|Synopsis||The Internet community is based on collaboration. In many cases, however, this is not enough and we all need to be able to contact those LIRs which may be experiencing a problem in their networks and may not be aware of the situation.|
This proposal aims to solve this problem by means of a simple, periodic verification of IRT object emails, and establishes the basic rules for performing such verification and thus avoids unnecessary costs to third parties who need to contact the persons responsible for solving the abuses of a specific network.
The proposal guarantees that the cost of processing the abuse falls on the LIR whose client is causing the abuse (and from whom they receive financial compensation for the service), instead of falling on the victim, as would be the case if they had to resort to the courts, thus avoiding costs (lawyers, solicitors, etc.) and saving time for both parties.
|Current status||Reached consensus at APNIC 46 Policy SIG and AMM.|
|Author||Jordi Palet Martínez and Aftab Siddiqui|
|Relevant forum||Policy SIG|
|Status at other RIRs||A similar proposal is being discussed in LACNIC and being prepared for AfriNIC and RIPE NCC. Currently, ARIN conducts an annual POC (point of contact) validation and RIPE NCC validates the “abuse-mailbox:” attribute annually (ripe-705).|
|17 August 2018||Version 1 posted to the Policy SIG mailing list for discussion and community development.|
|17 September 2018|
Version 1 of the proposal posted to the APNIC Policy SIG mailing list for the Final Comment period.
|5-7 December 2018||Endorsedby APNIC Executive Council.|
|09 April 2019||Editorial comment period announcement.|