[88858] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Quarantine your infected users spreading malware

daemon@ATHENA.MIT.EDU (Jason Frisvold)
Tue Feb 21 10:42:49 2006

Date: Tue, 21 Feb 2006 10:42:20 -0500
From: "Jason Frisvold" <xenophage0@gmail.com>
To: "Bill Nash" <billn@odyssey.billn.net>
Cc: Michael.Dillon@btradianz.com, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.64.0602211010530.10478@odyssey.billn.net>
Errors-To: owner-nanog@merit.edu


On 2/21/06, Bill Nash <billn@odyssey.billn.net> wrote:
> If you're talking about a compulsory software solution, why not, as an
> ISP, go back to authenticated activity? Distribute PPPOE clients mated
> with common anti-spyware/anti-viral tools. Pull down and update signature=
s
> *every time* the user logs in, and again periodically while the user is
> logged in (for those that never log out). Require these safeguards to be
> active before they can pass the smallest traffic.

Cost prohibitive..  In order to do that you'll need licenses from the
AV companies..

> The change in traffic flow would necessitate some architecture kung fu,
> maybe even AOL style, but you'd have the option of selectively picking ou=
t
> reported malicious/infected users (*cough* ThreatNet *cough*) and routing
> them through packet inspection frameworks on a case by case basis. Quite
> possibly, you could even automate that and the users would never be the
> wiser.

And then the privacy zealots would be livid..  Silently re-routing
traffic like that..  How dare you suggest such a ... wait..  hrm..=20
The internet basically does this already..  I wonder if the zealots
are aware of that..  :)

> - billn

--
Jason 'XenoPhage' Frisvold
XenoPhage0@gmail.com

home help back first fref pref prev next nref lref last post