nanog mailing list archives

Re: botnets: web servers, end-systems and Vint Cerf


From: virendra rode // <virendra.rode () gmail com>
Date: Sat, 17 Feb 2007 16:53:55 -0800


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sean Donelan wrote:

On Sat, 17 Feb 2007, Petri Helenius wrote:
After all these years, I'm still surprised a consortium of ISP's
haven't figured out a way to do something a-la Packet Fence for their
clients where - whenever an infected machine is detected after
logging in, that machine is thrown into say a VLAN with instructions
on how to clean their machines before they're allowed to go further
and stay online.
This has been commercially available for quite some time so it would
be only up to the providers to implement it.

Public ISPs have been testing these types of systems for over 5 years.
What sorts of differences can you think of that would explain why public
ISPs have found them not very effective?

Public ISPs have been using walled gardens for a long time for user
registration and collecting credit card information.  So they know how to
implement walled gardens.  But what happens when public ISPs use it for
infected machines?
- ---------------------------------
I believe aol (maybe Vijay) once talked about the very same sink hole
technique they use within they networks to fight bad traffic.

Not sure which nanog? Anyone?


regards,
/virendra

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFF16OjpbZvCIJx1bcRAtxOAJ9hdmWyy8RFecqblYyk96YnQbk1RQCfRt2d
v50wxR0dMbwWVZqFYWnhCCk=
=caLg
-----END PGP SIGNATURE-----


Current thread: