Feeds

ICANN freezes over fast flux fury

Botnet deadlock

SANS - Survey on application security programs

The non-profit group that oversees the internet's address system is seeking the public's help in deciding what to do about the growing use of a technology known as fast flux, which is used by cybercriminals to thwart take-down efforts, but which can also be used for legitimate purposes as well.

The Internet Corporation for Assigned Names and Numbers (ICANN) opened a 20-day comment period on Monday, the same day its Working Group on Fast Flux issued a report saying, essentially, that its members are deadlocked on key questions about how to proceed.

"Some members of the Working Group provided reasons as to why policy development to address fast flux is outside the scope of ICANN's remit, while others disagreed," the interim report (PDF) stated. "Gaining a common appreciation and broad understanding of the motivations behind the employment of fast flux or adaptive networking techniques proved to be a particularly thorny problem for the WG."

By now, most people who follow current security events know that fast-flux hosting is a way to bring resiliency to botnets used in criminal spam and phishing operations. By using peer-to-peer technology to rapidly change the location of the rogue network's master control channel, there is no single point of weakness for security response teams to bring down. Some of the world's biggest botnets, including Waledac, Asprox and the now-defunct Storm have used it to thrive, despite considerable efforts by white hats to stop them.

"When used by criminals, the main goal of fast-flux hosting is to prolong the period of time during which the attack continues to be effective," according to the report, which was six months in the making. "It is not an attack itself - it is a way for an attacker to avoid detection and frustrate the response to the attack."

But some members of the working group say fast flux has more beneficial applications. Content distribution networks such as Akamai use it to add and drop servers on the fly, perform load balancing, and reduce latency, for example. The report also cited a free-speech group called UltraReach, which claims to use fast flux to circumvent internet censorship by the Chinese government.

"Some solutions aimed at criminal activity could prohibit or constrain non-criminal activity that use similar techniques, or might not differentiate adequately based on the intent of the activity," the report warned. "Whether solutions to criminal fast-flux may constrain non-criminal services and/or the creation of new and legitimate services on the Internet are pertinent issues for consideration."

The report lays out a variety of approaches ICANN can take to limit the use of fast-flux hosts by criminal organizations. One approach involves the gathering and sharing of additional information about registered domains so that it's easier to identify those used in criminal fast-flux operations.

Others call for restrictions on the use of certain types of so-called TTLs, or times to live, which control how long the IP address of a given domain name is cached on a domain-name system server. Fast flux typically uses extremely short TTLs in an effort to constantly scramble the location of a botnet's control channels.

But all of that is purely hypothetical right now, as the 121-page report, prepared at the behest of ICANN's Generic Names Supporting Organization, makes clear. For now, the working group is still struggling to define precisely what fast flux is and whether it's something the group should assert control over. And for that, it's hoping to hear from you. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.