[133512] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [Operational] Internet Police

daemon@ATHENA.MIT.EDU (Paul Graydon)
Fri Dec 10 13:07:46 2010

Date: Fri, 10 Dec 2010 08:07:36 -1000
From: Paul Graydon <paul@paulgraydon.co.uk>
To: George Bonser <gbonser@seven.com>
In-Reply-To: <5A6D953473350C4B9995546AFE9939EE0B14CE58@RWC-EX1.corp.seven.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 12/10/2010 07:59 AM, George Bonser wrote:
>> Not to mention the risk of lost business for customers that just can't
>> be bothered to fix broken machines.
>>
>> Paul
>
> That supposes that another ISP would accept their bot-infected machine.
> It would require some cooperation among the providers.  And should some
> ISP get the reputation of being a bot-haven, then maybe their customers
> might notice connectivity issues.
>
Unless you can get every company to sign up to an agreement it will 
never work.  Even then you'll still find unscrupulous companies that are 
far more interested in revenue than reputation.  There are a number of 
hosting companies I'm sure most network professionals are aware of that 
are regular bases for C'n'C servers.


home help back first fref pref prev next nref lref last post