George - Full agreement; the next step is defining a deterministic process for identifying these specific resources which are hijacked, and then making a policy for ARIN to act. We have a duty of stewardship, so addressing this problem is a priority if the community directs us to do so via policy. /John On Oct 1, 2010, at 5:12 PM, George Bonser <gbonser@seven.com> wrote:
-----Original Message----- From: Christopher Morrow Sent: Friday, October 01, 2010 7:46 AM To: Rich Kulawiec Cc: nanog@nanog.org Subject: Re: AS11296 -- Hijacked?
this is still less than a /8, which lasts ~3 months in ARIN region and less if you could across RIR's...
Which is sort of like saying:
Citizen: "Hello, police? There is a crate of M-16's and a truckload of ammunition just sitting here on the corner" Police: "That is less than the Army goes through in 3 months ... *click*"
While true, it is orthogonal to the point being made which is if you collect those resources and issue them to legitimate operators, those are some 6.6 million unique hosts addresses than cannot be used for various nefarious activities.