[130370] in North American Network Operators' Group
Re: AS11296 -- Hijacked?
daemon@ATHENA.MIT.EDU (John Curran)
Fri Oct 1 17:34:13 2010
From: John Curran <jcurran@arin.net>
To: George Bonser <gbonser@seven.com>
Date: Fri, 1 Oct 2010 17:32:47 -0400
In-Reply-To: <5A6D953473350C4B9995546AFE9939EE0A52B09B@RWC-EX1.corp.seven.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
George -
Full agreement; the next step is defining a deterministic process for id=
entifying these specific resources which are hijacked, and then making a po=
licy for ARIN to act. We have a duty of stewardship, so addressing this pr=
oblem is a priority if the community directs us to do so via policy.
/John
On Oct 1, 2010, at 5:12 PM, George Bonser <gbonser@seven.com> wrote:
>=20
>=20
>> -----Original Message-----
>> From: Christopher Morrow=20
>> Sent: Friday, October 01, 2010 7:46 AM
>> To: Rich Kulawiec
>> Cc: nanog@nanog.org
>> Subject: Re: AS11296 -- Hijacked?
>>=20
>> this is still less than a /8, which lasts ~3 months in ARIN region and
>> less if you could across RIR's...
>=20
> Which is sort of like saying:
>=20
> Citizen: "Hello, police? There is a crate of M-16's and a truckload of
> ammunition just sitting here on the corner"
> Police: "That is less than the Army goes through in 3 months ...
> *click*"
>=20
> While true, it is orthogonal to the point being made which is if you
> collect those resources and issue them to legitimate operators, those
> are some 6.6 million unique hosts addresses than cannot be used for
> various nefarious activities.
>=20
>=20