doc_strange: (Agamotto got nothing on this.)
doc_strange ([personal profile] doc_strange) wrote2003-08-14 09:38 pm

Countdown

Shameful to say, I had to pull up a timezone map to figure out that... at 7AM Central time US, tomorrow, NZ will see the MSBlaster worm kicking off its flood at the windowsupdate.com website.

Upshot: companies with "just a few" infected hosts will see those hosts pound TCP SYN traffic at port 80 on windowsupdate.com as fast as they can. A single host can flood out a 100M ethernet segment, and ergo, just about any company's ourbound Internet capacity.

If you hadn't found all the infected hosts in your enterprise... you'll sure find them now.

Clever trick #1 that a number of people have discussed: The worm uses DNS to look up windowsupdate.com (which is, after all, dynamically load-balanced geographically with variable IP)... so no escape for MS -- Mr. Worm will find them yet! The clever trick is that companies with their own *internal* DNS can set up *.windowsupdate.com to resolve to 127.0.0.1. Infected hosts will just beat on themselves, causing no disruption.

The wave of worms activating their DoS mode will be highly reminiscent of the Y2K watch on new year's eve. Let's hope it's as uneventful.

MS

[identity profile] vokzal.livejournal.com 2003-08-15 05:41 am (UTC)(link)
You are far too gleeful about this.

hee hee

It rubs off.

Re: MS

[identity profile] docstrange.livejournal.com 2003-08-15 07:30 pm (UTC)(link)
Well... I'm gleeful like the weatherman who predicts the force-5. There's a horror factor mixed into the glee of being accurate.

Then again, it's about time. What will these companies do when the next fast worm exploits a 0-day?

[identity profile] cheesetruck.livejournal.com 2003-08-15 05:27 pm (UTC)(link)
windowsupdate.com is no more - oddly enough, this isn't causing the windows update program to puke. It's got backups it goes to.

Currently, windows update goes to something4.windowsupdate.microsoft.com, which is sitting on an Alkama server. Running Linux, apparently. Making the Linux people giggle with glee. I'm sure slashdork is covered with victory chants and all (although my local slashdork hasn't been annoying me with cries of victory, so maybe not.)

The interesting thing being the removal of the domain, and the fact that they DID do something to have it work if the domain dissapeared for whatever reason.

What I'll be interested to see is if the new wormages look to that, i.e. reverse the windowsupdate program code...