, but, not enough
incentive to pay to staff an abuse department sufficiently to be truly
responsive. Further, most abuse departments don't get enough support
from management when the sales and marketing departments come whining
about how much revenue that abusing customer produces each month.
This is one of the unfortunate realities of a free-market economy. It
doesn't always tie profit to doing the right thing, and, it favors
short-term thinking over long-term planning.

Who do you suppose pays for the abuse department staff? Those are
operational costs passed on to all customers. If increasing abuse results
in increasing staff, hopefully eventually, these cost will most likely be
passed on to all customer. It would be nice to see per incident billing so
only offenders and repeat offenders pay. I doubt that'll happen (just a
gut feeling, no other justification).

Adi

Owen DeLong <owen@delong.com> writes:

It's not crap. Infected machines are no more the fault of the internet
than junkmail in your mailbox is the fault of the post office. There's
literally no difference to the model. The post office delivers mail
that is addressed to you. They don't care if it's junk mail or not.
They deliver it.

* adil@adis.on.ca (Adi Linden) [Tue 15 Jun 2004, 00:58 CEST]:

So what about little envelopes with white powder? Does the post office
still have an obligation to deliver it or should they be concerned
about the welfare of their customers? Perhaps they should insist that
customers are properly vaccinated....

Don't you think you're stretching this analogy way past its breaking
point?

Besides, the post office (supposedly) cares about its workers and as
such has a problem with delivering dangerous packages...

Point I am making is that the post office is not responsible and/or
liable for the content of the packages they deliver. However, if they
deliver packages that are obviously visibly dangerous to the recipient
they have an obligation to investigate and not deliver the package.

If they were so obviously visibly dangerous, why did postal workers die
during the first few anthrax scares?

Again, the analogy breaks down. (Packets don't kill people, packages do?)

Don't junk mailers pay extra anyway? Or is that an urban legend...

  -- Niels.

It's not crap. Infected machines are no more the fault of the internet
than junkmail in your mailbox is the fault of the post office. There's
literally no difference to the model. The post office delivers mail
that is addressed to you. They don't care if it's junk mail or not.
They deliver it.

So what about little envelopes with white powder? Does the post office
still have an obligation to deliver it or should they be concerned about
the welfare of their customers? Perhaps they should insist that customers
are properly vaccinated....

That depends... Is it an envelope covered in suspicious white powder,
or, is it a well sealed envelope that happens to contain a plastic
baggy of white powder? If it's the former, then, there is obvious
reason, and, this would be equivalent to a malformed IP datagram,
which most (all) ISPs will drop. If it's the latter, then, the
post office has no legitimate way to know that the envelope contains
white powder, nor, does it know what the white powder is. Also,
the primary reason/responsibility the post office has in not delivering
the white powder on the outside of the envelope is to protect postal
employees. Secondarily, the mail may come into contact with other
than it's intended target. The post office does not, in my opinion,
have an obligation to protect you from mail properly addressed to you.

Point I am making is that the post office is not responsible and/or
liable for the content of the packages they deliver. However, if they
deliver packages that are obviously visibly dangerous to the recipient
they have an obligation to investigate and not deliver the package.

Actually, there is some debate about that. However, there are also
strong boundaries on that. The obligation you speak of applies to
things that endanger human life. If you send a diskette mailer to
someone with the label "Diskette inside contains live computer virus",
I bet the post office will probably deliver it. That's every bit
as harmful as the packets you're complaining about the ISPs delivering.

Most residential ISPs get paid the same whether the customer spews
abuse or not. Their costs go up some when they get abuse complaints
and when abuse starts using more bandwidth, so, for the most part, most
residential ISPs have no incentive to support abuse, but, not enough
incentive to pay to staff an abuse department sufficiently to be truly
responsive. Further, most abuse departments don't get enough support
from management when the sales and marketing departments come whining
about how much revenue that abusing customer produces each month.
This is one of the unfortunate realities of a free-market economy. It
doesn't always tie profit to doing the right thing, and, it favors
short-term thinking over long-term planning.

Who do you suppose pays for the abuse department staff? Those are
operational costs passed on to all customers. If increasing abuse results
in increasing staff, hopefully eventually, these cost will most likely be
passed on to all customer. It would be nice to see per incident billing
so only offenders and repeat offenders pay. I doubt that'll happen (just
a gut feeling, no other justification).

Right... that's why I support the "abuser pays" model of charging cleanup
fees for users that get infected. That's what I'd like to see too.
Arguing for ISPs to filter customers arbitrarily, distracts from this.

Owen

Date: Mon, 14 Jun 2004 17:57:21 -0500 (CDT)
From: Adi Linden

Who do you suppose pays for the abuse department staff? Those
are operational costs passed on to all customers.

Unless one does nothing, in which case the cost goes to the rest
of the world. I'd rather take on a handful of infected users and
hosts on the inside than deal with crud from the rest of the
world.

Yet another slew of NANOG threads with hundreds of posts that
boil down to sociotechnical issues and how to shift the costs to
the guilty parties.

Eddy

Owen DeLong wrote:

--On Monday, June 14, 2004 17:57 -0500 Adi Linden <adil@adis.on.ca> wrote:

It's not crap. Infected machines are no more the fault of the internet
than junkmail in your mailbox is the fault of the post office. There's
literally no difference to the model. The post office delivers mail
that is addressed to you. They don't care if it's junk mail or not.
They deliver it.

So what about little envelopes with white powder? Does the post office
still have an obligation to deliver it or should they be concerned about
the welfare of their customers? Perhaps they should insist that customers
are properly vaccinated....

That depends... Is it an envelope covered in suspicious white powder,
or, is it a well sealed envelope that happens to contain a plastic
baggy of white powder? If it's the former, then, there is obvious
reason, and, this would be equivalent to a malformed IP datagram,
which most (all) ISPs will drop. If it's the latter, then, the
post office has no legitimate way to know that the envelope contains
white powder, nor, does it know what the white powder is. Also,
the primary reason/responsibility the post office has in not delivering
the white powder on the outside of the envelope is to protect postal
employees. Secondarily, the mail may come into contact with other
than it's intended target. The post office does not, in my opinion,
have an obligation to protect you from mail properly addressed to you.

And yet the UK postoffice xrays all parcels looking for bombs (confirmable with the UK post office).... AFAIK they also now use sniffer technology to look for other 'nasties' (this is completely unconfirmed)

Point I am making is that the post office is not responsible and/or
liable for the content of the packages they deliver. However, if they
deliver packages that are obviously visibly dangerous to the recipient
they have an obligation to investigate and not deliver the package.

Actually, there is some debate about that. However, there are also
strong boundaries on that. The obligation you speak of applies to
things that endanger human life. If you send a diskette mailer to
someone with the label "Diskette inside contains live computer virus",
I bet the post office will probably deliver it. That's every bit
as harmful as the packets you're complaining about the ISPs delivering.

And to the same respect you send a package with 'The package contains the Anthrax virus" they'll probably deliver it as well...
(wouldn't recommed anyone testing it though ;-))

Most residential ISPs get paid the same whether the customer spews
abuse or not. Their costs go up some when they get abuse complaints
and when abuse starts using more bandwidth, so, for the most part, most
residential ISPs have no incentive to support abuse, but, not enough
incentive to pay to staff an abuse department sufficiently to be truly
responsive. Further, most abuse departments don't get enough support
from management when the sales and marketing departments come whining
about how much revenue that abusing customer produces each month.
This is one of the unfortunate realities of a free-market economy. It
doesn't always tie profit to doing the right thing, and, it favors
short-term thinking over long-term planning.

Who do you suppose pays for the abuse department staff? Those are
operational costs passed on to all customers. If increasing abuse results
in increasing staff, hopefully eventually, these cost will most likely be
passed on to all customer. It would be nice to see per incident billing
so only offenders and repeat offenders pay. I doubt that'll happen (just
a gut feeling, no other justification).

Right... that's why I support the "abuser pays" model of charging cleanup
fees for users that get infected. That's what I'd like to see too.

Hear hear..

Arguing for ISPs to filter customers arbitrarily, distracts from this.

No it doesn't - it's two different models - I'm sure some customers would prefer filtered access rather than risk a cleanup charge being dumped on them...

/ Mat

> Point I am making is that the post office is not responsible and/or
> liable for the content of the packages they deliver. However, if they
> deliver packages that are obviously visibly dangerous to the recipient
> they have an obligation to investigate and not deliver the package.
>
Actually, there is some debate about that. However, there are also
strong boundaries on that. The obligation you speak of applies to
things that endanger human life. If you send a diskette mailer to
someone with the label "Diskette inside contains live computer virus",
I bet the post office will probably deliver it. That's every bit
as harmful as the packets you're complaining about the ISPs delivering.

Actually postal and freight services require you to label dangerous
goods and may not accept some types of dangerous goods to start with.
If they believe you've sent dangerous goods that has not been
labeled as such they have the right to return the packege to sender
or conduct their own investigation and delay the shipment.

So in a sense if you send somebody an envelope and specify that it
contains "dangerous white powder" and they actually accepted the shipment,
they should deliver it. But if they see that it contains this powder and
its labeled "love letter", then they should in fact open the envelope and
test it or return it to sender to get more clarification about what it is.

Now that's great in theory, obviously in practie this does not work and
viruses do not get labeled as such. However my feeling is that most users
don't at all object to ISP checking their received email for viruses,
eventhough it maybe invasion of their private mailbox. Similarly I don't
think its outside the scope of ISP on the origin side of email to do
similar checks on behalf of the sender.

>> Most residential ISPs get paid the same whether the customer spews
>> abuse or not. Their costs go up some when they get abuse complaints
>> and when abuse starts using more bandwidth, so, for the most part, most
>> residential ISPs have no incentive to support abuse, but, not enough
>> incentive to pay to staff an abuse department sufficiently to be truly
>> responsive. Further, most abuse departments don't get enough support
>> from management when the sales and marketing departments come whining
>> about how much revenue that abusing customer produces each month.

Its not like a big spamhaus that orders gigabit line, we're talking
about individual dsl users most interested in cheapest kind of inet
connection. There is not much revenue in that and cost of dealing with
spam reports when their insecure system becomes zombie is much greater.

Actually postal and freight services require you to label dangerous
goods and may not accept some types of dangerous goods to start with.
If they believe you've sent dangerous goods that has not been
labeled as such they have the right to return the packege to sender
or conduct their own investigation and delay the shipment.

Yes, you must label dangerous goods. However, if I send a sealed
plastic bag of powdered sugar to somoene, the post office has no
reason to automatically assume that my package contains dangerous
goods. In fact, arguably, if I have packed it correctly, they have
no legitimate means to know that it is a white powder. So, unless
you can tell me some way that you believe that package (assuming it
is properly packaged, not leaking, doesn't have traces of white powder
on the outside, etc.) would be returned, I think we can both acknowledge
that this comes closer to what most worm traffic looks like.

So in a sense if you send somebody an envelope and specify that it
contains "dangerous white powder" and they actually accepted the
shipment, they should deliver it. But if they see that it contains this
powder and its labeled "love letter", then they should in fact open the
envelope and test it or return it to sender to get more clarification
about what it is.

Right... See above.

Now that's great in theory, obviously in practie this does not work and
viruses do not get labeled as such. However my feeling is that most users
don't at all object to ISP checking their received email for viruses,
eventhough it maybe invasion of their private mailbox. Similarly I don't
think its outside the scope of ISP on the origin side of email to do
similar checks on behalf of the sender.

Well, users that don't object are welcome to ask their ISP and subscribe
to that service. I don't want my ISP doing anything other than sending
the appropriate packets to port 25 on my mail server. If the ISP is hosting
the users mailbox on their system, that's a different issue. However,
if my ISP tries to block my mailserver from talking to other mailservers,
or, starts inspecting SMTP packets coming towards me for viruses, I am
indeed, going to be initiating legal proceedings against them under ECPA.

If an ISP is hosting a users mailbox, that is a separate value added service
from "internet" service. I don't expect the ISP to tamper with email on
the internet service. What they do in the mailbox service is a matter of
that contract. It's not a service I want to subscribe to, so, I'm not as
worried about what it does or doesn't do. The customer and ISP can agree
on that contract, and, as far as I'm concerned, it's outside the scope of
this discussion. We are, after all, talking about internet service, not
mailbox hosting service.

>> Most residential ISPs get paid the same whether the customer spews
>> abuse or not. Their costs go up some when they get abuse complaints
>> and when abuse starts using more bandwidth, so, for the most part,
>> most residential ISPs have no incentive to support abuse, but, not
>> enough incentive to pay to staff an abuse department sufficiently to
>> be truly responsive. Further, most abuse departments don't get
>> enough support from management when the sales and marketing
>> departments come whining about how much revenue that abusing customer
>> produces each month.

Its not like a big spamhaus that orders gigabit line, we're talking
about individual dsl users most interested in cheapest kind of inet
connection. There is not much revenue in that and cost of dealing with
spam reports when their insecure system becomes zombie is much greater.

Right, and, there isn't enough revenue in it to cover protecting the user
from himself. That's why most major dialup ISPs have a really lousy
abuse process. Now, if they'd start billing their end-users to cover
the cost of a good abuse department, then things might change. Making
non-abusive customers subsidize the abusive customers isn't the
solution.

Owen

Owen DeLong wrote:

Smith, Donald wrote:

First are the consumers willing to pay for a "safer" internet
DSL/dial/isdn?

Why should they have to?

Because providing it costs more.

I believe if they were there would be a safer service available. I have
seen several "secure" isp's fail in the last
few years. If you have any data that shows that there is a market for a
more secure dialup/DSL/isdn... please share it.

No, but it won't belong before you will find half a dozen reasons why as
an ISP you will want to do it - but then it may be too late.

Such as?

That I am bound not to say unfortunately, however all will become clear soon (it'll be in the press).

2nd blaming infected machines on the internet is similar to blaming your
postal carrier for bringing you junk mail and bills.

Crap

It's not crap. Infected machines are no more the fault of the internet than
junkmail in your mailbox is the fault of the post office. There's literally
no difference to the model. The post office delivers mail that is addressed
to you. They don't care if it's junk mail or not. They deliver it.

If you're a water company, and you deliver rusty water through your pipes - you are responsible

Actually, I suspect it's a much larger fraction, more along the lines
of 80 to 90%, possibly more.

Agreed

Even with a secure OS this simple method of infection will continue to
work.

Correct

And how is an ISP supposed to do anything about this?

Education... and how to educate - well if they don't want to do it for their own personal gain, force them.... How to force them... don't give them access until they have learnt the basics... Hitting them financially when they get it wrong will force most to learn rather than get caught again, but it would be nice to stop them in the first place.... further what are you going to do with those who you try to 'fine' and they just go to another ISP...? (I do have some experience with this don't forget - much to the annoyance of some) ... Anyhow remember this:

Prevention is better than a cure...

However you are ignoring the fact that once the machine is infected, the
machine can be used by hundreds of people (skript kiddies) to damage
other parts of the internet, further they can (and are) being used by
organised crime to extort money out of large financial institutions and
companies, and that's not to mention DDoS's on the smaller people who are
just in the way.

Right... So, you should be working really hard to get people not to allow
their machines to be infected, and, to get ISPs to disconnect infected
sites from the network. I support both of those moves. The rest is just
a way to tax the clueful for the ignorance of the masses with little benefit.

We're already being taxed... In Australia we are forced to pay for incoming and outgoing traffic - so DDoSes and Spam cost the recipient.

How and when did it become the responsibility of the ISP to protect the
end users machines?

It hasn't, however the data coming from an ISPs network has always been
the responsibility of the ISP.... and I would suggest if you cannot stop
the endusers getting infected, then you should look at stopping those
machines from abusing other machines on the internet.... If you will not
do that you should not be peered.

Sorry... The data ORIGINATING from the ISPs network is the responsibility
of the ISP.

I did say 'data coming from an ISP'...

  The data transiting the ISPs network is just that. The ISP
has no obligation, indeed, no right to look into the data beyond what is
necessary for delivery and operation of the service (ECPA).

Now that is debatable - and probably not best discussed here or in this thread.... AFAIAC the traffic coming from an ISP is the responsibility of that ISP - if it's transiting they are still responsible... It's the 'car accident' principle.. 3 cars (A,B & C) pull up at a stop sign, B stops behind A, C runs into B and pushed B into A... A doesn't sue C.... A sues B for A's damage, and B sues C for B's damage, A's damage and costs.

I agree that ISPs should shut off sites that are demonstrably spewing
abuse and notify those sites of the problem. I've repeatedly supported
several models for doing just that. However, this is different from making
the ISP responsible for breaking the users connectivity prior to such
an event in the name of preventing the user from shooting themselves in the
foot. I further like the idea of de-peering ISPs who don't do this, and,
if you can get a critical mass of the major ISPs to do that, life will
start to get better. If you can't, it won't.

...and in the current economical enviroment, and the size of the 'worst' ISPs is going to stop tha from happening.

Do ISP's get paid to protect end user machines?

No, they get paid for traffic, which is the reason some ISPs out there
don't care if their customers are DDoSing anothers network.

No, they get paid for delivering packets. They don't get paid (currently)
for handling abuse complaints. Paul Vixie has proposed, and, I have
supported a model which ISPs could adopt which would change this fact.

I'd be interested to see that... I don't have a problem with most ideas like that.

Most residential ISPs get paid the same whether the customer spews
abuse or not. Their costs go up some when they get abuse complaints
and when abuse starts using more bandwidth, so, for the most part, most
residential ISPs have no incentive to support abuse, but, not enough
incentive to pay to staff an abuse department sufficiently to be truly
responsive. Further, most abuse departments don't get enough support
from management when the sales and marketing departments come whining
about how much revenue that abusing customer produces each month.
This is one of the unfortunate realities of a free-market economy. It
doesn't always tie profit to doing the right thing, and, it favors
short-term thinking over long-term planning.

Agreed

If you want to blame someone maybe the company that provided the
insecure os that requires monthly patches to fix portions of the broken
code they sold. Or you could blame the end users who open unknown
attachments.

Yup, we've been doing that for years, and they have been fixing things as
fast as possible (not always, and not until more recently) however they
are making steps in the right direction, so I feel it's about time ISP's
started taking some of the responsibility for traffic on their network.
As far as the attachments go, education is the only way - and if they
cannot be educated they shouldn't be on the Internet.

They continue to develop new and more exploitable services and features.
They continue to improve upon techniques for bypassing corporate firewalls.
They are not fixing things as fast as possible, they are fixing things as
they become widely known and public. They are also showing no commitment
to implementing new features in a secure way, nor, indeed, any willingness
to give up features in order to presreve security. They have convinced
themselves (and apparently the corporate world) that they are untouchable,
and they continue to rake in profits while having no accountability to
the parties that are injured by their actions.

Agreed, however they have publically acknowledged the problem, which for me is a major milestone.

I would like a real solution to the problem. Simply blocking ports is
not successful.
So I recommend 2 steps.

First buy OS's that are more secure out of the box.

That's not going to happen anytime soon, even with Microsoft starting to
follow the 'right' road.

I haven't seen any indication that Micr0$0ft is following the right road, just
that they are bending to some public pressure to pay some level of lip-service
to security. Yes, they have fixed the 100 most gaping security holes in their
code this week. No, they haven't shown that new code is being written with
security as an important consideration.

Hey, I am a Miro$oft hater, but I conceed that the 'default the firewall to on' feature of the next service pack is a good thing - the only issue is the part about not installing on pirated OS's and that they are taking way too long to release it.... but it is a start - we've been trying to get M$ to even start for how many years now?

2nd Teach users NOT to click on every thing they see.

...and how are you going to do that? If you give a user a $10 account
where they have full internet access they click on everything, then they
get infected, their machine is controlled by someone else across the
world and is used for DDoS attacks or spam (or..hacking, or...?) .. what
are you going to do to educate them in the middle....? What is the ISP
going to do to make sure that the enduser has been educated? What are
you the ISP going to do to ensure the machine that was infected has now
been disinfected...?

So, let me see if I have this straight...

The gas company is now expected to somehow stop me from feeding gas
into the water heater they don't know I've installed, or refuse to sell
me gas, until I can prove that I know how to install gas appliances,
because, if they sell me gas without disabling my ability to connect
it to other appliances, I might.

Actually this is what happens in the UK by law.... If you have a gas heater installed by a non-approved technician, the gas supply will not be connected until it is checked and approved by an approved installer or gas technician. Similarly if the heater doesn't meet certain standards it will never be connected to the gas supply in the UK.... Of course this doesn't stop people getting the gas connected and then doing a DIY gas installation, but people can go to jail for that.

Right... That's going to happen. ISPs are like utilities. They deliver
a service. The service is the acceptance and delivery of properly formed
IP datagrams. If you want something different, that's a separate value-
added service and you should pay more for it.

I don't expect you the ISP to solve all these problems, nor do I expect
you the ISP to stop your users from getting infected.... However you the
ISP are responsible for traffic coming from and going to your users, and
most of us don't care if you want to allow your users to get infected,
however we do care if you allow your customers to attack us.... Whether
it be an attack in the form of spam, DDoS or trojan/virus spreading.

This makes sense. I've supported this. That's not what Adi and others
have been saying, and, it's not what some of your statements above say.

It is what I mean to say - I have never been good at communicating by written word - probably something to do with the fact I am dyslexic.

/ Mat

Folks, it's time to end these threads. If I have to read one more
political/social analogy, I'm going to pass out ...

Can I help? Please? Pretty please? Pretty pretty pluuuheeeese?

:slight_smile:

  -- Per