[133404] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Over a decade of DDOS--any progress yet?

daemon@ATHENA.MIT.EDU (Matthew Petach)
Thu Dec 9 03:37:32 2010

In-Reply-To: <4D0054CD.60009@gmail.com>
Date: Thu, 9 Dec 2010 00:37:28 -0800
From: Matthew Petach <mpetach@netflight.com>
To: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Dec 8, 2010 at 8:02 PM, JC Dill <jcdill.lists@gmail.com> wrote:
> =A0On 08/12/10 1:38 PM, Valdis.Kletnieks@vt.edu wrote:
>>
>> The second issue is that if you *do* establish a legal precident that
>> software vendors are liable for faults no matter what the contract/EULA
>> says,
>
> It doesn't matter what contract an auto maker makes with someone who
> purchases the car, if the brakes fail and the car hits ME, I can sue the
> auto maker due to the defective brakes. =A0If they design the car in a wa=
y
> that a 3rd party can easily tamper with the brakes, and then the car hits
> me, I can also sue the auto maker. =A0They are legally required to take d=
ue
> care in how they design the car to ensure that innocent bystanders aren't
> injured or killed by a design defect. =A0IMHO, there's no difference in t=
he
> core responsibility that software makers should be held to, to ensure tha=
t
> their software isn't easily compromised and used to attack and injure 3rd
> parties. =A0The EULA is a red herring, as it only applies to the purchase=
r
> (who agrees to the EULA when they purchase the computer or software), not=
 to
> 3rd parties who are injured.
>
> If the software doesn't work as designed and the purchaser is unhappy,
> that's between them and the company they bought the software from. =A0But=
 when
> it injures a 3rd party, that's a whole different ball game. =A0I truly do=
n't
> understand why ISP's (who bear the brunt of the burden of the fall-out fr=
om
> the compromised software, as they fight spam and have to provide customer
> support to users who complain that the "internet is slow" etc.) haven't s=
aid
> ENOUGH.
>
> jc

If you look at the national vulnerability database listings, though,
it's really not clear who you'd need to go after:

http://blogs.technet.com/b/security/archive/2008/05/15/q1-2008-client-os-vu=
lnerability-scorecard.aspx

Granted, that was two years ago; but it sure seems that just
vilifying Microsoft, satisfying though it might be, would be to
ignore the breadth of the problem.

Matt


home help back first fref pref prev next nref lref last post