[58063] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: The in-your-face hijacking example, was: Re: Who is

daemon@ATHENA.MIT.EDU (Hank Nussbacher)
Wed Apr 30 02:28:57 2003

Date: Wed, 30 Apr 2003 09:26:47 +0200
To: "Christopher L. Morrow" <chris@UU.NET>
From: Hank Nussbacher <hank@att.net.il>
Cc: <nanog@merit.edu>
In-Reply-To: <Pine.GSO.4.33.0304300608050.16800-100000@rampart.argfrp.us
 .uu.net>
Errors-To: owner-nanog-outgoing@merit.edu


At 06:09 AM 30-04-03 +0000, Christopher L. Morrow wrote:

>That may be true, but what does a provider do when they are presented with
>written 'authority to use address space' from a customer? Certianly if the
>customer provides 'proper' documentation that the ip space is available
>for them to route, and that they have authority from the 'owner' to do
>this... what is an ISP to do? Aside from route the blocks?

A very valid question and one that all too few ISPs handle.  How many ISPs 
have as part of their implementation/provisioning process an item called 
"check IP address space against IRRs"?

I would suggest that written proof of ownership is not enough and that part 
of the legal framework each ISP has customers complete that it state 
something to the effect "IP address space and ASNs announced by the 
customer must be properly registered in one of the online IRRs such as 
ARIN, RADB, APNIC or RIPE and must reflect the name of the organization 
placing the request."

-Hank


home help back first fref pref prev next nref lref last post