10 Dec
2010
10 Dec
'10
11:49 a.m.
On 12/10/2010 10:44 AM, William McCall wrote:
To the folks out there that presently work for an SP, if someone called you (or the relevant department) and gave you a list of end-user IPs that were DDoSing this person/entity, how long would you take to verify and stop the end user's stream of crap? Furthermore, what is the actual incentive to do something about it?
It falls under standard abuse role, though if the destination just wants a filter or their IP nullrouted, that is usually accommodated immediately. Jack