Lightly used IP addresses

Jeffrey Lyon jeffrey.lyon at blacklotus.net
Fri Aug 13 12:53:56 CDT 2010


9. I could point out so many cases of "justification abuse" or
outright fraudulent justification and I bet nothing would actually
transpire.

My two cents.

Jeff


On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <owen at delong.com> wrote:
>
> On Aug 13, 2010, at 10:36 AM, John Levine wrote:
>
>>> http://www.circleid.com/posts/psst_interested_in_some_lightly_used_ip_addresses/
>>> Discuss.  :-)
>>
>> I don't entirely understand the process.  Here's the flow chart as far
>> as I've figured it out:
>>
>> 1.  A sells a /20 of IPv4 space to B for, say, $5,000
>>
>> 2.  A tells ARIN to transfer the chunk to B
>>
>> 3.  ARIN says no, B hasn't shown that they need it
>>
>> 4.  A and B say screw it, and B announces the space anyway
>>
>> 5.  ???
>>
>> R's,
>> John
>
> 6.      ARIN receives a fraud/abuse complaint that A's space is being used by B.
> 7.      ARIN discovers that A is no longer using the space in accordance with their RSA
> 8.      ARIN reclaims the space and A and B are left to figure out who owes what to whom.
>
>
>



-- 
Jeffrey Lyon, Leadership Team
jeffrey.lyon at blacklotus.net | http://www.blacklotus.net
Black Lotus Communications of The IRC Company, Inc.

Follow us on Twitter at http://twitter.com/ddosprotection to find out
about news, promotions, and (gasp!) system outages which are updated
in real time.

Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 -
21 to find out how to "protect your booty."




More information about the NANOG mailing list