botnets: web servers, end-systems and Vint Cerf
virendra rode //
virendra.rode at gmail.com
Sun Feb 18 00:53:55 UTC 2007
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sean Donelan wrote:
>
> On Sat, 17 Feb 2007, Petri Helenius wrote:
>>> After all these years, I'm still surprised a consortium of ISP's
>>> haven't figured out a way to do something a-la Packet Fence for their
>>> clients where - whenever an infected machine is detected after
>>> logging in, that machine is thrown into say a VLAN with instructions
>>> on how to clean their machines before they're allowed to go further
>>> and stay online.
>> This has been commercially available for quite some time so it would
>> be only up to the providers to implement it.
>
> Public ISPs have been testing these types of systems for over 5 years.
> What sorts of differences can you think of that would explain why public
> ISPs have found them not very effective?
>
> Public ISPs have been using walled gardens for a long time for user
> registration and collecting credit card information. So they know how to
> implement walled gardens. But what happens when public ISPs use it for
> infected machines?
- ---------------------------------
I believe aol (maybe Vijay) once talked about the very same sink hole
technique they use within they networks to fight bad traffic.
Not sure which nanog? Anyone?
regards,
/virendra
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFF16OjpbZvCIJx1bcRAtxOAJ9hdmWyy8RFecqblYyk96YnQbk1RQCfRt2d
v50wxR0dMbwWVZqFYWnhCCk=
=caLg
-----END PGP SIGNATURE-----
More information about the NANOG
mailing list