Why does abuse handling take so long ?

Florian Weimer fw at deneb.enyo.de
Sun Mar 13 21:33:11 UTC 2011


* Jeff Wheeler:

> On Sun, Mar 13, 2011 at 7:45 AM, Alexander Maassen
> <outsider at scarynet.org> wrote:
>> In most cases the only thing the abuse@ contacts do as hoster, is relay
>> the mail to the client but do not dare to do anything themself, even if
>
> The RIPE IRR database contains a systemic means for operators,
> responsible for IP address blocks, to exchange PGP-signed messages
> amongst each-other in relation to security incidents.  It
> unfortunately does not see much use: under 1% of allocations in RIPE's
> database include any reference to one of only 235 "incident response
> teams," which are conceptually similar to a POC.

Not that the IRTs are often not the party you want to talk to anyway.
They don't run the box, and in many cases, they don't even run the
network, so they can put in filters (even if they wanted).  In many
cases, the IRT object routes complaints *away* from the party who is
capable of taking action.




More information about the NANOG mailing list