[128609] in North American Network Operators' Group
Re: Lightly used IP addresses
daemon@ATHENA.MIT.EDU (John R. Levine)
Fri Aug 13 14:16:00 2010
Date: 13 Aug 2010 14:15:51 -0400
From: "John R. Levine" <johnl@iecc.com>
To: "Owen DeLong" <owen@delong.com>
In-Reply-To: <77CE0974-8CC1-4D83-8723-EF661A9D9BF0@delong.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
>> I don't entirely understand the process. Here's the flow chart as far
>> as I've figured it out:
>>
>> 1. A sells a /20 of IPv4 space to B for, say, $5,000
>>
>> 2. A tells ARIN to transfer the chunk to B
>>
>> 3. ARIN says no, B hasn't shown that they need it
>>
>> 4. A and B say screw it, and B announces the space anyway
>>
>> 5. ???
>
> 6. ARIN receives a fraud/abuse complaint that A's space is being used by B.
> 7. ARIN discovers that A is no longer using the space in accordance with their RSA
> 8. ARIN reclaims the space and A and B are left to figure out who owes what to whom.
9. A and B ignore ARIN's email and continue to announce what they've been
announcing.
10. ARIN attempts to allocate the /20 to someone else, who is not amused.
Note that at this point ARIN presumably has no more v4 space left, so a
threat never to allocate more space to A or B isn't very scary. Given its
limited practical leverage, ARIN is only effective insofar as its members
and customers agree that playing by ARIN's rules is more beneficial than
ignoring them.
R's,
John