M$SQL is different from other infections mentioned, as it hits the entire net so quickly. The only thing keeping it in bay is widespread backbone filtering, which isn't feasible in the long term. Just like random source addresses, the only answer is edge filtering (preventing the bad packets from reaching the backbones). Worse, it only takes 1 infected host to re-infect the entire net in about 10 minutes. So, the entire 'net has to cooperate, or we'll see continual re-infection. Unfortunately, this is a cost that prevents pain to others, rather than self-inflicted pain. Another pollution of the commons issue. Johannes Ullrich wrote:
We are doing that with the reports we get for DShield. However, in particular with consumer ISPs, there does not seem to be too much effort to notify infected customers.
That is the problem! There are only 2 incentives that I'm aware of: 1) blocking routing to that AS (fast). 2) sue the AS as a nuisance (slow). It has been 3 weeks. Those that haven't implemented edge filtering are bad actors, and need an incentive to clean up their act.
On the other hand, how hard is it for an ISP to monitor port 1434 and call up a customer whenever there is a 'flareup'? I think this would be the easiest way to get rid of this problem. I see that port 80 / code red is harder as it essentially requires content inspection. But Sapphire should be rather easy to detect by watching outbound traffic.
I agree! -- William Allen Simpson Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32