nanog mailing list archives
Re: legacy /8
From: Rich Kulawiec <rsk () gsp org>
Date: Sat, 3 Apr 2010 07:49:45 -0400
A more productive approach might, and I emphasize *might*, be to identify those allocations which are hijacked and/or in use by dedicated abuse operations. This would have the desirable side effect of depriving those operations of resources, however it would also saddle subsequent owners with the thorny problem of trying to use heavily-blacklisted allocations. And as others in the thread have observed, it would only delay the inevitable for a while. ---Rsk
Current thread:
- RE: legacy /8, (continued)
- RE: legacy /8 George Bonser (Apr 03)
- Re: legacy /8 Randy Bush (Apr 02)
- Re: legacy /8 Jim Burwell (Apr 03)
- Re: legacy /8 Bill Bogstad (Apr 03)
- Re: legacy /8 Dan White (Apr 02)
- Re: legacy /8 Brielle Bruns (Apr 02)
- Re: legacy /8 David Conrad (Apr 02)
- Re: legacy /8 Brielle Bruns (Apr 02)
- Re: legacy /8 Valdis . Kletnieks (Apr 02)
- Re: legacy /8 David Conrad (Apr 02)
- Re: legacy /8 Owen DeLong (Apr 03)