nanog mailing list archives

Re: Why does abuse handling take so long ?


From: Florian Weimer <fw () deneb enyo de>
Date: Sun, 13 Mar 2011 22:33:11 +0100

* Jeff Wheeler:

On Sun, Mar 13, 2011 at 7:45 AM, Alexander Maassen
<outsider () scarynet org> wrote:
In most cases the only thing the abuse@ contacts do as hoster, is relay
the mail to the client but do not dare to do anything themself, even if

The RIPE IRR database contains a systemic means for operators,
responsible for IP address blocks, to exchange PGP-signed messages
amongst each-other in relation to security incidents.  It
unfortunately does not see much use: under 1% of allocations in RIPE's
database include any reference to one of only 235 "incident response
teams," which are conceptually similar to a POC.

Not that the IRTs are often not the party you want to talk to anyway.
They don't run the box, and in many cases, they don't even run the
network, so they can put in filters (even if they wanted).  In many
cases, the IRT object routes complaints *away* from the party who is
capable of taking action.


Current thread: