[50465] in North American Network Operators' Group
Re: Identifying DoS sources quickly (was: Bogon list or Dshield.org
daemon@ATHENA.MIT.EDU (Ralph Doncaster)
Tue Jul 30 11:26:51 2002
Date: Tue, 30 Jul 2002 11:28:27 -0400 (EDT)
From: Ralph Doncaster <ralph@istop.com>
To: "michael.dillon@radianz.com" <michael.dillon@radianz.com>
Cc: "nanog@merit.edu" <nanog@merit.edu>
In-Reply-To: <OF9CA78E33.DC0C8BC6-ON80256C06.00496B63-80256C06.004C8153@radianz.com>
Errors-To: owner-nanog-outgoing@merit.edu
> How many ISPs would identify the user of an IP address for the purposes of
> sending a "cease and desist" letter when contacted by a lawyer?
Despite 9/11, privacy still counts for something. It's rather dangerous
to give out private user information without a court order.
If one of our suscribers were involved in a DoS, we would deal with it
inernally, saving any records in the event of a court search warrant.
-Ralph