[71416] in North American Network Operators' Group
Re: Points on your Internet driver's license (was RE: Even you can
daemon@ATHENA.MIT.EDU (Owen DeLong)
Mon Jun 14 12:32:40 2004
Date: Mon, 14 Jun 2004 09:30:17 -0700
From: Owen DeLong <owen@delong.com>
To: Geoincidents <geoincidents@nls.net>, nanog@merit.edu
In-Reply-To: <007901c45196$ed2bee40$231a90d8@NTAUTHORITY>
Errors-To: owner-nanog-outgoing@merit.edu
--==========F5C6C434B3BDA14C8F92==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
A response doesn't mean the ISP doesn't also investigate. Reasonable proof
is reasonable proof. The logs are a good start, but, the ISP should review
his own logs, and, check the currently active traffic patterns too. If=20
there
isn't any evidence, the ISP shouldn't shut the customer down. If the ISP
can see continuing abuse, the ISP should shut the customer down. That's
not unreasonable. That's what I'm asking fore, and, what I understood
Adi to be asking for in this case.
Owen
--On Sunday, June 13, 2004 6:34 PM -0400 Geoincidents=20
<geoincidents@nls.net> wrote:
>
> ----- Original Message -----
> From: "Adi Linden" <adil@adis.on.ca>
>
>> if I send an ISP reasonable proof that a
>> broadband customer hits my mailserver with thousands of emails an hour I
>> should be able to expect an immediate response. Not hours, days or =
weeks,
>> minutes and the originating account should be shut down.
>
> Great, next time you get shut down mid auction because the ISP trusts the
> log file I send him, remember you asked for it.
>
> Geo.
>
--=20
If it wasn't crypto-signed, it probably didn't come from me.
--==========F5C6C434B3BDA14C8F92==========
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (Darwin)
iD8DBQFAzdKZn5zKWQ/iqj0RAlkZAKCD5FdkTnico8WZiY8HwADShnF8BwCgkeNs
meXC7w1gVORur5Gc+qnvRz8=
=3Nhf
-----END PGP SIGNATURE-----
--==========F5C6C434B3BDA14C8F92==========--