Lightly used IP addresses
Jeffrey Lyon
jeffrey.lyon at blacklotus.net
Fri Aug 13 17:53:56 UTC 2010
9. I could point out so many cases of "justification abuse" or
outright fraudulent justification and I bet nothing would actually
transpire.
My two cents.
Jeff
On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <owen at delong.com> wrote:
>
> On Aug 13, 2010, at 10:36 AM, John Levine wrote:
>
>>> http://www.circleid.com/posts/psst_interested_in_some_lightly_used_ip_addresses/
>>> Discuss. :-)
>>
>> I don't entirely understand the process. Here's the flow chart as far
>> as I've figured it out:
>>
>> 1. A sells a /20 of IPv4 space to B for, say, $5,000
>>
>> 2. A tells ARIN to transfer the chunk to B
>>
>> 3. ARIN says no, B hasn't shown that they need it
>>
>> 4. A and B say screw it, and B announces the space anyway
>>
>> 5. ???
>>
>> R's,
>> John
>
> 6. ARIN receives a fraud/abuse complaint that A's space is being used by B.
> 7. ARIN discovers that A is no longer using the space in accordance with their RSA
> 8. ARIN reclaims the space and A and B are left to figure out who owes what to whom.
>
>
>
--
Jeffrey Lyon, Leadership Team
jeffrey.lyon at blacklotus.net | http://www.blacklotus.net
Black Lotus Communications of The IRC Company, Inc.
Follow us on Twitter at http://twitter.com/ddosprotection to find out
about news, promotions, and (gasp!) system outages which are updated
in real time.
Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 -
21 to find out how to "protect your booty."
More information about the NANOG
mailing list