-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sean Donelan wrote:
On Sat, 17 Feb 2007, Petri Helenius wrote:
After all these years, I'm still surprised a consortium of ISP's haven't figured out a way to do something a-la Packet Fence for their clients where - whenever an infected machine is detected after logging in, that machine is thrown into say a VLAN with instructions on how to clean their machines before they're allowed to go further and stay online. This has been commercially available for quite some time so it would be only up to the providers to implement it.
Public ISPs have been testing these types of systems for over 5 years. What sorts of differences can you think of that would explain why public ISPs have found them not very effective?
Public ISPs have been using walled gardens for a long time for user registration and collecting credit card information. So they know how to implement walled gardens. But what happens when public ISPs use it for infected machines?
- --------------------------------- I believe aol (maybe Vijay) once talked about the very same sink hole technique they use within they networks to fight bad traffic. Not sure which nanog? Anyone? regards, /virendra -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFF16OjpbZvCIJx1bcRAtxOAJ9hdmWyy8RFecqblYyk96YnQbk1RQCfRt2d v50wxR0dMbwWVZqFYWnhCCk= =caLg -----END PGP SIGNATURE-----