[db-wg] abuse-c
- Previous message (by thread): [db-wg] abuse-c
- Next message (by thread): [db-wg] abuse-c
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Menno Pieters (Stelvio)
menno.pieters at stelvio.nl
Mon Jan 12 12:22:46 CET 2004
TAYON, Julien wrote: > John Green <mailto:j.green at ukerna.ac.uk> wrote: > > >>I have never understood what this gives you. If "Evil Company" wants >>to misdirect abuse reports (why?) they can circumvent this by making >>a fake IRT object with IRT XYZ as the contact email address. >> > > > If people circumvent this they are either evil or incompetent which is > alreday a strong hint to be suspicious. Moreover the process of creating an IRT object is controlled by the RIPE-NCC, because it is like creating a maintainer object, or by organisations like TI that verify all data provided by the IRT, before inserting it in the RIPE database. Regards, Menno Pieters -- Menno Pieters - Stelvio Postbus 215, 3740 AE Baarn phone: +31-35-5.429.324 / fax: +31-35-5.429.327 XOIP: +31-84-8.720.349 / Web: http://www.stelvio.nl/
- Previous message (by thread): [db-wg] abuse-c
- Next message (by thread): [db-wg] abuse-c
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ db-wg Archives ]