[133500] in North American Network Operators' Group
Re: [Operational] Internet Police
daemon@ATHENA.MIT.EDU (Jack Bates)
Fri Dec 10 11:49:22 2010
Date: Fri, 10 Dec 2010 10:49:14 -0600
From: Jack Bates <jbates@brightok.net>
To: William McCall <william.mccall@gmail.com>
In-Reply-To: <AANLkTikhKt1pFaigJFpbjO9tuzY7-JVm12Yv013OCKsX@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 12/10/2010 10:44 AM, William McCall wrote:
> To the folks out there that presently work for an SP, if someone
> called you (or the relevant department) and gave you a list of
> end-user IPs that were DDoSing this person/entity, how long would you
> take to verify and stop the end user's stream of crap? Furthermore,
> what is the actual incentive to do something about it?
>
It falls under standard abuse role, though if the destination just wants
a filter or their IP nullrouted, that is usually accommodated immediately.
Jack