<div dir="ltr">Maybe your solution could go along the lines of a proposal I worked on for a large telco many moons ago (November 2001!!!) as a follow on to a RADIUS upgrade. <div><br></div><div>It was termed "Go To Jail" and the idea was to fix an issue with a whole lot of (3rd party??) CPE that had been sold with a default credentials that would incessantly try to authenticate in a tight endless loop (something like a 60 second cycle) when rejected by the RADIUS server. These caused a huge load on the RADIUS infrastructure. </div><div><br></div><div>The idea was after a number of failed requests in a short period, they would get sent a RADIUS-Accept that put them in a "jail" that would give them basically a limited IP and DNS that allowed the rogue to CPE to pretty much go nowhere but it would stop trying authenticate. You might then have the "jailed" user status then reset after a period (say 24 hours) or after operator intervention (presumably after the user claimed that his new modem didn't work).</div><div><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature">Regards, Martin<br><br><a href="mailto:MartinVisser99@gmail.com" target="_blank">MartinVisser99@gmail.com</a></div></div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, 9 Jul 2019 at 18:00, Andrew Yager <<a href="mailto:andrew@rwts.com.au">andrew@rwts.com.au</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div dir="ltr">On Tue, 9 Jul 2019 at 17:58, Mark Newton <<a href="mailto:newton@atdot.dotat.org" target="_blank">newton@atdot.dotat.org</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>
On 9 Jul 2019, at 4:41 PM, Andrew Yager <<a href="mailto:andrew@rwts.com.au" target="_blank">andrew@rwts.com.au</a>> wrote:<br>
> In our RAIDUS packets generated from our LAC we have a bunch of information about Telstra DSL services when they terminate on our network. We have a rogue service that we are trying to locate the FNN it's actually on, but that useful data is not in the RADIUS packets.<br>
> Does anyone know if it's possible to find the FNN in reverse from the RADIUS packet?<br>
<br>
Can’t you just suspend the service and wait for them to call about a fault?<br></blockquote><div><br></div><div>Tried that one.</div><div><br></div><div>We think it's a dead/dormant service that isn't actually in use, but is still somehow coming in. Packet usage is consistent with a deactivated/non-existent service; but auth packets are still coming in, so it's still alive somewhere.</div><div><br></div><div>Andrew </div></div></div>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</blockquote></div>