[68625] in North American Network Operators' Group
Re: Platinum accounts for the Internet (was Re: who offers cheap (personal) 1U colo?)
daemon@ATHENA.MIT.EDU (Robert E. Seastrom)
Mon Mar 15 08:01:55 2004
To: Michael.Dillon@radianz.com
Cc: nanog@merit.edu
From: "Robert E. Seastrom" <rs@seastrom.com>
Date: 15 Mar 2004 08:01:15 -0500
In-Reply-To: <OF657F1BA9.56D5B6E3-ON80256E58.00454645-80256E58.00457CFE@radianz.com>
Errors-To: owner-nanog-outgoing@merit.edu
Michael.Dillon@radianz.com writes:
> Maybe NANOG needs to implement a system where you have to log
> in to a web page with your NANOG meeting passcode in order to
> get a usable IP address. Then, when an infected computer shows
> up we will know exactly whose it was. Might even be interesting
> for a researcher to interview every infected party and figure
> out why it is happening even among a supposedly clueful group.
Seconded. This is dirt simple to do. If we believe in public
humiliation, a list of infected machines and their owners (along with
a suitably snarky "don't hire these top network engineers to maintain
your fleet of windows boxes" message) could be displayed on the
projection screens at the break.
---Rob