[149121] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: US DOJ victim letter

daemon@ATHENA.MIT.EDU (bmanning@vacation.karoshi.com)
Sat Jan 28 11:32:10 2012

Date: Sat, 28 Jan 2012 16:30:47 +0000
From: bmanning@vacation.karoshi.com
To: Martin Hannigan <hannigan@gmail.com>
In-Reply-To: <CAMDXq5OiJ-gXeZW=MmLCD_PznnHyGfHjiMs=i1k2e_b1-S27OA@mail.gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Jan 27, 2012 at 10:20:08PM -0500, Martin Hannigan wrote:
> On Fri, Jan 27, 2012 at 1:32 PM, Randy Epstein <nanog@hostleasing.net> wrote:
> >
> >
> > On 1/27/12 1:23 PM, "Valdis.Kletnieks@vt.edu" <Valdis.Kletnieks@vt.edu>
> > wrote:
> >
> >>On Fri, 27 Jan 2012 13:16:27 EST, Bryan Horstmann-Allen said:
> >>
> >>> Bit odd, if it's a phish. Even more odd if it's actually from the Fed.
> >>
> >>What if it's a phish from a compromised Fed box? :)
> >
> > We've spoken to folks at various FBI field offices and at 26 Plaza in New
> > York which is handling this case.  Further, John Curran (ARIN CEO) has
> > confirmed it's real via their own liaison and Paul Vixie is actually
> > working with them on this.
> >
> 
> 
> It's definitely real.
> 
> Best,
> 
> -M<
> 

	I missed the part where ARIN turned over its address database w/ associatedd
	registration information to the Fed ... I mean I've always advocated for 
	LEO access, but ther has been significant pushback fromm the community on
	unfettered access to that data.  As I recall, there are even policies and
	processes to limit/restrict external queries to prevent a DDos of the whois
	servers.  And some fairly strict policies on who gets dumps of the address
	space.  As far as I know (not very far) bundling the address database
	-and- the registration data are not available to mere mortals.

	So - just how DID the Fed get the data w/o violating ARIN policy?

/bill



home help back first fref pref prev next nref lref last post