* Jeff Wheeler:
On Sun, Mar 13, 2011 at 7:45 AM, Alexander Maassen <outsider@scarynet.org> wrote:
In most cases the only thing the abuse@ contacts do as hoster, is relay the mail to the client but do not dare to do anything themself, even if
The RIPE IRR database contains a systemic means for operators, responsible for IP address blocks, to exchange PGP-signed messages amongst each-other in relation to security incidents. It unfortunately does not see much use: under 1% of allocations in RIPE's database include any reference to one of only 235 "incident response teams," which are conceptually similar to a POC.
Not that the IRTs are often not the party you want to talk to anyway. They don't run the box, and in many cases, they don't even run the network, so they can put in filters (even if they wanted). In many cases, the IRT object routes complaints *away* from the party who is capable of taking action.