[130575] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New hijacking - Done via via good old-fashioned Identity Theft

daemon@ATHENA.MIT.EDU (Ben McGinnes)
Wed Oct 6 09:35:32 2010

Date: Thu, 07 Oct 2010 00:35:06 +1100
From: Ben McGinnes <ben@adversary.org>
To: Eric Brunner-Williams <brunner@nic-naa.net>
In-Reply-To: <4CAC74DB.8010803@nic-naa.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE5DACCB49793F904330FCB9C
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 7/10/10 12:08 AM, Eric Brunner-Williams wrote:
> so ... should domains associated with asn(s) and addr block allocations=

> be subject to some expiry policy other than "it goes into the drop pool=

> and one of {enom,pool,...} acquire it (and the associated non-traffic
> assets) for any interested party at $50 per /24"?

Interesting idea, but how do you apply it to ccTLD domains with widely
varying policies.  All it takes is whois records being legitimately
updated to use domain contacts using a ccTLD domain to circumvent.
Sounds like more of a stop-gap measure.


Regards,
Ben



--------------enigE5DACCB49793F904330FCB9C
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkysexQACgkQNxrFv6BK4xPnfACdHcn1iczlERi5L5w9xQ5HSFLA
recAn2maNZ303Uoeysfy50637Xq3QZ/Q
=yyvl
-----END PGP SIGNATURE-----

--------------enigE5DACCB49793F904330FCB9C--


home help back first fref pref prev next nref lref last post