peeringdb.com is usually quite accurate.

-- Stephen

On 2015-01-11 4:11 PM, Pavel Odintsov wrote:
Hello!

But abuse@ contacts is very-very-very hard way to contacting with ASN
administrator in case of attack. Big amount of requests to #Nanog
about "please contact ASN XXXX noc with me offlist" confirms this.

I'm got multiple attacks from well known ISP and I spend about 10-20
hours to contacting they in average. It's unacceptable time

We need FAST and RELIABLE way to contacting with noc of attackers
network for effective attack mitigation.

We need something like RTBH for knocking network admin of remote network.

Maybe somebody can create social network for noc's with API ?:)





On Sun, Jan 11, 2015 at 11:55 PM, Owen DeLong <o...@delong.com> wrote:

On Jan 11, 2015, at 05:07 , Mike Hammett <na...@ics-il.net> wrote:

Why does it seem like everyone is trying to "solve" this the wrong way?

Because it’s what we CAN do.


Do other networks' abuse departments just not give a shit? Blackhole all of the 
zombie attackers and notify their abuse departments. Sure, most of the owners 
of the PCs being used in these scenarios have no idea they're being used to 
attack people, but I'd think that if their network's abuse department was 
notified, either they'd contact the customer about it issue or at least have on 
file that they were notified. When the unknowing end-user reached out to 
support over larger and larger parts of the Internet not working, they'd be 
told to clean up their system.

The way to stop this stuff is for those millions of end users to clean up their 
infected PCs.

Agreed… However, let’s look at it from an economics perspective…

The average residential service provider doesn’t have the resources and doesn’t 
charge enough to build the resources to deal with this onslaught. It won’t be 
the service provider that the attacker blames for the initial few 
disconnections, it will be the websites in question.

So, let’s say XYZ.COM <http://xyz.com/> is a really popular site with lots of 
end-users. Some of those end-users are also unknowingly attacking XYZ.COM 
<http://xyz.com/>.

XYZ.COM <http://xyz.com/> black holes those customers (along with all the other 
zombies attacking them).

XYZ.COM <http://xyz.com/> gets angry calls from those customers and has no 
ability to contact the rest.
The rest don’t call their ISP or XYZ.COM <http://xyz.com/> because they don’t know 
that they are unsuccessfully trying to reach XYZ.COM <http://xyz.com/>, so they don’t 
see the problem.

Depending on hold times, etc., XYZ.COM <http://xyz.com/> loses some fraction of 
their customers (who instead of cleaning up their system, move into the second group 
who don’t care about the problem any more.) The rest may clean up their systems.

So, at the cost of some fraction of their customer base and a substantial burden on 
their call center, XYZ.COM <http://xyz.com/> has managed to clean up a 
relatively small percentage of systems, but accomplished little else.

I’m all for finding a way to do a better job of this. Personally, I’d like to 
see some sort of centralized clearing house where credible reporters of dDOS 
information could send some form of standardized (automated) report. The 
clearing house would then take care of contacting the responsible ISPs in a 
scaleable and useful manner that the ISPs could handle. Because the clearing 
house would be a known credible source and because they are providing the 
information in a way that the ISP can more efficiently utilize the information, 
it MIGHT allow the ISP to take proactive action such as contacting the user and 
addressing the problem, limiting the user’s ability to send dDOS traffic, etc.

However, this would require lots of cooperation and if such a clearing house 
were to evolve, it would probably have to start as a coalition of residential 
ISPs.

Owen





Reply via email to