![]() |
||||||||||
|
|
||||||||||
Shelli Crocker December 14, 2000 Abstract Peer-to-peer file sharing systems, such as Gnutella, provide new ways to trade illegal software. However, software theft via FTP, Internet Relay Chat channels and bulletin boards still is prevalent. Open anonymous FTP sites on your network may be serving operating systems, application software, games, music, movies and more to users around the world. Warez Software theft exists in many forms: from a teen who copies a game for a friend, to a small office manager who installs a single-user application on ten workstations, to an organized crime ring that auctions illegal software on the Internet. But somewhere in this spectrum exists a vast underground software trading circle: the warez scene. Warez is the term used for software that has been stripped of its copy protection and made available on the Internet for downloading. Available warez include operating systems, applications, entertainment software (games, music, movies) and more. The warez community is an well-organized one, boasting its own search engines and Web rings to help end users locate what they want. A recent FBI "Cyber Strike" investigation revealed that pirated software often appears on within a day of its public release and often before the manufacturer's official release. Pirate copies of nearly every major software release, as well as specialty items, are available. Software may be offered in exchange for uploads of other applications, or users may be charged a fee to join. There are several new peer-to-peer file-sharing systems, such as Gnutella, that provide ways to trade this illegal software. However, software theft via FTP, Internet Relay Chat channels and bulletin boards still is prevalent and should not be overlooked. Open Anonymous FTP and FXP Anonymous FTP may be the simplest way to transfer files via the Internet, but it is not without its problems. Abuse of anonymous FTP is quite common. The CERT Coordination Center first issued an advisory regarding anonymous FTP activity in 1993, citing a continuous stream of reports from sites that experience unwanted activities within their anonymous FTP areas. One type of activity noted is use of writable areas to transfer copyrighted software and other sensitive information. Hosting open anonymous FTP sites on your network is an invitation to piracy. The most common attacks found in firewall logs are scans looking for open anonymous FTP servers. Large companies and universities are popular targets due to their fast connections. Without those the warez scene wouldn't exist. There are many tutorials on the Web with detailed instructions to locate public FTP sites, or "pubs." Grim's Ping is recommended as the pub scanning tool of choice. The goal in locating a pub is to load it with items for downloads using "liberated" storage. Files may then be transferred between FTP servers using an FXP (File eXchange Protocol) utility, such as FlashFXP. The advantage of using FXP is that the maximum transfer speed does not depend on your connection, but only on the connection between the two hosts. Files can be distributed around the Internet quickly and easily between pubs, making warez widely available. Warning Signs Signs of piracy on your network may not be obvious at first. FXPers take care to avoid detection. While scanning and creating pubs they may use a proxy server or a wingate to mask their source and identity. Most hide the directories they create by placing periods, spaces or tildes in the name. Pubs are posted via IRC channels, boards, newsgroups and mailing lists (many of which are accessible by invitation only). When using a pub, the golden rule is to behave as a guest; tampering with the system owners files and directories increases the chance the activity will be discovered. So what should you look for? The Software and Information Industry Association (SIIA) offers seven warning signs of piracy:
When software piracy is discovered at your organization, SIIA provides the following advice: Review directories and files in accordance with policies and procedures that exist in your organization. Determine origin of access. Review files contents for reference to other sites or account/password combinations. Then notify sites identified, as these sites themselves may be compromised. Prevention On a large network, new FTP sites spring up frequently. Inexperienced system administrators may run FTP services with default, open configurations. Power users may install FTP services on their desktop computers. Routine scans of your own network are essential to detect new FTP servers before the FXPers find them. These problems not withstanding, anonymous FTP can be a valuable service if correctly configured and administered. Sites should use of the most recent version of their FTP daemon. For example, the popular War FTP Daemon has a bug that allows unrestricted access to any file on the local machine. Directories, password and group files must be configured correctly. See CERTs anonymous FTP "tech tip" for details. Summary Software theft via FTP, Internet Relay Chat channels and bulletin boards is very common on the Internet. Open anonymous FTP sites on your network may be serving operating systems, application software, games, music, movies and more to users around the world. But by scanning your own network for anonymous FTP sites, monitoring FTP activity, and securing FTP server configuration, risk of FTP abuse can be reduced. 1. "Warez." Whatis?com: the IT-specific encyclopedia. 19 November 1999.URL: http://whatis.techtarget.com/ (14 December 2000). 2. Cuciz, David. "Software piracy report: Part III." URL: http://www.gamespy.com/legacy/articles/spr3_b.shtm (11 December 2000). 3. Wong, Wylie. "FBI targets BBS operators, seizes hardware in software piracy sting." 3 February 1997. Computerworld, 31(5), p24. 4. CERT Coordination Center. "CERT advisory CA-1993-10 anonymous FTP activity." CERT Advisories. 14 July 1993, rev. 8 October 1997. URL: http://www.cert.org/advisories/CA-1993-10.html (7 December 2000). 5. Graham, Robert. "FAQ: Firewall forensics." 20 June 2000. URL: http://www.robertgraham.com/pubs/firewall-seen.html (11 December 2000). 6. "FTP etiquette." Net Knowledge Base. URL: http://www.netknowledgebase.com/tutorials/ftpetiquette.html (7 December 2000). 7. "Grim's Ping: Making the everyday pub scanning faster and more reliable." 23 September 2000. URL: http://grimsping.cjb.net (7 December 2000). 8. "FlashFXP." 11 August 2000. URL: http://flashfxp.phix-it.com (11 December 2000). 9. DrPerf. "FXP Tutorial." Xtreme-FXP. URL: http://www.directdownloads.net/Tutorials/FxP.htm (30 November 2000). 10. "Tutorials." Ultimate FXP - The web's most complete FXP info source. 12 July 2000. URL: http://www.ultimatefxp.f2s.com/tutorials/tutorial.htm (7 December 2000). 11. "Netiquette." Net Knowledge Base. URL: http://www.netknowledgebase.com/tutorials/netiquette.html (7 December 2000). 12. Software and Information Industry Association. "Seven warning signs of piracy: What to watch for and what's at stake." URL: http://www.siia.net/piracy/policy/int_7.asp (11 December 2000). 13. Software and Information Industry Association. "Seven warning signs of piracy: Anonymous FTP abuses." URL: http://www.siia.net/piracy/policy/int_7_abuses.asp (11 December 2000). 14. Aase, Jarle. "Security alert - WAR FTP daemon all versions." 4 February 2000. URL: http://war.jgaa.com/alert/ (7 December 2000). 15. CERT Coordination Center. "Anonymous FTP configuration guidelines." CERT Tech Tips. Copyright 1996, rev. 27 July 2000. URL: http://www.cert.org/tech_tips/anonymous_ftp_config.txt (11 December 2000). |
||||||||||
|
to top of page | to Threats & Vulnerabilities | to Reading Room Home
|
||||||||||
![]() |
||||||||||