George - Full agreement; the next step is defining a deterministic process for identifying these specific resources which are hijacked, and then making a policy for ARIN to act. We have a duty of stewardship, so addressing this problem is a priority if the community directs us to do so via policy.
/John On Oct 1, 2010, at 5:12 PM, George Bonser <gbon...@seven.com> wrote: > > >> -----Original Message----- >> From: Christopher Morrow >> Sent: Friday, October 01, 2010 7:46 AM >> To: Rich Kulawiec >> Cc: nanog@nanog.org >> Subject: Re: AS11296 -- Hijacked? >> >> this is still less than a /8, which lasts ~3 months in ARIN region and >> less if you could across RIR's... > > Which is sort of like saying: > > Citizen: "Hello, police? There is a crate of M-16's and a truckload of > ammunition just sitting here on the corner" > Police: "That is less than the Army goes through in 3 months ... > *click*" > > While true, it is orthogonal to the point being made which is if you > collect those resources and issue them to legitimate operators, those > are some 6.6 million unique hosts addresses than cannot be used for > various nefarious activities. > >