[95908] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Abuse procedures... Reality Checks

daemon@ATHENA.MIT.EDU (Douglas Otis)
Mon Apr 9 18:05:29 2007

In-Reply-To: <g3wt0murbx.fsf@sa.vix.com>
Cc: nanog@merit.edu
From: Douglas Otis <dotis@mail-abuse.org>
Date: Mon, 9 Apr 2007 15:04:09 -0700
To: Paul Vixie <vixie@vix.com>
Errors-To: owner-nanog@merit.edu



On Apr 8, 2007, at 9:03 PM, Paul Vixie wrote:
> dotis@mail-abuse.org (Douglas Otis) writes:
>
>> Good advise.  For various reasons, a majority of IP addresses  
>> within a CIDR of any size being abusive is likely to cause the  
>> CIDR to be blocked. While a majority could be considered as being  
>> half right, the existence of the "bad neighborhood" demonstrates a  
>> lack of oversight for the entire CIDR, which is also fairly  
>> predictive of future abuse.
>
> that sounds like a continuum, but my experience requires more  
> dimensions than you're describing.  for example, this weekend two / 
> 24's were hijacked and used for spam spew.

Agreed.

This was expressed recently as well.

http://www.merit.edu/mail.archives/nanog/msg05351.html

CIDRs should also conform with ASN boundaries and reputation tracks  
with announcements.

Unfortunately an effort to create a black-hole operator's BCP failed  
to consider these issues.  Many building their own reputation  
histories will also likely ignore this concern.  This means John's  
advice remains valid, whether fair or not.  Adopting transient  
tracking methods cope with this problem.

-Doug

home help back first fref pref prev next nref lref last post