Hi Owen,

I will be interesting to have figures about this in all the RIRs. How many are 
members, how many not, how many are clearly intentional vs fat fingers, etc.

Somebody already replied with an example of a member hijacking ... and this is 
interesting, because you know the excuse I get every other day from spammers 
that keep using my email addresses when I complain because they haven't deleted 
them from their databases?

"I'm sorry, it was a mistake, we deleted your email from the wrong database" 
"we recovered it from the wrong backup" day after day even if they have no 
right to firstly register my email without previous and explicit consent !

I know is a totally different topic but a good way to respond if members follow 
rules/policies/laws and is good or not to remember those rules with explicit 
text, so excuses are not longer excusable.

Regards,
Jordi
 

El 27/4/19 1:30, "Owen DeLong" <[email protected]> escribió:

    
    
    > On Apr 26, 2019, at 13:54 , JORDI PALET MARTINEZ 
<[email protected]> wrote:
    > 
    > Hi Owen,
    > 
    > So, you believe that if an ARIN member is repeatedly misusing the 
resources from another member, is just fine and the ARIN membership which rules 
are the policies, should not care about this behavior and members should not 
get their exclusive rights to use their allocated resources protected by 
policies?
    
    No… I believe that it is unlikely that ARIN members are the ones repeatedly 
misusing the resources.
    
    Really, do you have some reason to believe that the majority of hijackers 
are actually RIR members? I have pretty strong reason based on both 
experience/observation of past hijacking events and my understanding of the 
social fabric of RIRs to believe that is unlikely.
    
    > In other words. Will you at least support something in the line of:
    > "The resources are allocated for the exclusive use of the recipient. 
Consequently, other members can't use them (unless authorized by the legitimate 
resource-holder) and not following this rule is a policy violation”.
    
    Sure, but what’s the point? If it’s non-members that are committing the 
hijacking (and I believe that is the case), what good does a restriction on 
other members do?
    
    It’s sort of like saying “Law abiding citizens, please be aware that 
breaking the law will make you a non-law abiding citizen.”
    
    It’s a lovely little tautology, but at the end of the day, it’s still a 
no-op.
    
    Owen
    
    



**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.



_______________________________________________
ARIN-PPML
You are receiving this message because you are subscribed to
the ARIN Public Policy Mailing List ([email protected]).
Unsubscribe or manage your mailing list subscription at:
https://lists.arin.net/mailman/listinfo/arin-ppml
Please contact [email protected] if you experience any issues.

Reply via email to