Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University...

29
Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull [email protected] Busan, Korea

Transcript of Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University...

Page 1: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

Insecured Proxies in Internet Abuse

Eur Ing Brian TompsettDepartment of Computer Science

University of [email protected]

Busan, Korea

Page 2: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

2

Analysis of Proxy Abuse

• Web Server since 93/94

• Large popular content (genealogy)

• 1-2M clicks month

• Same IP/domain

• 1999 saw first proxy requests

• Allowed a few, experimentally

Busan, Korea

Page 3: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

3

Proxy Server?

• Web Server – Port 80

• Not a proxy

• Scanned for Proxy ability

• Pages/robots indicated not open

• Added to lists of “open” servers

Busan, Korea

Page 4: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

4

Level of Intrusions?

• Measured general Intrusion– 100’s a day per machine– Machine compromise risk high

• Analysed bulk email– 1000s month since 1996– Open proxies main vehicle

Busan, Korea

Page 5: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

5

Origins of Proxy Abuse

• 1st Austrian Universities

• Russian/Ukrainian Origin

• CZ, CN, EDU.CA, IL– Russian Speakers

• Proxy Abuse Software in Russian found

Busan, Korea

Page 6: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

6

General Problem of Proxies

• Denial of Service– Tracking and Complaining– Scripts to assist log extracting

• Others noticed– APAN-JP Proxy Abuse Campaign

Busan, Korea

Page 7: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

7

The Proxy Abusers

• Initially Adult Oriented

• Hotel/Travel material

• Avoid local censorship/blocking– Education site seems inoffensive

• ISP load sharing

• Researchers cache timing experiments

Busan, Korea

Page 8: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

8

Counter Fraud

• Manipulate Click Counters

• Improving Ranking

• Polls, Talent Contest, TV Votes

• Make minority interests appear normal

Busan, Korea

Page 9: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

9

Pay-per-Click

• Web pages full of adverts

• Adverts Clicked Mechanically

• Advert Revenue Collected

• Organised Crime– Clicking Clubs– Software Promoted & Available

Busan, Korea

Page 10: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

10

The Advertisers

• Unaware of Fraud

• No expertise to control

• Disbelieving

• Minority aware and capable

• Many Bankrupted

• E-commerce growth harmed

Busan, Korea

Page 11: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

11

What is a Proxy?

• Application Gateway

• Carry Traffic for third parties– http proxy– Socks Proxy– NAT– Firewalls– SMTP– AnalogX, WinGate, Squid

Busan, Korea

Page 12: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

12

Proxy Trends

• Make the Unacceptable Acceptable– Counter Manipulation

• DSL connected proxies

• World Growth in Broadband– Political Prominence– Technical Naivety– Commercial Imperatives

Busan, Korea

Page 13: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

13

Proxy Implantation

• Worm delivers viral Proxy– Sobig

• Web server Implantation– Pornographic distribution

• Problem for Forensics– Criminals can claim virus caused it– Forensic Examination needs more rigour– ISP hindering public protection

Busan, Korea

Page 14: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

14

SuperZonda

• Latest proxy use• Done by DNS control with open proxy• Method:

www.doubtful-domain.zz– Web browser fetches page– DNS lookup => open proxy– Open proxy fetches page– DNS lookup return true IP– Can be layered

Busan, Korea

Page 15: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

15

Why?

• Obscures True Page Location

• Makes Organisation Appear Large

• Improves apparent responsiveness– Millions of effective web servers

• Enhances reputation of advertiser

• Diverts Complaints

Busan, Korea

Page 16: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

16

Why Worry?

• Paedophile Material

• Appear to be hosted at schools

• Fulfils their fantasy

• Combined with AnalogX at Korean Schools

• Damaged Reputation

• Needs Local Action – Lobby Admins & Politicians

Busan, Korea

Page 17: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

17

Further Hiding

• Bogons– Traffic from non-existent IP blocks– Identified by CIDR-report.org

• Zombies– Dormant IP block taken over by fraud– Documentation is forged

• Hides origins of Proxy Abusers

• Traceroute fooling Busan, Korea

Page 18: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

18

Regional Perspectives

• Korean Schools

• Japan– formerly free of proxies– Now broadband expansion

• Many proxies – worrying

• Malaysia, broadband proxies

• Thailand – educational proxies

• China – registration data & Language Busan, Korea

Page 19: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

19

Dirty Money

• Overseas Currency– Powerful draw– Naivety regarding issues– Causes Internet Routing Sanctions

Busan, Korea

Page 20: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

20

Solving The Problem

• Too many proposals – Too a narrow perspective– Vested Interests – hope to profit– Vendors only looking at their part

• Need holistic approach to abuse– Across applications– All Layers of protocol

Busan, Korea

Page 21: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

21

Layered Defence

• Protection at all Levels of Network Model

• Action by end users at application layer– Not fully protected– Need action at lower layers

Busan, Korea

Page 22: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

22

Physical/Datalink

• Secure Physical Access– Plug in cables– Wireless range

• Control Access by medium

• Control Access by Authorization– No free rides– Particularly important in wireless

Busan, Korea

Page 23: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

23

Network (IP) Layer

• Some IP not routed– RFC1918– Bogons– Zombies– Own policy based restrictions

• Manage this database

Busan, Korea

Page 24: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

24

Transport (TCP/UDP) Layer

• Only route to provided services– Restrict port 25 through mailhubs– Restrict port 80 to web servers– No incoming port 23

• Restrict dialups (in and out)

• Local Policy based restrictions– Manage this database

• Protects from worm propagation Busan, Korea

Page 25: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

25

Application Level

• Enforce Protocols/Handshaking

• Filter for application targetting– Web pages (e.g. browser attacks)– Email (e.g. browser attacks)– Viral content

• Checksumming (DCC)

• Content Filters (Bayesian)

• Local & User filters Busan, Korea

Page 26: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

26

The Layers

Transport

Network

Datalink

Physical

Application User Filter; Baysian; DCC; Format; Handshake;RFC-Ignorant

Service PolicyRFC-ignorant

Policy; Zombie;Bogons; RFC1918

Authorised

Connection -Medium

Busan, Korea

Page 27: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

27

Managing Layered Prevention

• Not a Single Point Solution– Distributed Responsibility– Network Managers– Customer Service– Clients

• No unmanaged Broadband

• Managed Software Install– Child Protection enabled

Busan, Korea

Page 28: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

28

Role of the Regulator

• Legislators are confused

• Abuse is immune to Legislation

• Regulators need to enforce best practice– Managed Broadband– Track Best Practice

• Regulate Registrars– More resources, better data

Busan, Korea

Page 29: Insecured Proxies in Internet Abuse Eur Ing Brian Tompsett Department of Computer Science University of Hull B.C.Tompsett@dcs.hull.ac.uk.

29

Conclusions

• National Interest to Regulate Registrar– Provide Resources– Operate as Internet Licensees– Identity Proved

• Internet Product Safety Regulation

• Regulate Network Best Practise– To protect the consumer

Busan, Korea