Abuse Desks

Tom Beecher beecher at beecher.cc
Wed Apr 29 17:55:22 UTC 2020


Well, I think our disagreement is on what we constitute 'legitimate abuse'
to be.

On Wed, Apr 29, 2020 at 1:51 PM Mukund Sivaraman <muks at mukund.org> wrote:

> On Wed, Apr 29, 2020 at 01:49:14PM -0400, Tom Beecher wrote:
> > What if I am at home, and while working on a project, fire off a wide
> > ranging nmap against say a /19 work network to validate something
> > externally? Should my ISP detect that and make a decision that I
> shouldn't
> > be doing that, even though it is completely legitimate and authorized
> > activity? What if I fat fingered a digit and accidentally ran that same
> > scan against someone else's /19? Should that accidental destination of
> > non-malicious scans be able to file an abuse report against me and get my
> > service disconnected because they didn't like it?
> >
> > Abuse departments should be properly handling LEGITIMATE abuse
> complaints.
> > Not crufty background noise traffic that is never going away.
>
> Sure. Handling legitimate abuse complaints would be quite sufficient. :)
>
>                 Mukund
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20200429/962ad036/attachment.html>


More information about the NANOG mailing list