[143909] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

resolving prefix hijacks (was Re: Prefix hijacking by Michael

daemon@ATHENA.MIT.EDU (Ken Chase)
Sun Aug 21 15:00:12 2011

Date: Sun, 21 Aug 2011 14:59:36 -0400
From: Ken Chase <ken@sizone.org>
To: nanog@nanog.org
In-Reply-To: <8C26A4FDAE599041A13EB499117D3C286B5322EC@ex-mb-1.corp.atlasnetworks.us>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, Aug 21, 2011 at 05:26:46PM +0000, Nathan Eisenberg said:

  >John Curran appears to be completely open to constructive suggestions, so
  if you have real and substantive input, why not contribute your intellect to
  the problem and talk to him?  Every organization has things they could be
  doing better, but as in physics, it often requires some new outside force to
  make it happen.

Well written.

That said, what is the de jure responce when a prefix is hijacked? Does
anyone have a 'best practices' guide? I am sure some of the most effective
vs legal practices are not in fact concomittant.

/kc
-- 
Ken Chase - ken@heavycomputing.ca skype:kenchase23 +1 416 897 6284 Toronto Canada
Heavy Computing - Clued bandwidth, colocation and managed linux VPS @151 Front St. W.


home help back first fref pref prev next nref lref last post