28 Nov
2011
28 Nov
'11
10:08 p.m.
Hi,
Can you please clarify if the only requirement is that an abuse-c be published? For instance, if an LIR published an abuse-c with 100% bogus contact data, would that meet the requirements and so avoid the address space being reclaimed?
The reqiurement that is defined in the proposal is that an abuse-c has to be published. The abuse-c will reference a person, role or organization object. The abuse-c is not an object itself. This means, the bogus data will be handled in the same way bogus data is handled by RIPE NCC. Hope this clarifies your question. Thanks, Tobias -- abusix