Security Incidents mailing list archives

Re: [RE: Nimda et.al. versus ISP responsibility]


From: Greg Dotoli <gdotoli () bizinfoservices com>
Date: 27 Sep 01 15:38:28 EDT

I am logging IIS and wrote a script to extract from the log the offending IPS
and return their DNS names. The number of residential DSL and Cable hosts is
close to 90 %. These worms are thriving in the non-protected home space. There
are too many unsafe ISPs.

Greg



"Adcock, Matt" <Matthew.Adcock () GSCCCA ORG> wrote:
<quote>
  I think we all agree that connecting an unpatched IIS machine to the
open Internet is acting irresponsibly. Most AUP's already prohibit
spamming, port scanning etc. (at least on paper). Why not include
"infection through negligence" as a reason for suspension? Maybe with a
reasonable grace period the first time. 
</quote>

I agree that the end administrator is ultimately responsible.  The ISPs
could also help by filtering this traffic.  It would take an infrastructure
upgrade that would end up costing the consumer, but I personally would be
willing to pay a little more.  Maybe give users a choice between being on a
filtered network or an open network?


----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com




----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see: http://aris.securityfocus.com


Current thread: