[58063] in North American Network Operators' Group
Re: The in-your-face hijacking example, was: Re: Who is
daemon@ATHENA.MIT.EDU (Hank Nussbacher)
Wed Apr 30 02:28:57 2003
Date: Wed, 30 Apr 2003 09:26:47 +0200
To: "Christopher L. Morrow" <chris@UU.NET>
From: Hank Nussbacher <hank@att.net.il>
Cc: <nanog@merit.edu>
In-Reply-To: <Pine.GSO.4.33.0304300608050.16800-100000@rampart.argfrp.us
.uu.net>
Errors-To: owner-nanog-outgoing@merit.edu
At 06:09 AM 30-04-03 +0000, Christopher L. Morrow wrote:
>That may be true, but what does a provider do when they are presented with
>written 'authority to use address space' from a customer? Certianly if the
>customer provides 'proper' documentation that the ip space is available
>for them to route, and that they have authority from the 'owner' to do
>this... what is an ISP to do? Aside from route the blocks?
A very valid question and one that all too few ISPs handle. How many ISPs
have as part of their implementation/provisioning process an item called
"check IP address space against IRRs"?
I would suggest that written proof of ownership is not enough and that part
of the legal framework each ISP has customers complete that it state
something to the effect "IP address space and ASNs announced by the
customer must be properly registered in one of the online IRRs such as
ARIN, RADB, APNIC or RIPE and must reflect the name of the organization
placing the request."
-Hank