On Wed, Jun 21, 2006 at 02:18:10PM +0200, martin f krafft wrote: > also sprach Roel van der Made <[EMAIL PROTECTED]> [2006.06.21.1346 +0200]: > > Indeed, the preparation option would be nice, I now see hosts > > beeing blocked several times a day and nothing it beeing done with > > it anymore, which is a shame I think. > > > > Curious how others think about this. > > Do note that many of these attacks are auto-mounted. There is very > little an ISP can do when they receive a complaint about a host that > has been trojaned, unless their terms of contract require users to > maintain secure systems, which is impossible to prove or verify.
It kind of depents on the ISP, I know the dutch ISP XS4ALL is very active on these kind of actions, when a user does actually has a troyaned box, it's connection will be filtered untill the problem has been proven to be fixed. > Also, unless you have a solid-proof means to figure out who the > abuse contact is for a given IP, you should not do anything > automated. I agreed on not automating the idea earlier. tnx Roel. > > -- > Please do not send copies of list mail to me; I read the list! > > .''`. martin f. krafft <[EMAIL PROTECTED]> > : :' : proud Debian developer and author: http://debiansystem.info > `. `'` > `- Debian - when you have better things to do than fixing a system
signature.asc
Description: Digital signature