[37879] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Query: What policies do backbone providers use to determine IP ownership?

daemon@ATHENA.MIT.EDU (Omachonu Ogali)
Fri May 25 08:56:23 2001

Date: Fri, 25 May 2001 08:47:08 -0400
From: Omachonu Ogali <missnglnk@informationwave.net>
To: Steve Gibbard <scg@gibbard.org>
Cc: nanog@merit.edu
Message-ID: <20010525084708.A28404@subtopia.informationwave.net>
Mail-Followup-To: Steve Gibbard <scg@gibbard.org>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.BSF.4.10.10105241920040.22586-100000@toodles.gibbard.org>; from scg@gibbard.org on Thu, May 24, 2001 at 07:25:14PM -0700
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, May 24, 2001 at 07:25:14PM -0700, Steve Gibbard wrote:
> 
> On Wed, 23 May 2001 jlewis@lewis.org wrote:
> 
> > Here's a related question.  Suppose provider A has a customer C who
> > multihomes with a connection to A and provider B.  C uses IP's assigned by
> > A.  C terminates service with A...but keeps announcing A's space to B.  B
> > propogates the routes to their peers.  B and C ignore requests that they
> > stop using A's space and renumber into B's.  How does A reclaim their
> > space?
> > 
> > One obvious solution is dueling routes...A could announce more specific
> > routes, fouling things up for B and C hoping this will serve as
> > encouragement for C to renumber.
> 
> And then C could announce more specific routes, and so forth, although
> you'll run into filters and start being ignored at some point.
> 
> That's really the sort of problem better resolved by lawyers than
> by engineers.
> 
> -Steve
> 
> --------------------------------------------------------------------------------
> Steve Gibbard				scg@gibbard.org	
> 
> 

Why go through all that mess? You call up their new upstream, say
you're a representative of XYZ, and customer ABC does not have
permission to announce your netblocks. I know InterNAP requires
that they get consent from the netblock contact, I don't know about
other companies.

And so it doesn't happen as a prank, while on phone with them, tell
the person to send an e-mail to the netblock contact, you open up the
e-mail and read it back to them for verification, it seriously can't
be that complicated. kthkxbye.
-- 
Omachonu Ogali
missnglnk@informationwave.net
http://www.informationwave.net


home help back first fref pref prev next nref lref last post