How to prove is authorized?

Richard A Steenbergen ras at
Fri May 2 15:05:03 UTC 2003

On Thu, May 01, 2003 at 11:36:55PM -0700, brett watson wrote:
> On Thursday, May 1, 2003, at 23:27 America/Phoenix, Sean Donelan wrote:
> >Back to the original question Chris Morrow asked a long time ago.  What
> >should be considered acceptable proof?
> >
> >If Paul Vixie showed up on my doorstep tomorrow, and asked me to route
> >; what proof should I accept from him (or anyone) to 
> >demostrate
> >beyond a reasonable doubt he has the authority to route a particular
> >network?
> oh!  i know!  because i know paul, and will personally vouch for him?

To which the response is usually something like:

"Then you are obviously a co-conspirator, and we will now begin
investigating your involvement. Please provide all of your information and
justify everything you are doing, before we post everything we can find on
you to a mailing list or newsgroup."

Richard A Steenbergen <ras at>
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)

More information about the NANOG mailing list