[130633] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New hijacking - Done via via good old-fashioned Identity Theft

daemon@ATHENA.MIT.EDU (Ben McGinnes)
Wed Oct 6 22:45:21 2010

Date: Thu, 07 Oct 2010 13:44:49 +1100
From: Ben McGinnes <ben@adversary.org>
To: Eric Brunner-Williams <brunner@nic-naa.net>
In-Reply-To: <4CACCDF9.90801@nic-naa.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig0E914BDA3EAC01E231388E3D
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 7/10/10 6:28 AM, Eric Brunner-Williams wrote:
> On 10/6/10 10:34 AM, Owen DeLong wrote:
>>
>> Number resources are not and should not be associated with domain
>> resources at the policy level. This would make absolutely no sense
>> whatsoever.
>=20
> hmm. ... "are not" ... so the event complained of ... didn't happen?

The key issue here is more the "should not" aspect, which I agree with,
but that these records are frequently used by netops to verify a
request.  There really needs to be a greater standardised level of due
diligence regarding advertisement requests that checks more than whether
a request is coming from a seemingly legitimate email address.


Regards,
Ben


--------------enig0E914BDA3EAC01E231388E3D
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytNCoACgkQNxrFv6BK4xNTegCeOLEfvlbevL4NkPOkxcLXQbjn
7hsAoPNXFCryoeDFu43yqprLI5tdi+Hy
=koFO
-----END PGP SIGNATURE-----

--------------enig0E914BDA3EAC01E231388E3D--


home help back first fref pref prev next nref lref last post