[139244] in North American Network Operators' Group
Re: HIJACKED: 148.163.0.0/16 -- WTF? Level3 is now doing IP
daemon@ATHENA.MIT.EDU (Christopher Morrow)
Thu Mar 31 05:48:47 2011
In-Reply-To: <1FA9176F-1661-4242-9FBF-6FD1BA259954@delong.com>
Date: Thu, 31 Mar 2011 11:48:41 +0200
From: Christopher Morrow <morrowc.lists@gmail.com>
To: Owen DeLong <owen@delong.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>, Brandon Ross <bross@pobox.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Thu, Mar 31, 2011 at 7:57 AM, Owen DeLong <owen@delong.com> wrote:
>
> On Mar 30, 2011, at 10:26 PM, Suresh Ramasubramanian wrote:
>
>> It also needs
>>
>> 1. Someone to complain to law enforcement
>>
> True,
as has been brought up in the past here... some folk rely heavily upon
IRR data for route prefix filtering. if the object is in the IRR
database (with the right linkages), it gets permitted in router
filters automagically.
-chris
(being able to validate 'ownership', really authorization to route,
automatically will sure be nice, eh?)