North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: botnets: web servers, end-systems and Vint Cerf

  • From: virendra rode //
  • Date: Sat Feb 17 20:16:21 2007

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sean Donelan wrote:
> 
> On Sat, 17 Feb 2007, Petri Helenius wrote:
>>> After all these years, I'm still surprised a consortium of ISP's
>>> haven't figured out a way to do something a-la Packet Fence for their
>>> clients where - whenever an infected machine is detected after
>>> logging in, that machine is thrown into say a VLAN with instructions
>>> on how to clean their machines before they're allowed to go further
>>> and stay online.
>> This has been commercially available for quite some time so it would
>> be only up to the providers to implement it.
> 
> Public ISPs have been testing these types of systems for over 5 years.
> What sorts of differences can you think of that would explain why public
> ISPs have found them not very effective?
> 
> Public ISPs have been using walled gardens for a long time for user
> registration and collecting credit card information.  So they know how to
> implement walled gardens.  But what happens when public ISPs use it for
> infected machines?
- ---------------------------------
I believe aol (maybe Vijay) once talked about the very same sink hole
technique they use within they networks to fight bad traffic.

Not sure which nanog? Anyone?


regards,
/virendra

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFF16OjpbZvCIJx1bcRAtxOAJ9hdmWyy8RFecqblYyk96YnQbk1RQCfRt2d
v50wxR0dMbwWVZqFYWnhCCk=
=caLg
-----END PGP SIGNATURE-----