Home page logo
/

nanog logo nanog mailing list archives

Re: whois
From: bmanning () vacation karoshi com
Date: Tue, 24 Oct 2000 13:04:23 +0000 (UCT)



        Er, begging to differ. Only when electrodes are implanted
        in peoples brains and the activation circuits are accessable
        via paging (or something similar) will you get the types of 
        response you think you want.  Either that or if their is 
        a business relationship w/ your "SWAT" team, e.g. they are
        paid to be a your beck/call on a 24/7/365 basis.



The key to an anti-hacker ISP association would be
a very special ip address / contact person lookup database.
ie: who/how to contact for the 'SWAT' response for a particular IP
address.

--Mike--

Hello;

When we have had attacks such as root exploits, we have notified the
source (at least,
the ISP hosting the immediate source) as to the date, time, IP address, etc.
(In one case, the attack appeared to come from a dial-up address in Germany,
so I thought we had them.) We have NEVER received a response. From
conversations at meetings, etc., I understand that this is typical - almost
universal - and that it would be naive to expect other ISPs to actually
do anything
about being a source for attacks.

Maybe a start would be to a BCP for some level of minimal response if
you source
an attack, and a "web site of shame" listing those domains that source
attacks and do nothing about it when notified.


                                   Regards
                                   Marshall Eubanks


   Multicast Technologies, Inc.
   10301 Democracy Lane, Suite 201
   Fairfax, Virginia 22030
   Phone : 703-293-9624          Fax     : 703-293-9609     
   e-mail : tme () on-the-i com     http://www.on-the-i.com





  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]