Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Syrian Malware Servers Survive, Then Die

Soulskill posted about 2 years ago | from the like-most-things dept.

Censorship 23

Nerval's Lobster writes "A massive outage knocked Syria's Internet offline Nov. 29 — with the exception of five servers implicated in serving malware earlier this year. But the next day, those five servers went dark as well. Internet analytics firm Renesys suggested late Nov. 29 that those five servers were likely offshore. 'Now, there are a few Syrian networks that are still connected to the Internet, still reachable by traceroutes, and indeed still hosting Syrian content,' the company wrote in a blog post. 'These are five networks that use Syrian-registered IP space, but the originator of the routes is actually Tata Communications. These are potentially offshore, rather than domestic, and perhaps not subject to whatever killswitch was thrown today within Syria.' By the morning of Nov. 30, those five servers went offline. 'The last 5 networks belonging to Syria, a set of smaller netblocks previously advertised by Tata Communications, have been torn down and are no longer routed,' Renesys wrote." CloudFlare has a blog post confirming that the Syrian government was responsible for flipping the switch, contrary to their claims. Meanwhile, Anonymous has started targeting the Syrian government's remaining websites and helping to get communications channels flowing out of Syria. Google is reminding people of its Speak2Tweet service, which lets people post to Twitter through voicemail over still-functioning phone lines.

Sorry! There are no comments related to the filter you selected.

First (-1)

Anonymous Coward | about 2 years ago | (#42147497)

First

Netcraft confirms it: (1)

Anonymous Coward | about 2 years ago | (#42147607)

Syria is dead.

Re:Netcraft confirms it: (1)

jonadab (583620) | about 2 years ago | (#42157509)

Syria has always been dead. In no public or private utterance can it be admitted that situation has at any time been otherwise. Officially the change of status has never happened. Netcraft has confirmed that Syria is dead: therefore, Netcraft has always confirmed that Syria is dead, and thus Syria has always been dead. The failing third-world government of the moment always represents absolute evil, and thus it follows that any past or future situation in which that government might not be failing is impossible.

Re:Netcraft confirms it: (1)

jonadab (583620) | about 2 years ago | (#42157547)

Just in case someone feels like being an idiot and taking my little allusion for more than the small bit of attempted humor that it is, I should probably clarify: I am not even remotely interested in taking sides in the current conflict in Syria. Please don't try to read anything political into my above post. It wasn't intended that way. It's just supposed to be silly and funny, that's all. Thanks.

Well they're obviously (0)

Chrisq (894406) | about 2 years ago | (#42147623)

Well they're obviously te Syrian suicide-bomb servers.

Mars Plastic Beads Discovery (-1)

Anonymous Coward | about 2 years ago | (#42147727)

I guess this means that the Syria people missed the story on Slashdot regarding the recent discovery of plastic beads found on Mars!

Distributed/ad hoc internetworking (3, Interesting)

Toe, The (545098) | about 2 years ago | (#42147775)

I've heard of ideas and even projects for ad hoc internetworking and/or phone networking. In these, there is no authoritative routing, but rather meshes of individual nodes (perhaps with uplinks to the "regular" internet/network).

Obviously there are enormous obstacles to developing such a thing. It's hard; it's fragile; it's messy; it's confusing to the user; and it's not profitable.

But when we read stories like this... shouldn't we give it some more thought?

Re:Distributed/ad hoc internetworking (1)

timeOday (582209) | about 2 years ago | (#42149915)

I actually think it would help immensely if such a service were not anonymous, and (by convention) limited to short text messages - basically like twitter. This is for two reasons, first, I simply don't think people will get excited about being mules for who knows what data payload; and second, a protocol reliant on happenstance proximity of cellphones towards an unknown exit node will be plenty slow and inefficient, even BEFORE intentionally routing it every which way for anonymity. I just don't think it's the right medium for smuggling out videos of atrocities or tactical information; for that, hand off usb sticks to trusted messengers, or whatever it is terrorists do. (I am not saying only terrorists have a need to communicate secretly and securely, only that the situation is the same whether you are rightly considered a "good guy" or a "bad guy.")

Re:Distributed/ad hoc internetworking (1)

jonadab (583620) | about 2 years ago | (#42157757)

I've given the notion quite a bit of thought, and I eventually concluded, somewhat reluctantly, that it's not practicable on a large scale, for fundamental reasons that have nothing to do with any specific design or protocol that might be attempted.

However, there are usually ways to get information in or out of a place that's disconnected from the internet for whatever reason. Ultimately, if *any* kind of communication in or out of the country is possible, somebody can use it indirectly to get information to or from the internet.

Communication mechanisms that would work for this include, but are not limited to, the following: traditional phone lines; cables of any kind that cross the border, even if they were intended to carry power; satellite phones, or any other kind of bi-directional satellite link; radio transceivers, short-wave or otherwise; any postal service that delivers international mail, whether it's private or public; any location where it's possible for a person to cross the border, legally or otherwise; carrier pigeon; heliography; smoke signals; slips of paper in sealed glass or plastic bottles floating across the Mediterranean Sea; slips of paper in metal containers hurled across the border with trebuchets; words spelled out in fields using rocks and sticks, viewable by anybody with satellites or planes; messages can be dropped into the country from planes, either in robust containers or with parachutes; I'm sure there are other ways not listed here.

None of this requires a networking protocol in any normal sense of that term. The message only has to get through to somebody who is willing to pass it along, and they can do so. Outbound messages, once picked up by anyone, can be spread via the regular internet, no problem. Is there one person anywhere outside Syria who's willing to post the stuff on Twitter? Similarly, inbound messages, once received within the country, can be communicated via whatever mechanisms people are using to communicate within the country, even if they can't reach the outside that way.

Traditionally, one really common way to get information _into_ a geopolitical area where the local government is uncooperative is via radio, because the hard part of radio is the transmitter, and you can use one that's well outside the jurisdiction in question and transmit across the border. People on the inside just need cheap battery-operated transistor radios, which are remarkably difficult for the government to hunt down and eliminate. Jamming is of limited practicality, especially if the sending station is fairly powerful: you can jam it in a small area, but trying to jam it nationwide, if it's a strong signal, is very difficult. VOA is one example of an organization that has been doing this for decades.

The harder part is getting information _out_ of the place. Traditional radio transmitters give away their position, so ones inside the country are relatively easy for the government to shut down (if they have effective control of the whole country, which admittedly may not currently be the case in Syria). However, it's possible to narrow-cast radio waves directionally, aiming for a particular known receiver, which I think may be approximately what satphones do. That would be harder to stop. In the case of Syria, though, I'm pretty sure both sides in this conflict have vehicular transport, so the easiest thing may just be to send couriers across the border (e.g., into Turkey or Jordan or maybe even Lebanon, which I think is not real far from Damascus) and send the message from there.

Re: UUCP (Distributed/ad hoc internetworking) (0)

Anonymous Coward | about 2 years ago | (#42163823)

Back in the day, I used to install and administer UUCP. gecalma.uucp ... ampex.uucp ... unet.uucp ... etc. I may still have some old business cards that have a UUCP email address on them - back when nobody knew what email addresses were, before .COM and .GOV and .ORG existed. Who remembers ptsfa.uucp?

A lot of people relied upon UUCP to get the message there. The Catholic Church in Florida used UUCP to interconnect all of their churches in the state of Florida, for instance, and published their connections to the appropriate newsgroups so that they could be mapped.

Modem protocols are still found buried in SMS, if I recall correctly - I'm a systems administrator, Jim, not a telecommunications engineer, but I have noticed and recognized those familiar AT command sequences, here and there, even today, 40 years later.

I'm pretty confident I could build a turnkey CDROM-based release of FreeBSD that did nothing but install a robust UUCP server - I've done it before, except it was an Apache server, not UUCP. It would take me about six months, I estimate.

Many laptops still have modem ports. An old laptop would make a dandy UUCP node - plugged into an UPS, hotwired to a car battery, pulling maybe 30 watts, it would run for weeks.

Alas, I have a family to provide for, and can't afford to take six months or a year off to develop this project/product. I estimate funding this development effort over one year's time - 12 months - would cost me ~$60K.

Suggestions on how to achieve this funding would be appreciated.

Authentication word: "player"

nothing "confirmed" (1)

Anonymous Coward | about 2 years ago | (#42147947)

Anyone knowing anything about BGP and stuff can tell that there are no more facts than this:

All IP ranges behind AS29386 seem to be offline.

Other than that, all we have is speculation. Cloudflame is in no position to "confirm" something.
It could be this way, it could be another way around.

It would not surprise me if some stupid gov shut of parts of internet. But in this case even the Syrian official TV channel had no internet and their daily press overview programme was forced to use only papers.

Also of note: this NYT piece [nytimes.com] makes it quite clear that it is in US interests not allow Syrian internet presence.

Good news for IPv4! (5, Funny)

pepsikid (2226416) | about 2 years ago | (#42147981)

Ya know what I think? I think we just freed up 84 unused netblocks for the rest of the Internet to use.

Re:Good news for IPv4! (0)

Anonymous Coward | about 2 years ago | (#42153339)

Ya know what I think? I think we just freed up 84 unused netblocks for the rest of the Internet to use.

Well, that was stupid. How funny would that be if all the US netblocks were freed for the rest of internet? Haha!

And I would love to see those morons who modded that up...

Re:Good news for IPv4! (0)

Anonymous Coward | about 2 years ago | (#42155199)

Actually, that would be a good thing, as everybody would then be forced to move to IPv6

Now why would the Syrian government want to.... (1)

3seas (184403) | about 2 years ago | (#42148373)

...commit genocide?

They know the world is watching and there are always ways of communicating around such a blackout, but the majority of people who'd speak up in disgust of what the government is apparently planning are not going to see it.

Its like news media hitting the mass market, only here it the sources of real news.

Re:Now why would the Syrian government want to.... (2)

Threni (635302) | about 2 years ago | (#42149909)

Nobody cares what is happening in Syria. Think of all the headlines of the last few years about Libya, Egypt, Iraq etc etc. It's in the news for a few days/weeks then the focus of attention moves elsewhere. X killed, Y removed from power, Rebels are fighting government forces in Z. The internet is up, the internet is down, bloggers tweet about blah blah. So it goes on. Not saying it's not important to people in that area, or who know people who are affected. But people watch the news, generally, for entertainment, not facts. This story is only on Slashdot because of the internet angle. Currently it has 10 comments or so. I don't see it picking too many more up.

Re:Now why would the Syrian government want to.... (0)

Anonymous Coward | about 2 years ago | (#42153343)

Exactly my point. It makes no sense that .sy gov cut themselves off.
They are trying hard to make their side of the story heard, so it makes simply no sense at all.

And while we are at that: If the Syrian government had any KILL switch, then you can be pretty sure it would kill ALL AS numbers and BGP routes leading to/from Syria. This is no Luxembourg!

Re:Now why would the Syrian government want to.... (1)

Immerial (1093103) | about 2 years ago | (#42154151)

It is clear that it was done deliberately by Syria... FTFA "In order for a whole-country outage, all four of these cables would have had to been cut simultaneously. That is unlikely to have happened."

My worst fear is that they are going to try either chemical weapons or indiscriminate slaughter (whole towns/cities/women/children/refugees). If those reports got out they would lose what little international support they have from Russia and China, and that would basically be it. All the nations would swoop in with actual forces instead of sitting back and debating sanctions, giving of weapons, etc.

It sounds like this is the end game for Assad. One last major chance to do so much damage that he and his supporters are the last ones standing when the curtains go back up.

Speak to tweet? (2)

jeffmeden (135043) | about 2 years ago | (#42148559)

Is this really a thing? A service where your voice gets turned into an anonymized URL and posted to a generic twitter handle? Sounds productive... I wish Google would remind people that when phone lines work, maybe call a PERSON and make REAL contact, don't just shout into the void. This twitter obsession is nuts.

Re:Speak to tweet? (1)

valkraider (611225) | about 2 years ago | (#42149411)

I don't like Twitter either. But a single tweet can reach hundreds, thousands, or even millions of people. When you call a person, you reach - well - that person. I say we need Speak to Slashdot. ;)

XS4ALL also provides dial-up internet access (0)

Anonymous Coward | about 2 years ago | (#42150025)

For Syrian users: Internet dialup access: +31205350535 user: xs4all password: xs4all (https://twitter.com/xs4all/status/274635064212598784 [twitter.com] )

Thats a reason, why all people should prefer (2)

someones (2687911) | about 2 years ago | (#42150047)

Thats a reason, why all people should prefer small autonomous over global decentralised over centralised networks for communication.

Killing off one centralised service is easy.
If you have enought control, you can even cut a global decentralised network into 2 or more.

But try killing off 100000 of small autonomous networks - if they are not even known - and noone knows them all - , how should they be killed?

Re:Thats a reason, why all people should prefer (1)

Anonymous Coward | about 2 years ago | (#42151455)

And what are, the downsides? I can't think of, any at all, he said sarcastically and with random commas.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?