nanog mailing list archives
Re: whois
From: bmanning () vacation karoshi com
Date: Tue, 24 Oct 2000 13:04:23 +0000 (UCT)
Er, begging to differ. Only when electrodes are implanted in peoples brains and the activation circuits are accessable via paging (or something similar) will you get the types of response you think you want. Either that or if their is a business relationship w/ your "SWAT" team, e.g. they are paid to be a your beck/call on a 24/7/365 basis.
The key to an anti-hacker ISP association would be a very special ip address / contact person lookup database. ie: who/how to contact for the 'SWAT' response for a particular IP address. --Mike--Hello; When we have had attacks such as root exploits, we have notified the source (at least, the ISP hosting the immediate source) as to the date, time, IP address, etc. (In one case, the attack appeared to come from a dial-up address in Germany, so I thought we had them.) We have NEVER received a response. From conversations at meetings, etc., I understand that this is typical - almost universal - and that it would be naive to expect other ISPs to actually do anything about being a source for attacks. Maybe a start would be to a BCP for some level of minimal response if you source an attack, and a "web site of shame" listing those domains that source attacks and do nothing about it when notified. Regards Marshall Eubanks Multicast Technologies, Inc. 10301 Democracy Lane, Suite 201 Fairfax, Virginia 22030 Phone : 703-293-9624 Fax : 703-293-9609 e-mail : tme () on-the-i com http://www.on-the-i.com
Current thread:
- Re: What TO DO and what NOT TO DO [Re: DOS Attacks - Almost Caught One!] Quark Physics (Oct 23)
- Re: What TO DO and what NOT TO DO [Re: DOS Attacks - Almost CaughtOne!] Marshall Eubanks (Oct 24)
- Re: whois Quark Physics (Oct 24)