Lightly used IP addresses
jeffrey.lyon at blacklotus.net
Fri Aug 13 12:53:56 CDT 2010
9. I could point out so many cases of "justification abuse" or
outright fraudulent justification and I bet nothing would actually
My two cents.
On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <owen at delong.com> wrote:
> On Aug 13, 2010, at 10:36 AM, John Levine wrote:
>>> Discuss. :-)
>> I don't entirely understand the process. Here's the flow chart as far
>> as I've figured it out:
>> 1. A sells a /20 of IPv4 space to B for, say, $5,000
>> 2. A tells ARIN to transfer the chunk to B
>> 3. ARIN says no, B hasn't shown that they need it
>> 4. A and B say screw it, and B announces the space anyway
>> 5. ???
> 6. ARIN receives a fraud/abuse complaint that A's space is being used by B.
> 7. ARIN discovers that A is no longer using the space in accordance with their RSA
> 8. ARIN reclaims the space and A and B are left to figure out who owes what to whom.
Jeffrey Lyon, Leadership Team
jeffrey.lyon at blacklotus.net | http://www.blacklotus.net
Black Lotus Communications of The IRC Company, Inc.
Follow us on Twitter at http://twitter.com/ddosprotection to find out
about news, promotions, and (gasp!) system outages which are updated
in real time.
Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 -
21 to find out how to "protect your booty."
More information about the NANOG