North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: botnets: web servers, end-systems and Vint Cerf
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sean Donelan wrote: > > On Sat, 17 Feb 2007, Petri Helenius wrote: >>> After all these years, I'm still surprised a consortium of ISP's >>> haven't figured out a way to do something a-la Packet Fence for their >>> clients where - whenever an infected machine is detected after >>> logging in, that machine is thrown into say a VLAN with instructions >>> on how to clean their machines before they're allowed to go further >>> and stay online. >> This has been commercially available for quite some time so it would >> be only up to the providers to implement it. > > Public ISPs have been testing these types of systems for over 5 years. > What sorts of differences can you think of that would explain why public > ISPs have found them not very effective? > > Public ISPs have been using walled gardens for a long time for user > registration and collecting credit card information. So they know how to > implement walled gardens. But what happens when public ISPs use it for > infected machines? - --------------------------------- I believe aol (maybe Vijay) once talked about the very same sink hole technique they use within they networks to fight bad traffic. Not sure which nanog? Anyone? regards, /virendra -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFF16OjpbZvCIJx1bcRAtxOAJ9hdmWyy8RFecqblYyk96YnQbk1RQCfRt2d v50wxR0dMbwWVZqFYWnhCCk= =caLg -----END PGP SIGNATURE-----
|