<div dir="ltr"><div dir="ltr">





<p class="gmail-p1" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica">I must start by saying the authors of this proposal have done a great job, considering the negative effect of resource (IPv4, IPv6, ASN) hijacking to our region.</p>
<p class="gmail-p2" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica;min-height:14px"><br></p>
<p class="gmail-p1" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica">I do believe that since operational errors such as mistakes in BGP configurations can lead to what might be perceived as a resource hijacking activity (policy violation), it is ideal that this proposal gives the suspected resource hijacker a reasonable<span class="gmail-Apple-converted-space">  </span>amount of time to explain their actions.<span class="gmail-Apple-converted-space"> </span></p>
<p class="gmail-p2" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica;min-height:14px"><br></p>
<p class="gmail-p1" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica">The duration can be deliberated by the policy authors and other members. The suspected hijacker should be given a maximum of 6 weeks rather that 4 weeks to object any conclusions, as proposed by the authors.<span class="gmail-Apple-converted-space"> </span></p>
<p class="gmail-p2" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica;min-height:14px"><br></p>
<p class="gmail-p1" style="margin:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:12px;line-height:normal;font-family:Helvetica">This will further clarify if the activity is an act of persistent intentional hijack or an operational error.</p></div><div dir="ltr"><br></div><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sat, May 25, 2019 at 11:41 PM Dewole Ajao <<a href="mailto:dewole@forum.org.ng">dewole@forum.org.ng</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Good day AFRINIC PDWG Members,<br>
<br>
We have received a new policy Proposal -  "Provisions for Resource <br>
Hijacking (AFPUB-2019-GEN-001-DRAFT01)"<br>
<br>
 From the following authors:<br>
<br>
(a) Carlos Friacas | <a href="mailto:cfriacas@fccn.pt" target="_blank">cfriacas@fccn.pt</a> | FCT | FCCN<br>
(b) Jordi Palet Martinez | <a href="mailto:jordi.palet@theipv6company.com" target="_blank">jordi.palet@theipv6company.com</a> | The IPv6 <br>
Company<br>
(c) Antonio Godinho | <a href="mailto:antonio@uem.mz" target="_blank">antonio@uem.mz</a> | CIUEM | .MZ ccTLD | Moz-IX<br>
<br>
The proposal contents are published at <br>
<a href="https://www.afrinic.net/policy/proposals/provisions-for-resource-hijacking#proposal" rel="noreferrer" target="_blank">https://www.afrinic.net/policy/proposals/provisions-for-resource-hijacking#proposal</a><br>
<br>
Please take some time to go through the proposal contents and provide <br>
your feedback.<br>
<br>
Thank you.<br>
<br>
PDWG Co-chairs<br>
<br>
<br>
_______________________________________________<br>
RPD mailing list<br>
<a href="mailto:RPD@afrinic.net" target="_blank">RPD@afrinic.net</a><br>
<a href="https://lists.afrinic.net/mailman/listinfo/rpd" rel="noreferrer" target="_blank">https://lists.afrinic.net/mailman/listinfo/rpd</a><br>
</blockquote></div><br clear="all"><div><br></div><br></div>