On 12/10/2010 10:44 AM, William McCall wrote:
To the folks out there that presently work for an SP, if someone
called you (or the relevant department) and gave you a list of
end-user IPs that were DDoSing this person/entity, how long would you
take to verify and stop the end user's stream of crap? Furthermore,
what is the actual incentive to do something about it?


It falls under standard abuse role, though if the destination just wants a filter or their IP nullrouted, that is usually accommodated immediately.


Jack

Reply via email to