[124645] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: legacy /8

daemon@ATHENA.MIT.EDU (Rich Kulawiec)
Sat Apr 3 07:50:34 2010

Date: Sat, 3 Apr 2010 07:49:45 -0400
From: Rich Kulawiec <rsk@gsp.org>
To: NANOG list <nanog@nanog.org>
In-Reply-To: <4BB65B39.8010902@mompl.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


A more productive approach might, and I emphasize *might*, be to identify
those allocations which are hijacked and/or in use by dedicated abuse
operations.  This would have the desirable side effect of depriving those
operations of resources, however it would also saddle subsequent owners
with the thorny problem of trying to use heavily-blacklisted allocations.
And as others in the thread have observed, it would only delay the
inevitable for a while.

---Rsk


home help back first fref pref prev next nref lref last post