Security Incidents mailing list archives

AW: blackholing t-dialin.net? sympatico.ca?


From: Jens Thiel <Jens () THIEL DE>
Date: Thu, 8 Mar 2001 00:59:38 +0100


t-dialin.net, however, has been the source of many probes for many of us
on this list, yet a quick attempt to find their AUP leaves me lacking.
(was it t-dialin.net who has the 'port scans are ok with us!' AUP?)


afaik, t-online (www.t-online.de) is also providing resellers dial-in access
via t-dialin.net and will probably tell you that you have to complain to
them:

- the physical network belongs to deutsche telekom (www.dtag.de)
- the network traffic is sold by t-online, a subsidary of deutsche telekom
- the user belongs to t-online or a reseller

there are AUPs available in german, eg.
ftp://software.sda.t-online.de/pub/service/pdf/agbdiens.pdf

regulations on "internet" are:
"Die T-Online AG ermoeglicht den Zugang zum weltweiten Internet."
(t-online ag is providing access to the worldwide internet."

and near the end on "additional topics":
"Der Nutzer ist insbesondere verpflichtet, den Dienst T-Online nicht
missbraeuchlich zu nutzen"
(the user is particulary obliged to not misuse the t-online service)

that's it. sad.

still, this situation continues. is it worth starting to block their
dialin netblocks?


being on t-dialin.net myself with my home box (DSL), i receive massive port
scans on a daily basis (originating from t-dialin.net and others). i guess
that, since the number of unsecured DSL boxes is growing fast, a lot of
people don't even know that their PC is rooted/trojaned and misused.

complaining to t-online will not solve the problem, educating the users (or
even better: vendors) would be a better idea.


Jens (not affiliated with any of the above).


Current thread: