You are here: Home > Participate > Policy Development > Policy Proposals > Include Legacy Internet Resource Holders in the Abuse-c Policy

Changes to Include Legacy Internet Resource Holders in the Abuse-c Policy

Legend (+) Added (-) Deleted
Changed Tag Added Tag Deleted

Summary of Proposal

The This proposal is about extending RIPE Document ripe-563, “ ripe-563 delete: </a> , “Abuse Abuse Contact Management in the RIPE Database”, Database insert: </a> to Legacy Internet Resource Holders.

delete: <h2> delete: </h2>

Policy Text

a. Current policy text

The proposed modification adds a new section to and does not modify the current policy text.

b. New policy text

New section:

1.0 Scope

This policy applies to:

  • Internet resources Resources assigned and allocated by the RIPE NCC
  • Legacy Internet Resources as (as defined in RIPE Document, RIPE NCC Services to Legacy Internet Resource Holders ”). In these cases, the policy is applied when creating or modifying Legacy Internet Resource objects in the RIPE Database.
delete: <h2> delete: </h2>

Rationale

The policy ripe-563 (“ ripe-563 Abuse Contact Management in the RIPE Database ”) introduced the new contact attribute, “abuse-c:”. attribute “abuse-c”. Although this attribute is mandatory for all delete: <b> aut-num delete: </b> objects and for at least every direct allocated delete: <b> directly-allocated inetnum delete: </b> and delete: <b> and inet6num delete: </b> object, objects, it cannot be enforced on Legacy Internet Resources. (See delete: <a class="external-link" href="https://www.ripe.net/publications/docs/ripe-639#1-2-scope" target="_self" title=""> ripe-639 delete: </a> , for Legacy Internet Resources (see ripe-639, delete: <span class="external-link"> insert: <a class="internal-link" href="resolveuid/3bc32d39af6d485c89f3f845b703db80#1-2-scope" target="_self" title="" data-val="3bc32d39af6d485c89f3f845b703db80#1-2-scope" data-linktype="internal"> RIPE NCC Services to Legacy Internet Resource delete: <b> delete: </b> Holders delete: </span> insert: </a> ”, section 1.2, paragraph 2.) 2).

This difference in dealing with resources assigned or allocated by the RIPE NCC versus compared to Legacy Internet Resources leads not only to an inconsistent data model used in the RIPE Database but also to poor data quality or and a lack of abuse contacts for some resources entered into in the database.

It will be a benefit for the entire Internet community to have better quality of abuse contact data.

delete: <h4> insert: <h3>

a. Arguments supporting the proposal delete: </h4> delete: <ul> insert: </h3>

insert: <ol>
  1. More consistent data model delete: </li> delete: <li> Better data quality (at the end of the process). insert: </li>
  2. insert: <li>
  3. Simpler abuse contact finding tools.
  4. More accurate data for abuse contact delete: </li> delete: </ul> contacts. If the Legacy Resource Holders will receive an error due to the improper creating or updating of Legacy Internet Resource objects, they will receive a dedicated friendly explanation about abuse-c instead of a generic error message. insert: </li>
  5. insert: </ol>

b. Arguments opposing the proposal

delete: <ul> insert: <ol>
  1. Some knowledge has to be gained and work has to be done by Legacy Internet Resource Holders delete: </li> delete: <li> Some abuse-c contacts have to Resource Holders. insert: </li>
  2. insert: <li>
  3. The proposal has a long term effect, since some Legacy Internet Resource objects are stale and will not probably be entered into the RIPE Database by the RIPE NCC (as done in the past). delete: </li> delete: </ul> changed in the near and predictable future. insert: </li>
  4. insert: </ol>

How to read this draft document:

This document relates to the policy proposal 2016-01, “ Include Legacy Internet Resource Holders in the Abuse-c Policy ”. If approved, it will modify ripe-563 . To show you how the new document would be different to the old one, we have highlighted any new text or changes to the existing text.

We indicate changes to existing text in the document like this:

delete: <col width="280">delete: <col width="280">insert: <col width="50%">insert: <col width="50%">

ORIGINAL TEXT

NEW TEXT

The text from the current policy document that will be replaced is displayed here.

The proposed text change will be displayed here.

insert: <p class="WW-Default">

  insert: </p>

insert: <div>

insert: </div>

Abstract

delete: <p class=" "> insert: <p>

This policy originated from the work of the Abuse Contact Management Task Force. The task force examined the collection and maintenance of resource registration information in the RIPE Database, including potential areas for improvement and alternative approaches.

delete: <p class=" "> insert: <p>

This policy introduces a new contact attribute named "abuse-c:”, that can be included in inetnum , inet6num and aut-num objects. insert: <br />
insert: <br />

delete: <col width="280">delete: <col width="280">insert: <col width="50%">insert: <col width="50%">delete: <td>delete: <h4 class=" ">insert: <td class=" ">delete: <td>delete: <h4 class=" ">insert: <td class=" ">
insert: <h2>

Content delete: </h4> delete: <p class=" "> delete: <b> 1.0 Abuse insert: </h2>

insert: <b> insert: <a class="anchor-link" href="#abuse-contact-information"> 1.0 Abuse Contact Information delete: <br /> 2.0 Attribution delete: </b> delete: </p> insert: </a> insert: </b> insert: <br />
insert: <b> insert: <a class="anchor-link" href="#attribution"> 2.0 Attribution insert: </a> insert: </b>
insert: <h2 class=" ">

Content delete: <b> delete: <span class="newdifftext"> delete: </span> delete: </b> delete: </h4> insert: </h2>

1.0 Scope
2. delete: </span> 2 insert: </span> . insert: </b>
insert: <b> 0 Abuse Contact Information
3. delete: </span> 3 insert: </span> . insert: </b>
insert: <b> 0 Attribution

delete: <p class=" "> insert: <h3 class=" ">

1.0 Scope delete: </p> insert: </h3>

This policy applies to:

  • Internet resources assigned and allocated by RIPE NCC
  • Legacy Internet Resources as (as defined in RIPE Document, RIPE NCC Services to Legacy Internet Resource Holders ”). In these cases, the policy is applied when creating or modifying Legacy Internet Resource objects in the RIPE Database.
delete: <p> insert: <p class=" ">

 

2.0 insert: <a name="abuse-contact-information"> insert: </a> 1.0 Abuse Contact Information

The "abuse-c:" will reference a role object holding abuse contact information. The positioning of the “abuse-c:” attributes will make use of the hierarchical nature of the resource data to minimize the workload on resource holders. Internet number resources need to have an “abuse-c:” attribute.

The “abuse-c:” will be mandatory for all aut-num s.

Due the hierarchical nature of IP address objects, at least every direct allocated inetnum and inet6num needs to have an “abuse-c:”. Inherited objects might have their own “abuse-c:” attribute or they will be covered by the higher level objects.

The role objects used for abuse contact information will be required to contain a single “abuse-mailbox:” attribute which is intended for receiving automatic and manual reports about abusive behavior originating in the resource holders’ networks.

The “abuse-mailbox:” attribute must be available in an unrestricted way via whois, APIs and future techniques.

As per current practice, other "e-mail:" attributes can be included for any other purposes. delete: </p> delete: <p class=" ">   insert: <br />
insert: <br />

3.0 insert: <a name="attribution"> insert: </a> 2.0 Attribution

This document is developed by the RIPE community.

delete: <p> insert: <p class=" ">

The following people actively contributed by making proposals through the RIPE Policy Development Process: delete: </p> delete: <p> insert: <br />
Tobias Knecht delete: </p> delete: <p>   delete: </p> insert: <br />
insert: <br />
insert: </p>

Get Involved

The Anti-Abuse Working Group is open to anyone with an interest in combating network abuse. Areas such as cybersquatting and hosting illegal content are beyond the scope of the WG. The WG advises relevant parties such as Internet service providers (ISPs), governments and law enforcement agencies on both technical and non-technical methods of tackling abuse. This mailing list was previously the “anti-spam-wg”, the archives of which are still publicly available on the RIPE NCC website. To post a message to the list, send an email to anti-abuse-w[email protected]. Please note that only subscribers can post messages.

RIPE Forum

The RIPE Forum is an additional way to participate in RIPE community mailing list discussions using a web-based interface rather than an email client.

Check out the forum

Please contact if you need more information.

Stay up to date!

Follow @PDO_RIPE_NCC on Twitter.