It's been very quiet on the list since the frantic activity
at the end of last week. I expect day-to-day reality has
imposed itself.
I've done some further thinking, and have reviewed the contributions
last week on the db-wg list. I've tried to recognize the issues and
alternatives in this message and to make proposals as straw-men for
consensus.
I've used a bullet-point approach, as I think no-one is likely to
have time to read anything more discursive. I'll happily explain
anything that people find too terse.
Here goes ...
Attribute name
Name should be distinctive, eg: 'abuse-mailbox'; not 'e-mail'
Handle
Handle is upwardly scalable
Handle could refer to person, role, or maintainer
Value
Value is necessary; if not in primary object, then indirectly
Value in primary object is attractive at low end of scale
Value is vulnerable to RHS-hijacking, even if not in primary object!
Hint string
Trailing #-comment is easiest
RFC822 parens-comment as part of value is possible
Qualifier to attribute name would be neat, but may be difficult
to implement (eg: abuse-mailbox-{spam,security})
Proposal (1)
Advertisement (sysadmin) side
Use two attributes: one to hold value, the other to hold handle
Use attribute 'abuse-mailbox' to hold value
Use attribute name 'abuse-c' to hold indirect object handle
Allow use of 'abuse-mailbox' attribute in primary object
Encourage use of attribute in indirect object as best practice
Support all relevant indirect objects (person, role, maintainer)
in order to make it easy for sysadmins
We REALLY WANT sysadmins to ADOPT this (NAFS: no apol for shout)
Inheritance
Implemented in query tool: design and coding resource impact
Must be 'intuitive' for advertising sysadmin
Two axes: by reference to handle; by containing block
Priority: by reference first, but ...
Proposal (2)
Query side algorithm
Specifies behaviour of focused query tool
Sysadmins must take account when advertising
in order to align query result with their intent
Needs discussion:
Concept
Implementation: cost to implement, performance,
possible pruning of search tree
Given object (from inet*num, asnum, ...) and circumstances
To identify appropriate abuse contact
Find contact set for given object
Include tech-c.email value for given object if set is empty
Discard members of set unless circumstances match hint
Return survivor(s)
To find contact set
Start with empty set
Add all abuse-mailbox values found in current object
While set still empty visit abuse-c, mnt-c, tech-c ... (?)
Find contact set for visited object
Stop visiting as soon as set is no longer empty
While set still empty visit containing block
Find contact set for containing block (if any)
(Note: person, role, mntner have no containing block)
Stop visiting as soon as set is no longer empty
Return set
-- Ends --