Smurf Prevention

On Mon, Jul 13, 1998 at 04:48:41AM -0400, Richard Thomas put this into my

mailbox:

Perhaps we might have some success preventing smurfs from the most common
sources, hacked machines on university dorm networks, by getting the
university backbones to filter spoofs. Things like SUnet, FUnet,

NYSERnet,

etc, account for a large portion of universities used to smurf from, and

it

might be easier then trying to get each school to filter individually. I
found the following two addresses for nysernet and funet but was unable

to

read or translate the Swedish on www.sunet.se.

That's one solution. What might be a better solution would be if the Big

Few

networks (MCI, Sprint, UUnet, etc.) were to take the list of smurf

amplifiers

from something like the SAR, *verify* that they're still smurf amplifiers,
and then refuse to route traffic from those networks.

Not only would it cut the smurfs down cold, but it would also get the folks
responsible for those networks to fix things.

Then again, if the big-bandwidth folks cared about such things, perhaps

they

would have done so already.

Unfortunately the big guys have no incentive to deal with it on a
large-scale basis. The amount of traffic involved is insignificant to them,
they're making money off the bandwidth used, and of course the "filtering
smurfs takes too much cpu time on our routers" answer (they don't seem to
realize that as soon as the kids loose the instant gratification of seeing a
ping timeout they will get bored and stop). You know several global
broadcast scans have been conducted, I've submitted them all to the Smurf
Archive Registry, and we now seem stuck at around 14,000. That leads one to
believe maybe this is all there ARE (of the .0 and .255 variety anyhow).
10,000 of those are < 10 dupes, and only 500 or so are > 30 dupes. Also
remember that SAR doesn't scan to remove dead ones by itself (something I am
currently working to create in my bcast databases), so a good many of those
are probably fixed by now.

HOW HARD CAN IT BE to take care of 500 broadcasts? Very hard, since the only
bcasts still left are those with broken contact information and upstreams
who haven't been informed or who don't give a damn. Maybe if we all picked
10 of the worst offenders every day, picked up the phone, and started
informing people who have missed the boat...

Not hard for someone willing to break the law. Just get them all smurfing
each other non-stop and they will wake up fast. Unfortunately, just about
everyone who cares about this problem wants to avoid breaking the law.

On the other hand, maybe the problem can be solved by leveraging the law.
If folks on this list would send a threatening legal letter ordering the
network owners to cease and desist then perhaps action will come quicker.
the lack of valid contact info is not relevant in this case since you
would just address the legal letter to the company CEO or university
president.

I'm still quite fond of blackholing entities which are completely
irresponsible, though for the larger carriers this wouldn't be much of a
threat. But after having tried to track down smurfers, I'm wondering if
anyone has ever actually done it. I would think you would have to either
get in touch with a smurf amplifier or their upstream to track the DoS,
but how successful has anyone been in doing so? I would think that
since smurfs have been popular amongst the script kiddies for so long
that all the entities that are easy to get in touch with have already
heard from victims and hopefully fixed the situation. Also, I wonder if
there is any way to hold the amplifiers legally responsible for smurfs
that use their networks after being given repeated notice?

Joe Shaw - jshaw@insync.net
NetAdmin - Insync Internet Services