Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Networking IT

TimeWarner DNS Hijacking 339

Exstatica writes "It looks like TimeWarner is taking vigilante action on the botnet problem. They've hijacked DNS for a few IRC servers, the latest being irc.mzima.net and irc.nac.net — both part of EFNet. (irc.vel.net was hijacked earlier but has been restored.) Using ns1.sd.cox.net, the lookup returns an IP for what looks to be a script that forces the user into a channel and issues a set of commands to clean the drones. There have been different reports of other IRC networks being hijacked and other DNS servers involved. Is this the right way to handle the botnet problem? Is hijacking DNS legal?" Botnets are starting to move off of IRC for command and control, anyway.
Update: 07/24 00:01 GMT by KD : Updated and added more links; thanks to Drew Matthews at vel.net. 07/24 11:52 GMT by KD : Daniel Haskell wrote in to say that ircd.nac.net is seeing cox.net connections again, and that they are in discussion with the EFF over the matter.
This discussion has been archived. No new comments can be posted.

TimeWarner DNS Hijacking

Comments Filter:
  • In Pennsylvania, it sounds like it might fall under Theft of, or Diversion of Services. [aol.com]
  • by Anonymous Coward on Monday July 23, 2007 @07:58PM (#19963571)
    Politicians are more concerned with pampering the amok-running entertainment industry, providers are more concerned with keeping their pink contract customers, users are more concerned with getting cheap viagra and don't care about the number of botnets their computers are part of and law enforcement is chasing whoever is tagged with the kiddieporn or terrorism flag.

    If admins don't take it into their own hands, nobody is going to do anything.
  • by Anonymous Coward on Monday July 23, 2007 @07:58PM (#19963573)
    Police thyself, or others will do the policing for you.
  • If Time Warner was really concerned about it wouldnt it be easier and more effective to use their virtual truck (TW Self help) application to redirect the users browser start page to a list of instructions, tools and a support number to clean up their system? I have seen several instances were they redirect users to a "disabled due to non-payment" type pages...would a "Hey idiot your computer is infected" page be that difficult?
  • by sqlrob ( 173498 ) on Monday July 23, 2007 @08:08PM (#19963685)
    Knowing them, yes, and probably not a good idea.

    A while back, I got a "your computer is infected" notice from them. I checked all my computers, the Windows ones with tools that weren't even available to the public at the time, and zero, zip, nada. Everything was clean, sniffs showed nothing out of place.

    Finally talked with someone with a clue, and they classified my SpamAssassin install as a DOS on their name servers because they were caching the negative responses from the various blacklists.
  • by twitter ( 104583 ) on Monday July 23, 2007 @08:18PM (#19963783) Homepage Journal

    Wired found someone who approves of breaking the internet:

    Frankly, redirecting requests to malware sites, or IRC communication channels, to cleaner-sites sounds like a practical short term tactic to me. And if it raises awareness around the seriousness of the bot problem I'm all for it.

    Right, because the kind of people who might actually use IRC know nothing about botnets and the kind of Windoze users who are part of the botnet care about IRC. This is just another attack on the free software community as outlined in the Haloween Documents.

    Once again, the ISP has punished the good guys for problems crated by the bad guys. The root cause of the botnet is Windoze. Fixing it and raising awareness is as simple as cutting the problem computers off your network and telling their owners why. This is as it should be and pretending otherwise props up third rate software and threatens the stability of the net.

  • by QuantumG ( 50515 ) <qg@biodome.org> on Monday July 23, 2007 @08:31PM (#19963881) Homepage Journal
    Uhhhh.. see, I'm kinda of the opinion that vigilante action is only bad if there are proper channels. There are none.

  • What??? (Score:5, Interesting)

    by bogie ( 31020 ) on Monday July 23, 2007 @08:48PM (#19963999) Journal
    You mean you actually talked to someone in tech support who not only knew what a packet was but also looked up what was happening on their end at a technical level? How many drones did you have to speak to telling you to A)reboot or B)reinstall your machine? Did you use chicken blood or ox blood to perform this magic?
  • by Anonymous Coward on Monday July 23, 2007 @08:51PM (#19964027)
    This is in no way a new practice -- Time Warner has been doing this for well over two years. In the past script kiddies who have been caught hosting botnet servers on *.res.rr.com machines had their DNS's redirected to a single server in which all registered IRC users would be directed to #badbotbad, with the topic as .remove. It did, and still does, little to stop the botnet problem since the methods TW uses to sniff out the botnet servers are very specific to IRC protocol. That, and the server would only remove a standard kiddie rxbot with unchanged commands. --Manix
  • by Anonymous Coward on Monday July 23, 2007 @08:51PM (#19964031)
    I'm a student at Clemson University. After some problems with IRC-based badware 4-5 years ago, the University decided to block the default IRC port for students to try to help.

    Thing is, they never removed the block. And at a University, well, when someone does this, you're pretty much boned.

    (Yes, I know there are multiple ports on many IRC servers -- but not all of them.)
  • Not perfect, but (Score:4, Interesting)

    by davmoo ( 63521 ) on Monday July 23, 2007 @09:06PM (#19964117)
    This isn't the perfect or ideal way to do things. But its about damned time the ISPs did something.

    There is simply **NO** excuse for a bot to be running on any ISP for more than the time it takes to detect it pumping out massive volumes of email. My solution, as I've stated several times, would be to disconnect the offending computer, and then fire them off a snailmail letter stating that they will not be permitted back until their computer is disinfected. But since that would cost them customers, no one will do that.
  • by DarkOx ( 621550 ) on Monday July 23, 2007 @09:08PM (#19964133) Journal
    Yes, but arguably DNS is a services you expect your ISP to provide. I know I do. I rather like my ISPs DNS server, its fast and near to me in terms of hops. Its a great forward DNS server for the DNS server on my personal network.

    I expect my ISP to provide me with correct DNS loopup results. If they don't then they would not be providing me with part of the service I understand I am paying them for. They would hear from me about it pretty quickly and more then likely loose my business over it. There are after all lots of ISPs out there.
  • by Spazmania ( 174582 ) on Monday July 23, 2007 @09:48PM (#19964461) Homepage
    Is hijacking DNS legal?

    "Tortious interference," is part of english common law roughly defined as the causing of harm by disrupting something that belongs to someone else. The original example was a guy who repeatedly drove ducks away from his neighbors' pond by firing a gun in the air on his own property.

    So no, its not legal. But if you want to pursue it in court, you have only one of the weaker common-law torts to rely on.
  • No, probably not (Score:5, Interesting)

    by Sycraft-fu ( 314770 ) on Monday July 23, 2007 @09:50PM (#19964479)
    Since it sounds like they were doing it with their DNS servers. While it would be illegal for me to break in to your DNS server and modify it, it is not illegal for me to modify my DNS server, even if you use it. If you dislike it, you can use another service, but unless I have a contract with you there's nothing wrong with it (legally). You can argue it is a bad idea, but changing their equipment on their network is well within their rights.
  • by BertieBaggio ( 944287 ) * <bobNO@SPAMmanics.eu> on Monday July 23, 2007 @10:15PM (#19964653) Homepage

    When I first read your post I thought you were trying to make a dry joke, but I figure from your other posts that you are serious. If you really want a dedicated police force for this sort of thing why not show local politicians that it is feasible, important, and not a waste of money (the last one is the most important). If you can give them an example ("Here is a guy I tracked down in 5 hours. He controls 10,000 bots he can do $50,000 worth of damage an hour. He has probably misappropriated 1000 identities. Etc.") and pitch it to them at an angle that shows it as a way for them to win brownie points with their superiors/voters/whoever they might just do something about it.

    Once there is something like that at a local level you have what is known as a 'test case' or 'pilot project'. If it works other people will jump on the bandwagon.

    This vigilantism shows us that it is possible to track down who is controlling the networks (or at the very least pin them to an IP address), but like I say, taking down bots here and there is futile and will only encourage them to evolve.

  • by CherniyVolk ( 513591 ) on Monday July 23, 2007 @11:22PM (#19965149)

    First, as a person who owns and operates many networks, I would be rather annoyed that someone has hijacked one of my domains, for any purpose.

    To me, a domain name is the equivalent to a land deed, it's a peace of virtual real-estate. It's a representation and label identifying a group of IP addresses which may or may not be associated to a physical device or service. If I have a problem with some other network, I attempt to contact the powers-that-be of the offending network; in good faith, that they would be cooperative.

    Now, I assume many offensive networks out there might not cooperate, or might think that what their network is doing is either legal, moral, or of no harm. Well... I do admit, I block all of APNIC to my mail servers, though, I do not service "customers" either. If I did, I would assume my customer demographic might include a need or desire for correspondence with those in APNIC, and permit the traffic. While I might, on case by case scenerios, filter a range of IPs known for SPAM or whatever, things I certainly wouldn't do is hi-jack a domain, and most disturbingly, attempt to execute code on a clients machine without direct consent for each instance, each time. Basically, what you're doing then is intentionally deceiving a computer system, breaking standards, breaking and entering said computer system, and influencing change which permanently alters HOW that computer operates. And, knowing the practices and the broad generalized sweeping tactics of Cox Communications (for example), I must say I do NOT trust what they MIGHT consider as "malicious" code to delete off my computer "at their whim".

    If this becomes "legal", then what's to stop Cox Communications (for example), from considering my MP3s as "malicious or of questionable origin" and on behalf of RIAA, delete my mp3s? How are they going to know?

    Now, on to San Diego Cox Communications. While I agree that if you are on someones network, you do what they say. However, as already implied above, if my intention is to provide "Internet Service", then I DO inherently forfeit some of that overall power. And Cox Cable, blocking incoming and outgoing ports is really not within their moral obligation to do so. Nothing illegal about them doing it, no doubt some here might agree with them. But, if I'm going to sell someone "Internet Service", as I have in the past, they get "Internet Service" in full. I don't want a parent above me, and most certainly, I should be allowed unaltered Internet Service from Cox Communications on request against the default safegaurds in-place for the sake of the laymen.

    But, Cox Communications does NOT permit one to exercise all of the technologies available. They notoriously block ports, and muck with the traffic. Why? Who knows, and I don't mean to be elitist, but their explanations of some Windows worm really doesn't apply to my Linux box. Besides, if I was running Windows, I still wouldn't appreciate all the port blocking and crap. I'll handle that myself.

    As a result, I refuse to use Cox Cable or Time Warners Road Runner services. (Aside from the fact I'm banned from San Diego Cox Cable's network for running VPN clouds on their network, among other things like DoS'ing everyone on my subnet to boost my download speeds...), I warmly welcome other high-speed services that do NOT play parenthood. Sadly, one practically has to purchase a "Business" line instead of a "Home" connection. So, that's in fact what I have so if I want to launch my own webserver/mailserver, SQL Server or whatever, it's simply a matter of just configuring and launching the daemon.

    In short, I feel hi-jacking is wrong. And I feel that people should not use Cox Cable as they are the "AOL" of today anyways. Such actions are so typical of Cox Cable... it's truelly ridiculous.
  • by madsheep ( 984404 ) on Tuesday July 24, 2007 @12:05AM (#19965473) Homepage
    Well as some have pointed out you can use other DNS servers. However, many people don't have the time/knowledge/or need to mess with this and they really shouldn't have to. Messing with DNS for these purposes is a questionable activity. However, especially in the case of EFNet servers, I find this especially strange. EFNet does have some botnets that end up with them, but they are very few and far between.. and small in nature. These things are taken down pretty rapidly on EFNet and that's part of the reason they're not used frequently. DALnet -- a whole other story. There's tons of active botnets there now. EFNet is definitely much smaller in scale n terms of the number, the size, and the lifespan. This is pretty sad. Redirecting a hacked server being used by an IRCD is one thing. Doing it selective IRCDs on a huge *legit* network.. that's a whole other story.
  • by Propaganda13 ( 312548 ) on Tuesday July 24, 2007 @03:03AM (#19966343)
    Smart people care. Where do you draw the line? If your computer was infected with a bot, would you want your ISP to A) notify you and give you tools to clean your computer B) Reformat your computer

    Both options deal with the problem.

    I'm surprised that bots aren't boobytrapped against this sort of action, but as the summary states using IRC for bots is yesterday's news.
  • by Anonymous Coward on Tuesday July 24, 2007 @03:40AM (#19966475)
    Seeing as I run and actively update a virus scanner, and am therefore usually at the email rather than the IRC end of the botnet...

    Yeah, B). After 2 written warnings, tops.
  • by Dr_Barnowl ( 709838 ) on Tuesday July 24, 2007 @05:20AM (#19966919)
    Yes, the solution you propose is possible, and indeed, in progress.

    You've probably seen something similar when you have to install an ActiveX control in IE (for a bank, or Windows Update). It asks i) if you'd like to install it and ii) If you'd like to trust the publisher in the future.

    The binary is cryptographically signed which assures the computer that it is a product of the authorised holder of a particular crypto key. MS already uses this scheme for device drivers on 64-bit versions of Vista - at present, it can be disabled by a technically oriented user, but there's no guarantee that ability will persist.

    The downside is twofold - firstly, for this measure to have any teeth, you have to remove the ability of the user to ignore it. Secondly, it provokes ideas like Microsofts "Trusted Computing" initiative (aka "Palladium"), which hands over full control of your computer to a short list of people who know the secret keys embedded in your motherboard. The main motivator for requiring signed drivers in Vista is to prevent the loading of things like virtual devices which can be used to capture perfect digital copies of DRM protected media. A secondary consideration is quality assurance.

    http://www.gnu.org/philosophy/can-you-trust.html [gnu.org]

    At some point it is inevitable that MS operating systems will produce an API that permits calling programs to determine the presence of unsigned drivers or software, and refuse to perform certain functions (like playback of DRMed media). Heck, this shouldn't be hard to implement right now with a little effort. With TP, because the only trusted root certificates will be stored in inaccessible firmware, there will be no way for the user to sign drivers himself and mark them as trusted. Therefore MS (and anyone they care about pleasing) will be in control of what your computer can or cannot do.
  • by plague3106 ( 71849 ) on Tuesday July 24, 2007 @10:14AM (#19969189)
    They have the right and the power to prevent me connecting to their network. They do not have the right or authority to invasively damage my computer.

    Please explain how shutting down a bot on your computer is damaging it.
  • Re:Fair game (Score:3, Interesting)

    by dougmc ( 70836 ) <dougmc+slashdot@frenzied.us> on Tuesday July 24, 2007 @10:15AM (#19969197) Homepage

    Anything goes on the Eris Free Network.
    OK, it's nice that you know what EF stands for in EFnet, but what you may have missed is that when the IRC network (it didn't have a name back then -- it was just `IRC') split, it split into AnarchyNet (or just Anet) and Efnet. There was no need for names before that, but after that, those are the names that were chosen.


    Anet was the one where `anything goes', and yes, it did have a server called eris. The big thing that went on Anet that didn't go on Efnet was that new servers didn't need a password to connect to the existing network (well, the server `eris' was like this anyways -- I don't know if others were too) -- anybody could bring up a server. Which sounds fine, this also means that these people can make themselves IRCops on their new server and can abuse that, and it's also simple to kill anybody off on the existing network just by pretending to be a server via some simple telnet commands. Anarchy. Anet died off pretty quickly.

    This page [daniel.haxx.se] is pretty informative.

interlard - vt., to intersperse; diversify -- Webster's New World Dictionary Of The American Language

Working...