[95941] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Abuse procedures... Reality Checks

daemon@ATHENA.MIT.EDU (Douglas Otis)
Wed Apr 11 17:04:05 2007

In-Reply-To: <90B28D53-46ED-4E1A-841F-87805D418ADF@kumari.net>
Cc: nanog <nanog@merit.edu>
From: Douglas Otis <dotis@mail-abuse.org>
Date: Wed, 11 Apr 2007 14:02:57 -0700
To: Warren Kumari <warren@kumari.net>
Errors-To: owner-nanog@merit.edu



On Apr 11, 2007, at 10:32 AM, Warren Kumari wrote:

> Perhaps you could write a nice, simple, friendly guide explaining  
> how you ensure that your network is never the source of malicious  
> traffic?

Identify your ownership, and ensure contact information is accurate  
and well attended.  Inconsiderate anonymous behavior is a typical  
failing, where there is no excuse for remaining ignorant of abusive  
activity.

-Doug




home help back first fref pref prev next nref lref last post