"The patch model for Internet security has failed spectacularly."

*D'you know who was in charge of the Bush Administration's

"cyberspace security" policy? RICHARD CLARKE, that's who.

Do you think they took any of his advice?

This Black Ice worm, the Witty worm, that thing

was dynamite. Are you running Microsoft software?

Back up everything and store it safely. Do it

now and keep doing it. You are living very

dangerously. You have no genuine security no

matter how fast you are patching. You

have nothing between you and a wiped disk

but Washington's spin and Microsoft's PR theater.

Listen to what these security people are saying.

They know what they are talking about.

This is important.

CAIDA's post-mortem Black Ice analysis

John Gilmore:

Date: Sun, 28 Mar 2004 16:19:45 -0800

From: John Gilmore

Subject: [E-INFRA] Colleen Shannon: [Caida] witty worm writeup available

Sender: [email protected]

To: [email protected], [email protected]

CAIDA's analysis of the "Witty" worm from two weeks ago is

frightening. It was targeted to hit a particular vendor's firewall

product. The worm came out one day after the vulnerability was

disclosed and patched. Within 10 seconds it had spread to 110 hosts.

Within 45 minutes, it had compromised almost all of the vulnerable

machines on the Internet. As a destructive worm, it gradually

disabled its hosts (by periodically writing garbage to a random spot

on disk). If instead it had been a stealth 'bot', it would now have

about 12,000 machines ready to do its creator's bidding – the entire vulnerable population.

(If it had been targeting more numerous Linux, BSD, or Microsoft

systems, it would have spread as quickly, or more quickly.)

Worms are now able to propagate MUCH faster than humans can react to stop them. They can be released MUCH faster than humans can install patches. In short, the patch-and-pray model can't prevent massive-scale attacks from succeeding (and using the resources of the attacked machines for any other purpose).

This worm, along with others, validates the thesis from the seminal

2002 security paper, "How to 0wn the Internet in Your Spare Time" by Stuart Staniford, Vern Paxson, and Nicholas Weaver. For that, see:

http://www.icir.org/vern/papers/cdc-usenix-sec02/

This has policy implications at many levels, from software development, to security analysis, to infrastructure defense.

John