You are here: Home > Participate > Policy Development > Policy Proposals > Include Legacy Internet Resource Holders in the Abuse-c Policy

This policy proposal has been withdrawn

Include Legacy Internet Resource Holders in the Abuse-c Policy

Summary of Proposal

This proposal is about extending ripe-563, “Abuse Contact Management in the RIPE Database to Legacy Resource Holders.

Policy Text

a. Current policy text

The proposed modification adds a new section and does not modify the current policy text.

b. New policy text

New section:

1.0 Scope

This policy applies to:

  • Resources assigned and allocated by the RIPE NCC
  • Legacy Internet Resources (as defined in “RIPE NCC Services to Legacy Internet Resource Holders”). In these cases, the policy is applied when creating or modifying Legacy Internet Resource objects in the RIPE Database.


The policy ripe-563 (“Abuse Contact Management in the RIPE Database”) introduced the new contact attribute “abuse-c”. Although this attribute is mandatory for aut-num objects and directly-allocated inetnum and inet6num objects, it cannot be enforced for Legacy Internet Resources (see ripe-639, “RIPE NCC Services to Legacy Internet Resource Holders”, section 1.2, paragraph 2).

This difference in dealing with resources assigned or allocated by the RIPE NCC compared to Legacy Internet Resources leads not only to an inconsistent data model used in the RIPE Database but also to poor quality and a lack of abuse contacts for some resources in the database.

It will benefit the entire Internet community to have better quality abuse contact data.

a. Arguments supporting the proposal

  1. More consistent data model (at the end of the process).
  2. Simpler abuse contact finding tools.
  3. More accurate data for abuse contacts. If the Legacy Resource Holders will receive an error due to the improper creating or updating of Legacy Internet Resource objects, they will receive a dedicated friendly explanation about abuse-c instead of a generic error message.

b. Arguments opposing the proposal

  1. Some knowledge has to be gained and work has to be done by Legacy Resource Holders.
  2. The proposal has a long term effect, since some Legacy Internet Resource objects are stale and will not probably be changed in the near and predictable future.
Get Involved

The Anti-Abuse Working Group is open to anyone with an interest in combating network abuse. Areas such as cybersquatting and hosting illegal content are beyond the scope of the WG. The WG advises relevant parties such as Internet service providers (ISPs), governments and law enforcement agencies on both technical and non-technical methods of tackling abuse. This mailing list was previously the “anti-spam-wg”, the archives of which are still publicly available on the RIPE NCC website. To post a message to the list, send an email to [email protected]. Please note that only subscribers can post messages.