<p>The problem with that approach is the potential for a customer to be permanently stuck in quarantine because they lack the knowledge to clean their computer. </p>
<p>I don't think that is an acceptable outcome, at least not while they're paying for service. </p>
<div class="gmail_quote">On Jun 15, 2012 8:36 PM, "Anand Kumria" <<a href="mailto:akumria@acm.org">akumria@acm.org</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Until, of course, we have client side apps which check the DNSSEC<br>
trust bits. And then the whole approach is doomed.<br>
<br>
It'll happen sooner than you expect (is already happening with SSH for example).<br>
<br>
I'm with Mark. If you have a customer you suspect of infection, rather<br>
than allowing them to continue using the Internet - quarantine them.<br>
<br>
It'll result in a short-term spike in support calls, but by doing it<br>
on an exchange by exchange basis initially.<br>
<br>
You ought to be able to control the resultant incoming calls.<br>
<br>
Anand<br>
<br>
On 15 June 2012 11:53, Barrie Hall <<a href="mailto:barrie@mypond.net">barrie@mypond.net</a>> wrote:<br>
><br>
><br>
>><br>
>> > Managing and ensuring the quality and timeliness of the poisoning data<br>
>> > is<br>
>> > the *big issue* with this technology but we are seeing very good results<br>
>> > now.<br>
>> ><br>
>> > Barrie<br>
>><br>
>> It'd be interesting to know what your customers think of this<br>
>> "intervention". Do they welcome that their ISP has detected a problem<br>
>> and wants to help them or is it viewed as an unwelcome impost?<br>
>><br>
>> It's a difficult situation that I don't envy. You're trying to solve a<br>
>> problem you didn't create, you're trying to do the right thing for<br>
>> your customers, your network and the general good, but the consumer<br>
>> probably sees it as an inconvenience and a possible cost.<br>
>><br>
>> I imagine the "messaging" has a lot to do with the consumer<br>
>> response.<br>
>><br>
>> If I mis-remember, Earthlink used to be pretty pro-active like this<br>
>> and did a pretty good messaging job in the email space: here's one<br>
>> example<br>
>> <a href="http://support.earthlink.net/articles/email/email-blocked-by-earthlink.php" target="_blank">http://support.earthlink.net/articles/email/email-blocked-by-earthlink.php</a><br>
>><br>
>><br>
><br>
> Mark,<br>
><br>
> My views are my own on this email list so I can't get into what Telstra is<br>
> and isn't doing. I will say that I am happy to discuss the value of DNS<br>
> "purity" vs using DNS to solve some nasty problems we face every day.<br>
><br>
> DNS is a valuable "control plane" which allows ISP's to deliver a better<br>
> service with some tweaking. It is public knowledge that a number of ISP's<br>
> are using DNS to suppress access to "the worst of the worst" child<br>
> exploitation material on the Internet. I don't think that there is any doubt<br>
> that this has been a success.<br>
><br>
> Using DNS to surpress Botnets seems to me to be a "no brainer".<br>
><br>
> Barrie<br>
><br>
><br>
><br>
><br>
><br>
><br>
> _______________________________________________<br>
> AusNOG mailing list<br>
> <a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
> <a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
><br>
<br>
<br>
<br>
--<br>
“Don’t be sad because it’s over. Smile because it happened.” – Dr. Seuss<br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</blockquote></div>