9. I could point out so many cases of "justification abuse" or outright fraudulent justification and I bet nothing would actually transpire.
My two cents. Jeff On Fri, Aug 13, 2010 at 10:14 PM, Owen DeLong <o...@delong.com> wrote: > > On Aug 13, 2010, at 10:36 AM, John Levine wrote: > >>> http://www.circleid.com/posts/psst_interested_in_some_lightly_used_ip_addresses/ >>> Discuss. :-) >> >> I don't entirely understand the process. Here's the flow chart as far >> as I've figured it out: >> >> 1. A sells a /20 of IPv4 space to B for, say, $5,000 >> >> 2. A tells ARIN to transfer the chunk to B >> >> 3. ARIN says no, B hasn't shown that they need it >> >> 4. A and B say screw it, and B announces the space anyway >> >> 5. ??? >> >> R's, >> John > > 6. ARIN receives a fraud/abuse complaint that A's space is being used by > B. > 7. ARIN discovers that A is no longer using the space in accordance with > their RSA > 8. ARIN reclaims the space and A and B are left to figure out who owes > what to whom. > > > -- Jeffrey Lyon, Leadership Team jeffrey.l...@blacklotus.net | http://www.blacklotus.net Black Lotus Communications of The IRC Company, Inc. Follow us on Twitter at http://twitter.com/ddosprotection to find out about news, promotions, and (gasp!) system outages which are updated in real time. Platinum sponsor of HostingCon 2010. Come to Austin, TX on July 19 - 21 to find out how to "protect your booty."