On Mon, Oct 24, 2022 at 1:02 PM Leo Vegoda <leo@vegoda.org> wrote:
Hi Jan,
Hi, Leo!
On Mon, 24 Oct 2022 at 03:50, Jan Ingvoldstad <frettled@gmail.com> wrote: Does this approach rely on the registered user knowing about their network and Internet connection? What happens when everything was installed by an external contractor?
I'm sorry, I don't understand. What does who installed a network have to do with this? You get in touch with an abuse contact, which is supposed to be whoever is responsible for handling abuse complaints for a network address. If a contractor's email address is somehow in there, then the contractor should know that their email address is listed as abuse contact, and when someone gets in touch about abusive content/behaviour hosted at A.B.C.D, either do something about it, or forward to the correct contact point. The same goes for any other scenario.
As I read the proposal, it is intended to allow LIRs to prune the records they believe do not add value. It would enable discretion, rather than blind obedience. Is that a negative? If so, why?
This is putting the cart before the horse. The proposal should argue why this is a positive. -- Jan