9. I could point out so many cases of "justification abuse" or outright fraudulent justification and I bet nothing would actually transpire. My two cents. Jeff On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <owen@delong.com> wrote:
On Aug 13, 2010, at 10:36 AM, John Levine wrote:
http://www.circleid.com/posts/psst_interested_in_some_lightly_used_ip_addres... Discuss. :-)
I don't entirely understand the process. Here's the flow chart as far as I've figured it out:
1. A sells a /20 of IPv4 space to B for, say, $5,000
2. A tells ARIN to transfer the chunk to B
3. ARIN says no, B hasn't shown that they need it
4. A and B say screw it, and B announces the space anyway
5. ???
R's, John
6. ARIN receives a fraud/abuse complaint that A's space is being used by B. 7. ARIN discovers that A is no longer using the space in accordance with their RSA 8. ARIN reclaims the space and A and B are left to figure out who owes what to whom.
-- Jeffrey Lyon, Leadership Team jeffrey.lyon@blacklotus.net | http://www.blacklotus.net Black Lotus Communications of The IRC Company, Inc. Follow us on Twitter at http://twitter.com/ddosprotection to find out about news, promotions, and (gasp!) system outages which are updated in real time. Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 - 21 to find out how to "protect your booty."