[130575] in North American Network Operators' Group
Re: New hijacking - Done via via good old-fashioned Identity Theft
daemon@ATHENA.MIT.EDU (Ben McGinnes)
Wed Oct 6 09:35:32 2010
Date: Thu, 07 Oct 2010 00:35:06 +1100
From: Ben McGinnes <ben@adversary.org>
To: Eric Brunner-Williams <brunner@nic-naa.net>
In-Reply-To: <4CAC74DB.8010803@nic-naa.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE5DACCB49793F904330FCB9C
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
On 7/10/10 12:08 AM, Eric Brunner-Williams wrote:
> so ... should domains associated with asn(s) and addr block allocations=
> be subject to some expiry policy other than "it goes into the drop pool=
> and one of {enom,pool,...} acquire it (and the associated non-traffic
> assets) for any interested party at $50 per /24"?
Interesting idea, but how do you apply it to ccTLD domains with widely
varying policies. All it takes is whois records being legitimately
updated to use domain contacts using a ccTLD domain to circumvent.
Sounds like more of a stop-gap measure.
Regards,
Ben
--------------enigE5DACCB49793F904330FCB9C
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkysexQACgkQNxrFv6BK4xPnfACdHcn1iczlERi5L5w9xQ5HSFLA
recAn2maNZ303Uoeysfy50637Xq3QZ/Q
=yyvl
-----END PGP SIGNATURE-----
--------------enigE5DACCB49793F904330FCB9C--