Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Why I should have the right to kill a malicious process on your machine
Security Focus Online (Via the register.uk) ^ | 1.14.03 | By Tim Mullen

Posted on 01/17/2003 10:15:03 AM PST by AdA$tra

Opinion A lot has happened since my Right to Defend column in SecurityFocus Onlinr last July, and the subsequent presentation I made at the Blackhat Security Briefings in Las Vegas. The idea has withstood a lot of criticism.

To refresh, I believe you should have the right to neutralize a worm process running on someone else's infected system, if it's relentlessly attacking your network. I've even written code to demonstrate the process. Though the initial news coverage of the concept was grossly inaccurate in conveying my ideas, it has stirred up a constructive dialog.

I knew my idea was controversial, but I was wrong about something-- I figured everyone in the security biz would "get it" and that the hard part would be convincing everyone else that if they can't or won't secure their machines, we as the defenders would have the right to terminate the process attacking us.

It has turned out to be the opposite.

TechTV's Cybercrime news magazine show did a segment about strikeback, where I talked about my goals and demo'd a couple of my neutralizing agents. Though the audience of Cybercrime is a much more generalized group of computer users and enthusiasts, the very people I thought would cry foul the loudest, I did not receive a single negative e-mail in response. Every last message was wonderfully supportive, and most of them eagerly offered assistance and asked how they could participate.

It has been the "security experts" who have grouped as the opposition, some even with a level of condescension. For instance, Eugene Schultz of U.C. Berkeley's Lawrence Berkeley National Laboratory wrote in an issue of SANS Newsbites that he "hoped no one would take Mr. Mullen seriously" about this technology, as if it were some joke I was playing on the community.

To the contrary, I am dead serious -- because we need strikeback. In fact, had the technology been in place when Nimda first appeared, institutions like the University of California at Berkeley, for example, could have been spared the embarrassment of having Nimda rip through their infrastructure, infecting untold numbers of innocent external machines just because their IT staff couldn't secure IIS.

I think the main reason for the knee-jerk criticism from the likes of Schultz is that they work largely in a theoretical rose-colored world of security, where all problems are solved after a cup of coffee and a bit of pontification. Those who actually work in the operational end of network and system security see things as they really are. The men and women who work the trenches of system administration know that fast spreading worms like Nimda are a real problem that must be addressed, and are willing to work for a solution.

No Accountability, No Rights
I was surprised to see Bruce Schneier try to draw a bit of the red, red krovvy by lumping strikeback with legislation that the RIAA is pushing -- and U.S. Representative Howard Berman is sponsoring -- that would permit record companies to legally hack file sharing networks. He even includes a quote from the "Declaration of the Rights of Man and of the Citizen" in order to illustrate how such technology goes against the rights of the people.

I'm not sure of the relevancy of a document the French National Assembly drafted 200 years ago, but let's ignore that for now. If anyone's rights are at issue here, it's yours and mine -- the people whose systems are being attacked by worms and viruses running rampant on negligently unprotected machines.

Schneier's reasoning ignores fundamental differences -- opposites, really -- between the RIAA proposal and what my strikeback technology does. Under the Berman bill, the RIAA could legally hack only people infringing their copyrights -- people the RIAA already have ample legal remedies against.

In contrast, my strikeback technique is aimed at an attacking worm-infected box whose owners have no legal responsibility, and to whom justice turns two blind eyes. We have no legal recourse against these people. Maybe in the distant future we can prove that every owner of a system connected to the Internet has a duty to perform due diligence in securing their assets, but today proving such a duty would be quite difficult, even in instances of the most grievous neglect.

Logic dictates that anyone who opposes a bill allowing corporate entities to attack our systems should support a technique to stop worm-ridden systems from doing the same.

As the debate continues, I'd like to suggest a new way of thinking about the parties involved in a strikeback scenario.

Since the owner of a system has no responsibility for the actions of a worm, or any malicious process, that runs without their knowledge, I submit that they also have no rights to the process. No responsibility means no rights.

So, if they have no rights to the process, there is no infringement against them when we neutralize it. If someone wants to claim that their rights were violated by our taking out the attacking process, then they should be held accountable for the actions of the process from its inception. They can't have it both ways.

If parents don't vaccinate their children, the state takes them out of school. If a dog consistently attacks people, the authorities put it down. If someone commits three felonies, they are put away for life. This is because the rights of the many outweigh the rights of the one.

And that is the way it should be.

© SecurityFocus Online

Timothy M. Mullen is CIO and Chief Software Architect for AnchorIS.Com, a developer of secure, enterprise-based accounting software.


TOPICS: Business/Economy; Extended News; Technical
KEYWORDS: computersecurityin; hacker; it; networks; security; virus; zot
Navigation: use the links below to view more comments.
first 1-2021-37 next last
A few days old, but still intersting.
1 posted on 01/17/2003 10:15:03 AM PST by AdA$tra
[ Post Reply | Private Reply | View Replies]

To: All

PLEASE SUPPORT FREE REPUBLIC

Donate Here By Secure Server

Or mail checks to
FreeRepublic , LLC
PO BOX 9771
FRESNO, CA 93794
or you can use
PayPal at Jimrob@psnw.com

Become A Monthly Donor
STOP BY AND BUMP THE FUNDRAISER THREAD

2 posted on 01/17/2003 10:16:52 AM PST by Support Free Republic (Your support keeps Free Republic going strong!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: *Computer Security In
http://www.freerepublic.com/perl/bump-list
3 posted on 01/17/2003 10:18:49 AM PST by Libertarianize the GOP
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdA$tra
It has been the "security experts" who have grouped as the opposition, some even with a level of condescension.

This is very surprising to me. I think what this gentleman is proposing is that (under circumstances defined by him) he should be allowed to get access to other people's computers and make changes of one sort or another. Killing one or two processes that he doesn't like. His judgement is good. He's trustworthy. He'll do the right thing.

And the security people oppose this? Unbelievable! (/sarcasm)

4 posted on 01/17/2003 10:34:01 AM PST by ClearCase_guy
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearCase_guy
Unbelievable!

Shocking!

Of course if I were king of the world........
5 posted on 01/17/2003 10:44:50 AM PST by AdA$tra (........I would be infallable.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: AdA$tra; Dominic Harr; Bush2000; TechJunkYard; rdb3
Just think what could happen if RIAA got hold of this tech and the legal permission to use it.....
6 posted on 01/17/2003 10:52:19 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 5 | View Replies]

To: AdA$tra
In order for this to work, I think, the firewalls would have to come crashing down everywhere. I know MY firewall doesn't allow any process to initiate contact with me from the outside. There's no way I'm bringing it down so that he can feel a little better.
7 posted on 01/17/2003 10:55:27 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdA$tra
Since the owner of a system has no responsibility for the actions of a worm, or any malicious process, that runs without their knowledge, I submit that they also have no rights to the process. No responsibility means no rights.

This is a specious argument. There are less invasive ways for the author to block a malicious process from entering his system.

8 posted on 01/17/2003 10:58:57 AM PST by HAL9000
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
This article is a thinly vieled anti war hit piece. Why should we go and snuff out a "malicious process" on a "foreign machine"? Nice try though.
9 posted on 01/17/2003 10:59:29 AM PST by Republic of Texas
[ Post Reply | Private Reply | To 7 | View Replies]

To: ShadowAce
Just think what could happen if RIAA got hold of this tech and the legal permission to use it.....

This is the context that put this on my radar. The things they might be allowed do in the name of saving the already failing music business.
10 posted on 01/17/2003 11:12:01 AM PST by AdA$tra
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce
Nobody should ever have the right to enter your computer without a court order. If there's a malicious process on your box, it should be shut down by legal means only.
11 posted on 01/17/2003 11:20:21 AM PST by Bush2000
[ Post Reply | Private Reply | To 6 | View Replies]

To: Bush2000
Agreed. This kind of technology is just another form of anarchy.
12 posted on 01/17/2003 11:31:41 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Bush2000
"Nobody should ever have the right to enter your computer without a court order. If there's a malicious process on your box, it should be shut down by legal means only."

Who says that it is legal or illegal?

Machines themselves have no rights. IF the owner of the machine claims a malicious process, then that owner would have the right for her machine to not be trespassed (and also would be a likely target for jail), but if the owner of the machine makes no such claim (the odds on favorite since making such a claim would send you to jail), then the rogue process in question has no legal owner.

Without a legal owner, and since machines themselves have no legal rights, who is to say whether or not someone being attacked by that rogue process can shut it down or not?

13 posted on 01/17/2003 11:44:46 AM PST by Southack (Media bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Republic of Texas
Might I ask you a question? What have you been smoking?
14 posted on 01/17/2003 11:45:54 AM PST by Karsus (TrueFacts=GOOD, GoodFacts=BAD)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Republic of Texas
No, it's not a thinly veiled antiwar piece. I can see where you might get that, if you really tried hard to connect the two, but this issue was being thrown around in IT circles long before we got here. Mullins just scared the IT community when he added a methodology to the previously purely philosophical debate.

Your reply is proof that you can read just about anything into anything, if you try hard enough.

15 posted on 01/17/2003 11:47:04 AM PST by Melas
[ Post Reply | Private Reply | To 9 | View Replies]

To: AdA$tra
if it's relentlessly attacking your network.

I'm not so sure about this -- and I've been there! Years ago, back in the days of Usenet and slow modems (and almost the entire network exchanged e-mail and postings via periodic dial-up connections). Somebody had requested a file, which I sent him (uuencoded -- sort of an attachment). The message was quite large. Something went awry with his university's machine and every 20 minutes a copy of this thing was flung back at me, eating up modem time and my employer's connection to the world.

This went on for days while I sent e-mails to the recipient, the machine's super-user, called various people at the college... Could I have killed that process remotely I would have.

But I'm still not convinced this is a good idea...

16 posted on 01/17/2003 12:09:17 PM PST by Eala
[ Post Reply | Private Reply | To 1 | View Replies]

To: Melas
That's right. It's piece about self defence and the second amendment.
17 posted on 01/17/2003 12:28:20 PM PST by Dust in the Wind
[ Post Reply | Private Reply | To 15 | View Replies]

To: AdA$tra
This is because the rights of the many outweigh the rights of the one.

No, author, it's because the rights of a one are being violated in the two cases other than the goobermint school example. The collective has no more rights than an individual.

18 posted on 01/17/2003 12:31:04 PM PST by jimt
[ Post Reply | Private Reply | To 1 | View Replies]

To: Southack
Without a legal owner, and since machines themselves have no legal rights, who is to say whether or not someone being attacked by that rogue process can shut it down or not?

Someone owns that box. Someone paid for it to be hooked to the net and someone is paying for the bandwidth. There are ways to get these folks' attention; if a process on the box is messing with other boxes, that alone violates the TOS of just about every ISP or colo that I know of... the box can be disconnected and remain so until it gets cleaned up.

OTOH, if you prefer to take the bull by the horns and invade another box and kill some processes, that action just puts you in legal hot water.

Fence it off and complain to the hostmaster and the ISP.

19 posted on 01/17/2003 12:57:42 PM PST by TechJunkYard (via Nancy)
[ Post Reply | Private Reply | To 13 | View Replies]

To: AdA$tra
Very interesting. Some thoughts...

By analogy - a rogue process (eg a worm) that has infested your machine and is irritating other machine owners is like a stray dog that gets into your yard and barks all night, keeping the neighbors awake.
(1) Its not your dog. (Its not your worm/process.)
(2) Its on your property. (It got into your machine.)
(3) You may choose to ignore the problem - its not your dog, after all. (Its not your worm!)
(4) But then the neighbors have the right to shut the dog up by calling animal control. (Hmmm...this implies there should be some form of, not "net police", but "net sanitation engineers" or "net pest control" that then should have the legal right to enter your machine and shut down the worm.)

Fact is, even if you have a tight firewall, the Nimda virus that has infested someone elses machine still causes your web server to write log messages even if you are not running a Microsoft web server. Thus it is consuming your bandwidth, and your disk space by flogging your webserver. Thus, like the neighbors irritated by a barking dog at night, you should have some recourse.

Perhaps that recourse is not to go bust into someone elses machine and kill the worm yourselft (climb over your neighbors backyard fence and shotgun the damn barking dog.) But it does look like we could use some kind of pest control organization that could contract with ISP's, whereby if you get net access from that ISP you agree to let the pest control onto your property (into your machine) to kill pests. And if you don't like that, then find some other ISP that provides net access (e.g. Ann Rand Web Access, Inc.) that has no such contract with a pest control company. Of course, I can see how in the future 5 or 10 years, ISP's that don't do active pest controlling will find their IP addresses blocked off from the web (can't send or receive email from there, pointless to host a website from there.)

Not saying I think this is the solution, or should be the solution, but it would work (while introducing problems like noncompliant ISP IP address ranges getting banned from general net access.)

Comments?

20 posted on 01/17/2003 1:13:58 PM PST by dark_lord (...never forget the law of unintended consequences...)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-37 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson