Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Worms Bug Networking Security

Handling Viruses in an Uncontrolled Network? 579

An anonymous reader asks: "Recently I've gotten a (volunteer) job looking after a small (approximately 500 computer) network, located within a large block of student flats. We've been having numerous problems with viruses over a few years. They spread like crazy on our network, with 100megabit connections in every residents room. Every so often they 'go off' and start a flood, which of course takes the entire residence network down. I've tried desperately to educate users on the virus problem, but those that are the problem don't care - they ignore every warning they get and just buy a faster computer to compensate for their systems sluggishness. As we only need two or three ping flooding computers to bring down the network it's hard to keep our network up whenever a worm starts its payload. What solutions have Slashdot readers came up with this and similar problems?"
"Keep in mind that I'm doing this on a volunteer basis, and that my own study time and personal life takes first priority. The residence isn't prepared to spend more money bringing help or a replacement in, which I can understand given that I pay them rent that I would prefer not to increase. I also don't have any control over the network infrastructure itself, just over our DHCP server. I can't force users to keep their computers safe, as I don't own the things - all it seems I can do is point them to the *FREE!* virus scanner and local Windows update mirror and urge them to protect their computer, and offer to help out those that need it - (although due to time constraints, personally helping out everyone in a 500 member network isn't a possibility).

I can also email off a request to have certain IPs dropped off at the switch, but those users have to come back online soon enough. Whenever someone is infected I try and sit them down and make them realize that keeping their computer safe is their responsibility, and they always seem very attentive whenever we're discussing when they get reconnected to the network, but soon after they'll be infected again."
This discussion has been archived. No new comments can be posted.

Handling Viruses in an Uncontrolled Network?

Comments Filter:
  • by Scott Lockwood ( 218839 ) * on Monday May 02, 2005 @05:51PM (#12413168) Homepage Journal
    Hm... Seems pretty simple to me.
    1. Have someone at the school make them sign something that says they will have virus protection and spyware protection on their machines, and that it be kept up to date. Failure to keep the machine clean can result in suspention of service at any time.
    2. When one of them has an infected machine that starts pinging the shit out of your network, Unplug them!
    3. Point to document mentioned in step 1 above when they start whinging about it.

    There see, that wasn't too hard!
    • by fembots ( 753724 ) on Monday May 02, 2005 @05:56PM (#12413238) Homepage
      Is 1. "Profit!!" ??
      • by BlueJay465 ( 216717 ) on Monday May 02, 2005 @07:50PM (#12414523)
        I have a better solution: become a BOFH, get your hands on a used LART, learn how to properly use it, and the students will be eating out of your hand in no time.

        If that doesn't work, have a little chat with the Admin, present the security scenario, and ask to yank the plug on any offending machine as a security threat. Corporations in the real world don't tolerate unsecure boxen, why should the school? Students will learn VERY quick not to cross you.
        • I have a better solution: become a BOFH, get your hands on a used LART, learn how to properly use it, and the students will be eating out of your hand in no time.

          s/out of your hand/with a straw/g if one applies the LART correctly.

          But seriously, I'd set up a DHCP server, hand out IP's through that, and when a machine misbehaves, nullroute the bugger and yank it's lease. The owner of said machine will come by eventually to complain that "Teh intarweb" doesn't work, and you can apply said LART to educat

    • Or slightly faster:

      1. IDS set to trigger on specific patterns and events (if you have been seeing this stuff on your network constantly, you'll know what to look for already.), you can even set some up free using FOSS.
      2. the IDS alerts then trigger shutting down their switch port and notify an admin. Depending on your switch port mapping database, you can even email the user.
      3. See Scott's post above for signature/cleaning cycle.
      • 2. the IDS alerts then trigger shutting down their switch port and notify an admin. Depending on your switch port mapping database, you can even email the user.

        Makes sense, but maybe you should email them BEFORE you pull the plug?

      • 2. the IDS alerts then trigger shutting down their switch port and notify an admin. Depending on your switch port mapping database, you can even email the user.

        It's not hard, but its harder to get right. Having IDS disable services without human evaluation/intervention has the potential to leave you open to an effectively self-enforced DOS attack.

        The classic example is the IDS that shuts of port 25 for a couple of minutes whenever it detects an apparent attack. All you've gotta do to effectively DOS that

      • by gabesk ( 682107 ) on Monday May 02, 2005 @10:40PM (#12415906)
        This is the method used at Texas A&M University, which I attend, for their residence hall network.

        We use netsquid, http://netsquid.tamu.edu/ [tamu.edu], which is essentially some code that ties into snort to provide automatic filtering by mac address and notification.

        It works quite well.
    • by Anonymous Coward

      Have someone at the school make them sign something that says they will have virus protection and spyware protection on their machines, and that it be kept up to date.

      The problem with that, is that nobody should care whether or not you have virus protection -- the thing they should care about, is whether or not you run viruses (and that they are noisy viruses that create traffic on the network). If a user doesn't have a policy that running viruses is ok, then that user doesn't need virus protection. S

    • Ah... nah. I'd say,
      "1. Write short document stating that in 'reparation for virus damage' computers would occasionally be confiscated when they managed to infect multiple computers connected to the local network
      2. Notify them of this agreement and make them sign it
      3. When one of them has an infected machine that starts pinging the shit out of your network, give them a 'first warning'
      4. Point to document in step 1 kindly, in writing, and create yourself an Ebay account.
      5. Repeat
      6. Profit and learn to laugh evilly."
  • No more access (Score:5, Interesting)

    by nizo ( 81281 ) * on Monday May 02, 2005 @05:52PM (#12413174) Homepage Journal
    Forcing people to have up-to-date virus/firewall software before they can even connect to the network would be a good start. Turning network connectivity off for offending computers/users for progressively longer spans of time after they infect the network seems like a good deterrent as well. I suppose posting the names of people who infect the network and bring it down might work, though the screams from the public beatings might make it hard for you to sleep at night.
  • by suso ( 153703 ) *
    If you have gotten a job administrating a network for 500 computers, then it is not an uncontrolled network. YOU ARE THE ONE IN CONTROL. If there is currently no policy for restricting usage of the network based on client problems such as ignoring viruses, then I strongly suggest that you write one up now and implement it. Start blocking the MAC addresses of the users that are the abusers. If you just sit back and don't take control, you will soon find that students have little added value of your netw
    • Put everyone on seperate VLAN, put a decent firewall up, and disable ports of problem users. Have a firm policy on what needs to be done to have a port reenabled that includes a fine to be reconnected.
    • by Knara ( 9377 )
      He's a fulltime student volunteering in his spare time. If the residence hall isn't going to spend the money for a real admin, he's not going to spend his time making up AUPs, monitoring switches, setting up NIC blacklists for the DHCP server, etc. He has no job to lose, and has no vested interest in keeping the students in the dorm.

      You know, RTFA is pretty commonly ignored, but I've never seen anyone not read the initial post. You sir, have set a new standard for stupidity.

    • by Wilk4 ( 632760 )
      He's right, YOU are in control. Don't be wishy-washy.

      Definitely cut people off when they are infected until they are cleaned up.

      Hit them in areas they care about and they'll start being more careful. Figure out where those motivational places are (disconnections, fines, losing IM privileges, etc.)

      Post a policy that has escalating punishments for each subsequent time they are infected, particularly if it's obvious it's their fault. This could be a rising fine, or that you don't reconnect them as f

    • by bazio ( 864132 )
      Nah, it's a volunteer position, no real power and no pay. The guy probably isn't even allowed to ban MAC addresses (I'd bet), and any policy he comes up with is probably just going to be taken as a "suggestion" by the unwashed masses. If possible, try to come up with a system for re-establishing connections that conveniently "forgets" chronic offenders. If they can't get their daily dose of SWG (or whatever the kids are playing these days), they'll come into line soon enough. Make network problems their
    • When he says "in control" he really means "I'm an unpaid volunteer with slightly better than normal user but less than janitor access".

      This is pretty sad - pretty much every college with residence hall networking has at least some sort of ResNet help desk. Considering that the school only pays 1/3 of the money for a workstudy student & can always find somebody willing to work for minimum wage, we're only talking about something on the order of a dollar per month per user to have an actual paid helpdes
    • by courcoul ( 801052 ) on Monday May 02, 2005 @06:11PM (#12413471)
      Amen to that! Or, it just may be that his post is only the ceremonial position of "official scapegoat" that takes the fall when the poop really hits the propeller blades... Short recipe for the cure (provided he IS the admin):
      • Get an extra PC on the backbone of the network, so it can monitor all the traffic. Anything bigger than a x486 is good enough, say with 128MB or more of RAM.
      • Install OpenBSD ( http://www.openbsd.org/ [openbsd.org] ) on it (most hardened free OS around, so the hackers can't take you down so easily).
      • Install SNORT ( http://www.snort.org/ [snort.org] ) on it. Configure to work as a network IDS and keep it up to date with the latest vulnerability/virus plugins.
      • Once SNORT gets wind of an infected machine, set it to do one of three things:
        • If you have the tech skills to set it up, have SNORT block out the switch port where the offending PC is plugged in AND send you a message. When the owner cleans up their act, reactivate the port and restore connectivity.
        • Else, have SNORT send you a message with all the details and YOU do the port blocking, if you can. The rest proceeds as above.
        • Else, have SNORT send you a message so you can bitch whomever has the capability to block the port. The rest proceeds as above.
      • If your authority is so puny that you cannot do any of these things, you could resort to sending out a mail to all the rest of the users of the network, and letting them know who the miscreant screwing up their connectivity is, and let peer pressure do its thing...
      Good luck!
  • DOOOMMMMED (Score:4, Funny)

    by Anonymous Coward on Monday May 02, 2005 @05:52PM (#12413181)
    You are DOOOOMMMMMED.
  • chemical castration might work
  • Simple. (Score:5, Funny)

    by Skudd ( 770222 ) on Monday May 02, 2005 @05:53PM (#12413186) Homepage Journal
    Write your own virus to send them massive payloads of anti-virus software. :P
  • by Anonymous Coward on Monday May 02, 2005 @05:53PM (#12413189)
    Have you considered spankings? At least for the hotter co-eds. After all, they should know better.
  • 3 Strikes policy? (Score:5, Insightful)

    by fahrvergnugen ( 228539 ) <fahrv@NospaM.hotmail.com> on Monday May 02, 2005 @05:54PM (#12413198) Homepage
    It sounds like you've been completely neutered. If at all possible, talk to the administration about instituting a "3 strikes" policy. That is, if someone's computer causes a network-wide issue 3 times, their network drop stops working for the remained of the year.

    That'll clean their acts up in a hurry, or at least make your life easy.
    • I prefer a different 3 strikes policy. If you cause a network-wide issue more than once, you get 3 strikes of a bat upside the head. Haven't had many problems with people causing the third issue.
    • Re:3 Strikes policy? (Score:5, Interesting)

      by lakeland ( 218447 ) <lakeland@acm.org> on Monday May 02, 2005 @06:15PM (#12413526) Homepage
      Remainder of the year probably isn't smart in an environment that previously has seen no enforcement. I'd be using a sliding scale with punsihment at each stage in order to get people used to the idea that you are serious.

      Something like: first offence, 24hr ban; second offence, 7 day ban; 3rd offence, 1 month; 4th offence, one year and an email to all 500 with the photograph of the person who has been stuffing up their computers.

      Once you've got people used to the idea they will be punished you can swap to something like the 3 strikes policy. But at first you're going to get idiots testing you, and so two warnings is too soft while a year-long ban is hellova hard for a first punishment.

      There are alternatives of course. Install an 802.11g network in parallel with strict rules. Disobey them once and you get a stern warning, twice and you're banned for life from it. That way you'll naturally see people migrate to the network which 'works' without the fight with idiots.

      Oh, I'm assuming this is targetted at teenagers at or near college level. If you're dealing with mature adults then it is much easier.
  • Move out? (Score:5, Insightful)

    by Eezy Bordone ( 645987 ) on Monday May 02, 2005 @05:54PM (#12413200) Homepage
    Seriously, volunteering to be THE on-site tech support for 500+ users is insane, especially since you're not even getting a discount on your housing. Quit the job or move out so you can worry about your own network.
  • Ban them (Score:5, Insightful)

    by nadamsieee ( 708934 ) on Monday May 02, 2005 @05:54PM (#12413205)
    Isolate the computers that are spreading the virus and shut down their access to the DHCP server based on their MAC address. Then make the reconnect process as painful (yet educational) as possible. >:)
    • Re:Ban them (Score:3, Insightful)

      by morcego ( 260031 )
      I'm sorry, but I always thought that painful is by itself rated educational: "Don't mess with the netadmin".

      Serious now, I have been administering networks for about 15 years now (a lot less than many people on /., I know), but one thing is for sure. Unless your userbase respects you, there isn't anything you can do. The way to institute that degree of respect will change from network to network. Sometimes it takes a message from a company director, sometimes it take imposing fines for people breaking the
  • Easy fix. (Score:3, Interesting)

    by baryon351 ( 626717 ) on Monday May 02, 2005 @05:54PM (#12413207)
    > What solutions have Slashdot readers came up with this and
    > similar problems?"

    Easy. Disconnect them at the first sign of virus trouble. Don't let them back until they can prove they've fixed it.

    When their fresh new computer lasts an hour on the network before you pull it down, they'll soon decide to fix it.
    • Easy. Disconnect them at the first sign of virus trouble. Don't let them back until they can prove they've fixed it.

      That's not an easy fix at all. Who are you kidding? If you had to spend less than 5 minutes a week with each computer that's already over a 40 hour work week right there -- and I doubt any solution is that quick. You're not understanding the numbers involved here -- and that's not including travel time, plus being able to meet then on their schedule. Ain't going to happen with student us

      • Re:Easy fix. -- NOT! (Score:3, Interesting)

        by argent ( 18001 )
        Disconnect them and have them pay YOU for a support visit to get decontaminated and reconnected for enough that it's worth YOUR time to do it. Present that to whoever you've volunteered your time to as the only workable solution... and either walk when they say no, or watch the problem fix itself as the word gets around.
  • by FyRE666 ( 263011 ) * on Monday May 02, 2005 @05:55PM (#12413214) Homepage
    If you can't put the bad users on a slow switch, and force them through an even slower proxy to make their life hell, then see if you can't organise a minimum disconnection period. Say 10 days or so to reconnect the idiots who keep getting infected. Since you control the dhcp server, you could filter them out by their mac address so they can't wander over to someone elses room to connect. Yes, they could probably circumvent this with a little knowhow, but let's face it, an idiot who's managing to become a virus writer's bitch every week isn't likely to have too much in the way of technical knowledge...
  • Regarding revenge might help you come up with, shall we say, colorful solutions to your problem. Either that or figure out a way to have all of their papers "lost" due to the virus;-) In this regards, I would suggest that you channel your inner BOFH.
  • solution (Score:2, Informative)

    by ShinGouki ( 12500 )
    myswitch> (enable) set port disable
  • Wasting your time (Score:5, Insightful)

    by ibpooks ( 127372 ) on Monday May 02, 2005 @05:55PM (#12413237) Homepage

    It really sounds like you're wasting your time.

    You don't have control over the users, the machines, or the routers; so what the hell can you expect to do?

    Sounds like the best option is to unplug the offending machines from the patch panel until they can demonstrate they are virus-free. Although that is likely not a viable solution if these are paying customers.

    • by Knara ( 9377 ) on Monday May 02, 2005 @06:05PM (#12413379)

      It can be viable if the students had to sign an AUP from the campus IT department when they moved in (which I get the feeling is fairly common these days on major campuses). Worked at a place where they just turned off the switch port of offending machines, and then if the student wanted to get access back, they had to call in to the help desk and go through the process of setting up a schedule technician visit, which may be pretty far off depending on the time of year.

      Was kinda hairy the first couple weeks of fall semester for the techs and the helpdesk (which will happen no matter what), but very few repeat offenders.

  • Stop volunteering (Score:5, Insightful)

    by lelitsch ( 31136 ) on Monday May 02, 2005 @05:56PM (#12413244)
    Seriously, it seem like this is an unsolvable problem and neither the users nor the administration seem to want to spend any effort in fixing it. So the sooner you realize that there is nothing you can do, the better. Help out with the IT system at your local Humane Society, womens shelter, or similar instead.

    Oh, and get your own DSL or cable modem.
    • What he said. You are being used. In the real world, people get paid $60k a year and up to deal with these kind of nightmares, and they get given the authority to actually solve the problems.

      As long as you keep "helping" people kinda-sorta fix the problem, the people who are actually in a position to fix it for real will keep putting off the pain of actually solving it.

      Get your own $20/month DSL connection, refuse to answer any more questions, and go concentrate happily on your studies.
  • Simple. (Score:5, Insightful)

    by grasshoppa ( 657393 ) on Monday May 02, 2005 @05:57PM (#12413259) Homepage
    You need more power. Otherwise you will fail in your job ( unless you take to violence ).

    Students need to be kicked off the network until their computers are clean. If they are kicked off x times, they are off until they come to you and sign a form saying they understand how to keep their computer clean. y more time(s), they are off for the rest of the semester.

    Simple, effective. You will need a couple decent switchs capable of shuting down ports ( or you could just yank the wire ).

    If you don't have this level of power over the network, get rid of any access you do have. The higher ups only want a scape goat.
    • Re:Simple. (Score:3, Insightful)

      by riptide_dot ( 759229 ) *
      You need more power. Otherwise you will fail in your job ( unless you take to violence ).
      Students need to be kicked off the network until their computers are clean. If they are kicked off x times, they are off until they come to you and sign a form saying they understand how to keep their computer clean. y more time(s), they are off for the rest of the semester.
      Simple, effective. You will need a couple decent switchs capable of shuting down ports ( or you could just yank the wire ).
      If you don't have this le
      • I couldn't agree with you more about the idea, but the main thing he needs is backing from the providers of the service (the same ones that collect the rent money), in the form of a written policy

        Agreed. Written and agreed to by the customers.

        You can't kick people off of a network they're paying for unless you have it in writing that those are the consequences of an infected PC on the network., even though it's unfair to those with uninfected PCs

        Sure you can. If there is no agreement in place, you c
    • Re:Simple. (Score:5, Insightful)

      by jemenake ( 595948 ) on Monday May 02, 2005 @07:11PM (#12414125)
      You need more power. Otherwise you will fail in your job
      Just about all of the posts thus far have been along the lines of "Pull the plug on the people who don't care until they *do* care.... IF the administration will let you."

      Here's an alternative to the "IF the administration will let you" part. Make use of the fact that nobody else really understands what it is the wizard (you) does behind the curtain:

      Implement whatever service termination solution you feel necessary (whether by writing/downloading some automated system, or by doing it manually yourself). When the offender calls to complain, *don't* say that they were shut off administratively. Tell them that the massive traffic from their machine "overloaded" the port they were on (tell them it's kinda like a circuit breaker on house wiring).

      They'll say that this never happened before. Tell them that they've got a newer, more-aggressive virus.

      They'll ask that their port be "reset". Tell them that, due to all of the machines that they helped infect, and to the convoluted process for "resetting" a port, there's a backlog of a couple days before you can get their port reset.

      Maybe they'll ask if you can just plug them into a different port. Tell them that they're all maxxed out.

      At some point, Administration might ask why this is happening. Tell them the same thing you told the users... new, nastier viruses. They might ask what new equipment they could get to fix the problem. Tell them that the BFS-9000 can do it... but it's very... very expensive. It would be much cheaper for everyone to just use virus protection.
  • by strredwolf ( 532 ) on Monday May 02, 2005 @05:57PM (#12413264) Homepage Journal
    Just reconfigure the guys that keep spewing to ether deny access, or return that the computer's IP address is 127.0.0.1.

    When they come in complaining, babysit them at their computer.
  • Go around with a pair of wire clippers and cut the network cable of those with affected computers - refusing to fix it for them until they get their computer sorted out.
  • Stage virus drills (Score:5, Insightful)

    by bigtallmofo ( 695287 ) on Monday May 02, 2005 @05:59PM (#12413293)
    Send them emails with executable attachments. If they click on the attachments, ban them from the network for a week.

    Send these out frequently. Soon they'll instinctually hit the DEL key when something with an attachment comes in.

    • This is the most ingenuous solution i've heard in a long time! :D

      "License agreement.
      By clicking on this button I agree that I
      blablabla blablablabla blablablabla blablablabla
      blablabla blablablabla blablablabla blablablabla
      blablabla blablablabla blabla agree to have my
      computer suspended from the [insert network here]
      for a week ablablabla blablabla blablablablabla
      blabla blablablablabla blablabla blablablablabla

      [I AGREE]
      "

      But frankly, I think setting up their network settings to have a "babysitter" firewall
  • Good steps... (Score:2, Informative)

    by Anonymous Coward
    First off - something that EVERYONE should be doing - make sure spoofed packets dont leave your network. This helps you, and it helps those of us (like me) who run websites who are frequent victims of DDoS attacks - you just may reduce my DDoS from 3Gbit/sec to 2.9Gbit/sec :)

    So... you know your internal addresses. You know your external addresses. At the external firewall, block all packets going out that don't have a matching source address in the header. Most all virii nowadays use spoofed headers to
  • You should look into trying the following:
    1. Super Gluing an RJ-45 connector into their local network socket or into the socket on their network card.
    2. Removing the infect item (hard drive) from their computer with a power saw.
    3. Emptying a can of Raid into their (running) computer and tossing in a match.
    4. Taking the infected machine to the roof of the dorms and tossing it over the edge to air it out a little.
    5. A double-barreled 12 guage shotgun with double-ought buckshot should clear those virus ri

  • Users that participate on the network and yet cannot account for their computers' actions should be banned.

    Default out: Virus/Malware scanners that can register with an isolated server the version and state of the user machine can participate. Until then, they are banned. Simple enough. I think some of the enterprise versions do just this.

    In a DIY world...have users sign an agreement putting conditions of their connection to accounting for network usage. If you are caught with malicious payloads, you
  • Egress filtering (Score:5, Informative)

    by MoogMan ( 442253 ) on Monday May 02, 2005 @06:02PM (#12413319)
    The idea is simple: Egress filtering.

    Strict policies on outgoing traffic for untrusted networks is essential.

    I would suggest a default policy of something like www, ssh, msn/aim im, p2p programs (possibly, depending on the uni's rules and regulations).

    Providing you have a mechanism for giving the students access to other ports when necessary, then there should be no problem enforcing a strict egress policy.
  • NetReg (Score:5, Informative)

    by DA-MAN ( 17442 ) on Monday May 02, 2005 @06:02PM (#12413324) Homepage
    I also don't have any control over the network infrastructure itself, just over our DHCP server.

    With this you have all you need to run a NetReg [netreg.org] server within your infrastructure. With this you can allow users to register their machines automatically. Any user with a virus or other such malware gets their dhcp entry deleted, and they are on a private network that goes to where you define. I would allow antivirus sites, antispyware sites, and windowsupdate only (or better yet, a local mirror).

    Have them send an e-mail to user@host once this is complete and you can re-activate their lease.
    • Re:NetReg (Score:5, Informative)

      by vco123 ( 576139 ) on Monday May 02, 2005 @06:44PM (#12413822)
      1. With DHCP and Netreg, you do control the network. Keep your registered leases short ( 2 hrs ).
      2. Be sure to disable external DNS calls at the router ACL, to force people to use Netreg.
      3. Run 2 instances of BIND with Netreg and selective DNS forwarding to allow Windows Updates, LiveUpdate, IT Support and Spyware. ( see Netreg-l from last August).
      4. Bump infected computers out of registration, so that they can't phone home as easily. Alternatively, use groups with ISC DHCP to force an infected MAC to use the Netreg bogus DNS to "quarantine" them.
      5. If you can, ask the network dudes to disable 25,135,445/tcp for your unregistered IP ranges. That'll limit the infected PC a bit.
      6. If you start to see a virus frenzy, shut ports off fast. It'll save time later.
      I've run a 4000 computer RezNet this way for 4 years.
      As to infected computers, I'm working on a Netreg extension that includes a "Your're infected" group. It's like being unregistered, but DNS forwards to a virus notification page.
  • by Nom du Keyboard ( 633989 ) on Monday May 02, 2005 @06:02PM (#12413329)
    Recently I've gotten a (volunteer) job

    You're doing this for free? I wouldn't even do this job for pay -- unless it was something like Bill G's salary. You will never educate kids who will click on anything that promises free porn, download and use every ad/spyware infested P2P program out there, and not think it's their fault because they can't be bothered to even update their anti-virus.

    The system will be in trouble continuously because even if most were actually responsible users, it only takes a few irresponsible ones to mess it up for everyone, and it will always be your fault!

    And if, pray tell, things actually do run perfectly for a few hours, or days, don't expect any thank you's from that ungrateful crowd.

    And as you said, you're not even getting paid for this. Bet this means you have effectively No Authority to fix anything or punish anyone otherwise. Try to kick off a multiple repeat offender and guess whose ass ends up in a sling when they go whining to the university president.

    Have fun!

  • A user not willing to fix their problems should not be allowed to use shared resources where they can cause problems for others. If you're going to enforce any policy and actually try to fix things, the user issue must be managed first. It's not like you're going to deploy McAfee EPO or something on a student residence.

    You could also try choking those ports down to dialup or slower speeds until they fix the issue, but something tells me they're not going to fix the source of the issue in any case.
  • This sounds like my living arrangement. Except when the apartment network got hit the first time, they turned it all off and sent a tech out to patch people's computers and dis-infect them at $20 a pop.

    Easy money for them.
  • Block MS ports (Score:3, Informative)

    by rdejean ( 150504 ) on Monday May 02, 2005 @06:04PM (#12413361) Journal
    Students in our dorms have no need for Microsoft ports, which is the primary reason worms can take down the network. So i block port 137,138,139,445 at the switch port level.

    Granted this doesn't solve the virus problem on the computer, but it sure does prevent it from taking down the rest of the network.
  • strlen mentioned in another topic [slashdot.org] that there's an OpenBSD-based firewall product [forbes.com] which sounds like it may cut down on the task significantly. The upside is that it will save you tons of time in managing a network of that side -- I'd hesitate to call it a "small" network. 500 machines sounds like a full-time job depending on how much hand-holding you do. The downside is that it's about a $20K product, though that works out to be a bargain at $40 per station. However, it certainly sounds interesting and m
  • by SiliconEntity ( 448450 ) on Monday May 02, 2005 @06:05PM (#12413382)
    "those that are the problem don't care - they ignore every warning they get and just buy a faster computer to compensate for their systems sluggishness"

    You're not looking at this realistically. The statement above betrays your frustration. You see the users as stereotypes of carelessness and stupidity.

    So they buy faster computers when they get infected? And how often does your typical student buy a faster computer? Every day? Every week? I think not! Yet, how often do people get infected? From the way you describe the problem, it is quite often.

    Users already have incentives to keep their computers virus free. Nobody likes getting a virus. It slows their computer down and makes it hard to use. They can't just run out and buy a new computer! Your harsh stereotyping is ignoring the reality of what students face.

    So, the first step is to get a better understanding of the problem. Why not try talking to some users? Not just your techie friends, talk to the average person who knows only how to turn it on and run the few programs they use? I'll bet you'll find out that the real reason for the problem is not that people don't care, because they can just buy new computers! It is because they don't feel confident in their abilities to download, install and run the AV software, and to continue to use their computers with whatever small operational changes the AV software may impose.

    I can't tell you for sure what the solution is, but the first step will be to understand the problem better. Resorting to stereotypes of users as malicious or uncaring is only going to take you farther from the solution.
  • Paging IT Department (Score:2, Interesting)

    by iridium18 ( 205856 )
    "I also don't have any control over the network infrastructure itself, just over our DHCP server."

    Well someone has control over the network infrastructure itself, and it's their job.
  • by Mr. Flibble ( 12943 ) on Monday May 02, 2005 @06:06PM (#12413392) Homepage
    Simple as that. If they are damaging the network then they are a threat to the network and even if they buy a super fast machine to compensate... yippee fucking do.

    Anything that damages the network as a whole must be blocked. Revoke their DHCP access, or something similar (I don't know how the network is routed, so I can't give a more detailed answer.)

    When they learn to not get infected, then they can use the network again. It is that simple.

    However, if you are in a position where you cannot do this (then I would walk away personally...) then look into using something like Hogwash [sourceforge.net] (Those guys need some devlopment help BTW (Hint Hint Slashdot community - Hogwash is a wicked project...))
  • There's this really kewl little script out there... I can't remember the name of it, but basically you enter the IP of a system on your local LAN and the system completely and totally freezes up. Turn it off and the system operates like it just froze... no data loss, nothing. So, I suggest a simple Linux box running NTOP. Find the highest traffic users during the outbreak, and DDoS 'em. Even rebooting won't help them. :) Of course, there's many tools out there that incorporate NTOP, Nessus, NMAP, etc to fin
  • by Ktistec Machine ( 159201 ) on Monday May 02, 2005 @06:06PM (#12413394)
    First, if you have a core of machines you know to be well-configured, set up your DHCP server to give out ip addresses to only those machines, by MAC address. Anyone else who wants to use the DHCP server will need to convince you that they have antivirus software installed (and configured for automatic updates). Once they've convinced you, you add them into the list of MAC addresses recognized by the DHCP server.
  • Guns. Lots of guns.
  • You have 500 computers, and each user could be a customer for a local hardware/software reseller.

    See if you can get a deal on a router for each computer (close to cost). Students who install will probably get few if any viruses. At least you'll help those willing to do a bit of work (they'll probably also have virus scanners installed).

    I agree with the other posts - users should have their network drop disconnected if their machine is spewing viruses. They can reconnect once their OS is installed, once th
  • If you only control the DHCP server, and cannot even force people to use the DHCP server you do not have a chance.

    Try to get an old Linux box and set it up as router. Then install PortSentry on the this router. Every virus will immidiately attack the router and portsentry will then cut it off.
  • You could implement a (hopefully automated) means of identifying a compromised machine. A single PC on listen-only mode with Snort [snort.org] -- perhaps with a few Nessus [nessus.org] scans -- might do the trick.

    Once you have monitoring capabilities, you can get to work on responses. You have a few options, depending on the available resources:

    -- Put up a public notice somewhere (on a webpage, network status screen, whatever) indicating that the current network outage is a result of Joe's ineptitude. (ie use peer pressure t
  • I'm assuming that you can detect which computers are flooding or somehow clogging the network (this can be done without viruses too, of course). How about limiting their bandwidth to, say, 100kbit/s or less if they trigger some preset criteria? That way, they will be able to do whatever work they need to do and they won't bother other people too much. If they don't mind a slow computer, then they shouldn't mind a slow connection either.

    On the other hand... you do have some responsibility for (cracking) att
  • It really depends on how much you have control over.

    If you live in Cisco land, and you have switch/router access, you can use "private vlans" to stick every client on its own /30 network. The only host they can talk to is their default gateway. It's a major infrastructure change and it eats a lot of ip space, but its worth it if your network is chaos.

    There's a slick product called Perfigo that was bought by Cisco that will put new clients on a 'quarantine' vlan while they get scanned by Nessus. Once it
  • Here is the solution:

    Set up a kill bot. Let it search for unupdated computers, and then, taking advantage of old vulnerabilities, remove the machines from the network by writing over the hosts file or something. Make everybody sign that they understand about the bot's existence before they can connect to the network, and you're in the clear.
  • by rewinn ( 647614 ) on Monday May 02, 2005 @06:13PM (#12413502) Homepage

    Of many possible technical & organizational approaches, which you employ depends on what is your goal.

    1. If your goal is to be a nice guy who doesn't bother anyone and gets all your studying done, then the most practical technique is to quit volunteering.

    2. If you're a music or poly sci major who is not really interested in network administration as a career ... then cut your losses ... this sort of volunteering isn't really helping.

    3. But if your goal is to get out of college with something helpful to put on your resume, then treat this like a professional opportunity! Show that you can do a top-notch job of network adminstration by learning the techniques, putting in the time including the hard-nosed ejection of malefactors, and allowing for that time in your study schedule.

    After all, when you get your diploma, how many of your competitors are going to be able to say, "I managed a 500-node network, achieving X% of whatever metric most impresses employers.Given the choice between someone who got all A's and someone who accomplished something useful while getting decent grades ... who would you hire?

  • by g-san ( 93038 ) on Monday May 02, 2005 @06:20PM (#12413575)
    Have you figured out exactly why a few infected computers is bringing down your whole network? I could see if they are scanning local subnets, you would have a lot of broadcast ARP packets. If they are scanning remote network IPs, you may be filling up a cache on the outbound router. Are you sure you don't have a few people just playing with NMAP? Is it inbound traffic or outbound? Identify the nature of the traffic when the network implodes, look for a pattern, and see if you can mitigate that. Use ethereal for that.

    This is a *switched* network isn't it? Hopefully yes, and with a firewall also. I really can't see why someone would need inbound tcp/135,137,138,139,445,1025 or udp/135,1026-1029 nowadays. That would prevent malware that is not spread by email or Explorer. I won't recommend you dictate the browser or email client people use, but it's a possibility to have a outbound web proxy not forward any requests from IE.

    You might also want to look into snort, you could at least have it alert you when the problem starts, or shut down ports, but sounds like you have not had much luck with that. Note rather than drop people off the face of the earth, at least make sure they can get to antivirus sites and microsoft updates. This is tough without access to the infrastructure but would improve things.

    Another suggestion is if you do not have alot of room to room traffic, and you do not have a 100mb conenction to the net, configure all ports to 10mb. At least that way it takes more than 10 users to flood your 100mbit backbone. And users accessing the net are always throttled by your outbound connection so they won't know the difference.

    I assume you volunteered for this because you like like this stuff. Note that if you *did* spend more time on this problem than your schoolwork, and came up with a solution, you might not even need to finish school.
  • by Sweetshark ( 696449 ) on Monday May 02, 2005 @06:27PM (#12413632)
    Make public who got banned and how often. These guys will start to take care of their security if they get questions like "Surfing porn again, Dude?" and "Why did you get banned _again_ this month? Didnt you just requested access again?"
    Others will get aware of the issue too and might be more careful.
  • I'm a student at the University of Waterloo (Ontario, Canada), and they have a simple solution.

    When you get to residence, you sign a form that says you agree to monitor your computer, keep it clean of viruses, up to date with Windows update, et cetera. The terms are made very clear in it. No agreement, no use of the university network.

    On your first offence (banned p2p, virus, anything like that), your network drop is disabled until you pay $25 (Canadian dollars; cue jokes about 2 cents USD) and sign a form acknowledging what you did wrong and that you will take action to avoid it in the future. In addition you have to clean up whatever triggered the disconnect in the first place.

    Second offense? Disconnected for the rest of the term. That's the end of that.

    Hope it helps!
  • Quarantine VLAN (Score:3, Interesting)

    by realyendor ( 32515 ) on Monday May 02, 2005 @07:07PM (#12414084)
    Assuming that clients are on a switched network, move the infected systems to a quarantine VLAN whose gateway IP is the same as the net they came from, but whose outbound requests are NAT'd instead of routed.

    Then, use IPTABLES on the gateway to redirect any request on port 80 to a page that says, "You're infected--clean your system!" Maybe even provide them access to the tools necessary to clean their system via that same webpage.
  • Ok.... (Score:5, Insightful)

    by Audacious ( 611811 ) on Monday May 02, 2005 @07:11PM (#12414123) Homepage
    We've heard from the:

    1. "It can't be done" crowd.
    2. "Be tough about it" crowd.
    3. "Go behind their backs" crowd.

    and others....

    How about this:

    1. Get everyone's e-mail address so you can send all of them e-mail at the same time. How do you do that? Ask them to e-mail you - that's how. Of course, disinfect anything they send you because they probably will have a virus or two.

    1a. How do you get all of them to send you the e-mail? Go buy some of those blank business card sheets (Avery I believe makes these), print up your message, get someone to help you break them apart, and then just tape them to each person's door. In this way you: 1)Don't have to talk to them, 2)Don't try to force them to do what they don't want to do, and 3)Can do it on your own time (like on a floor-by-floor basis). Cost: Probably about $10.00.

    1b. Your message? It should be something like:

    Dormitory SysAdmin needs your help!
    We need your e-mail address as we
    are trying to remove viruses and want
    to be able to keep you informed. Thanks!
    myemailaddress@thedorms.edu

    1c. Put notices on doors leading into the dorm and/or bulletin boards also asking for e-mail addresses. If you can, have someone hand the things out to people as they come in and out of the dorms.

    2. Set up a blog where everyone can meet and talk about problems. Use the e-mail addresses to send your notice out about the blog and how to access it.

    3. Set up appointments with people to meet with them to show them how to protect their system from viruses, ads, cookies, and other problems.

    Ok, let's say you've gotten some responses and want to start to go to other people's rooms to help them out. You want to:

    4. Use the scheduler built in to every operating system currently in use (ie: Mac OS X, Windows98se and up, Linux, BSD, Solaris, etc...). For those OSs which are older (although I can't see anyone currently in college using an Apple ][+ or even Mac OS 9.x or earlier) download and bring with you some sort of a scheduler. (Even the Apple //gs had a CRONTAB program!). Set their machine up so it automatically, every day, trys to download the latest and greatest updates for the OS, SpyBot, AdAware (or whatever you use), your virus protection program, etc.... The MOST IMPORTANT THING THOUGH - is to always explain what it is you are doing to the person's computer. Don't just dump a bunch of things onto their system. Bring a flyer that explains what it is you are doing and why. Set their system up so they can win and so they don't have to rely on you to be there to make everything function correctly. All of the virus/cookie/ad checking software out there can be set up to function on its own. Some of them (like most virus checkers) have their own scheduling software built in.

    4a. NOW! Here is the important thing! Set the virus/ad/cookie (or VAC for short) to AUTOMATICALLY e-mail you with the results. This too can be done via the scheduler. Give the automatically generated e-mail a special header (like [VIRUS|AD|COOKIE] REPORT FOR ROOM X). There are e-mailer programs for all operating systems which run from the command line. So just make a little batch program/shell script to create your report and e-mail it to you. Again, write it all down in the flyer you are going to give them so they don't freak when their system suddenly starts doing things (like checking for viruses or sending e-mail).

    4b. Most virus software's report will read "VIRUS FOUND" and then tell you where and when the virus was found. Write yourself a short Perl/PHP/C/ script which will read these e-mails and sort out which one have viruses and which ones don't have them. Since you made the title have the room number on it - you automatically know who is having problems. So you can e-mail them back and set up a time to go over to fix any problems they might be having. Further, you can produce statistics on where the greatest problems are and post these fi
  • by visionsofmcskill ( 556169 ) <vision@NOSpam.getmp.com> on Monday May 02, 2005 @08:08PM (#12414668) Homepage Journal
    The biggest question here is how much do your users need to connect to each other, and if they need static IP's.

    The most powerfull goal you have here is to segment your network.

    You can do this strictly through the DHCP server by using several scopes.

    Pass out the following IP's and give your main gateway multiple IP's, or have a machine act as proxy (with multiple gateway ip's for your lan's).

    With enough segments, you can isolate problem PC's down to groups of ten or less depending on how you break up your private (or even public) ip's. This will make the majority of others users on your network unroutable to malicous virus's.

    Just make sure your gateway (the one with all the .1 IP's for each segment) doesn't route traffic through itself to the other segments.

    Gateway = 172.30.1.1, *.2.1, *.3.1, *.4.1, etc....

    172.30.1.1 255.255.255.0

    172.30.2.1 255.255.255.0

    172.30.3.1 255.255.255.0

    172.30.4.1 255.255.255.0

    etc........

    If you have a minimal budget, and your users dont need public IP's, you can buy a bunch of SOHO routers... for about 10-15$ a piece.... 300$ can get you 20 linksys's....

    put 25 users on each linksys (with the WAN ports connected to your gateway).... and your users cant directly attack each other (except for the smaller networks behind the linksys's.

    If your users have no need at all for direct access to each other... just set out your scope as 255.255.255.255.

    192.168.1.1-255 / 255.255.255.255 gateway: 192.168.1.1

    now you r users can only reach the gateway and themselves.

    As to email virus's, with DHCP you can force traffic to move through any machine you like, and set up a proxy between your "real" router and the network.... that proxy can filter port 25.... looking for viral email.

    These solutions arent perfect, but they will greatly slow down propagation across your network, allowing you to respond much faster to problem children without having one bad computer infect everyone else. --VISION

  • If all you've got is control of the DHCP server, your hands are pretty tied. I would suggest setting up fixed leases and BOFH'ing students into submission. Kill the lease of infected machines, then bring 'em back once the infected system is clean. You don't have to be a dick about it, just bring the system back on at your leasure. Of course, you've got class all day and an exam tomorrow, oh and you're going home for the weekend...

    Make it clear in polite, simple terms what the users responsabilities are, what will happen if they don't keep their system clean, and why you have to take the action you do. Maybe put together a standard "so you fucked up your system and got kicked off the network" sheet. Educate as much as possible. Yes it feels like you're talking to a wall. But the users will either evolve (get sick of being off the net) or die (find other ways of getting their computering needs met.)

    Some people have suggested Microsoft SUS. You need to be able to apply a group policy, or make registry changes on the remote machine. Since you're not inchage of the domain controller, this is a moot point. Also, SUS only works on XP and 2000, so it may not help all users.
  • Try Plan B (Score:3, Insightful)

    by ramblin billy ( 856838 ) <defaultaddy@yahoo.com> on Monday May 02, 2005 @10:49PM (#12415958)

    Reading your article, I get the impression that you've tried appealing to both the users and the powers that be without much success. It seems obvious that whatever solution you decide to implement is going to involve a lot of your own time and effort. I suggest you make it worth your while. I don't know what is your particular area of study, but it probably wouldn't be too hard to come up with a way to get some credits for working on this problem. The IT connection is obvious. If you are LA you should be able to work in an angle in psychology, sociology, even some sort of human/technology interface thing for the sciences. Two or three independent study credits might go a long way toward mitigating your frustration. Don't give up if the obvious professors are not responsive - it shouldn't be too hard to find an LA professor delighted to sponsor a program solving a technical problem with a humanistic approach.

    As far as method...I suggest you take your lead from the hacker/cracker community. Implement a Social Engineering attack. There are many fine examples of specific techniques to be found in the comments of this thread. I especially like the "scarlet V" approach. I suggest the following:

    - "anyone who gets infected is a lamer old school twerp who is so behind the technology curve that they can't even stop high school script kiddies from using them like zombie flesh puppets"
    - "allowing your owned machine to infect the local net is dissing everyone in the dorm - especially if you are too clueless to know how to prevent it"
    - "you're getting played, you clueless dork, every time you click that stupid 'yes' button it's like bending over and dropping your drawers"

    I'm sure you can do a much better job coming up with the proper approach. Just remember that establishing the proper attitude is key - even a few people is a good start. Then public humiliation and shame will work wonders. One advantage of this solution is it will stay with the users after they leave the influence of a network tech fix. Hey, maybe you'll change the world. At least it could help you get a little closer to graduating - and add some stretch to your resume. It might also help you get a little more respect from the powers that be when you slap down your independent study paper with the big, fat 'A' on the cover.

    billy - who went to UT - volunteer is NOT a dirty word

Byte your tongue.

Working...