nanog mailing list archives

Re: Lightly used IP addresses


From: Jeffrey Lyon <jeffrey.lyon () blacklotus net>
Date: Fri, 13 Aug 2010 22:23:56 +0430

9. I could point out so many cases of "justification abuse" or
outright fraudulent justification and I bet nothing would actually
transpire.

My two cents.

Jeff


On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <owen () delong com> wrote:

On Aug 13, 2010, at 10:36 AM, John Levine wrote:

http://www.circleid.com/posts/psst_interested_in_some_lightly_used_ip_addresses/
Discuss.  :-)

I don't entirely understand the process.  Here's the flow chart as far
as I've figured it out:

1.  A sells a /20 of IPv4 space to B for, say, $5,000

2.  A tells ARIN to transfer the chunk to B

3.  ARIN says no, B hasn't shown that they need it

4.  A and B say screw it, and B announces the space anyway

5.  ???

R's,
John

6.      ARIN receives a fraud/abuse complaint that A's space is being used by B.
7.      ARIN discovers that A is no longer using the space in accordance with their RSA
8.      ARIN reclaims the space and A and B are left to figure out who owes what to whom.






-- 
Jeffrey Lyon, Leadership Team
jeffrey.lyon () blacklotus net | http://www.blacklotus.net
Black Lotus Communications of The IRC Company, Inc.

Follow us on Twitter at http://twitter.com/ddosprotection to find out
about news, promotions, and (gasp!) system outages which are updated
in real time.

Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 -
21 to find out how to "protect your booty."


Current thread: