<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Times New Roman \(Cuerpo en alfa";
panose-1:2 2 6 3 5 4 5 2 3 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
pre
{mso-style-priority:99;
mso-style-link:"HTML con formato previo Car";
margin:0cm;
font-size:10.0pt;
font-family:"Courier New";}
span.HTMLconformatoprevioCar
{mso-style-name:"HTML con formato previo Car";
mso-style-priority:99;
mso-style-link:"HTML con formato previo";
font-family:"Consolas",serif;}
span.EstiloCorreo21
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=ES link=blue vlink=purple style='word-wrap:break-word'><div class=WordSection1><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>Hi Mark,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>Your point regarding the bulk way, I think is already there in 8.2:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>“Considering the hierarchical nature of IP address objects, child objects of those directly distributed by AFRINIC may be covered by parent objects or they may have their own "abuse-c" attribute.”<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>Otherwise, this could be something that can be requested (without need of stating it in the policy) at the implementation level, as I guess this is already done for other whois data, or I’m getting your point wrong?<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;color:black'>Regards,<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>Jordi<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>@jordipalet<o:p></o:p></span></p><div><div><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt'><o:p> </o:p></span></p><p class=MsoNormal style='margin-left:35.4pt'>El 19/9/20 13:27, "Mark Elkins" <<a href="mailto:mje@posix.co.za">mje@posix.co.za</a>> escribió:<o:p></o:p></p></div></div><div><p class=MsoNormal style='margin-left:35.4pt'><o:p> </o:p></p></div><p style='margin-left:35.4pt'>The only people complaining about this policy should be the Resource Members of AFRINIC. To be clear, I am a Resource Member (of AFRINIC) and I agree with the policy. There is currently a voluntary option to add an abuse contact. I personally believe it should be renamed to "abuse-c" (so it looks more obvious and similar to the other contacts for an ASN or IP allocation/assignment) and should be mandatory. I'd also like a bulk way to have this added if possible - because I'm lazy and like many others, have multiple allocations/assignments. Then - if one of my allocations/assignments causes a problem to someone in the world - they can easily find my abuse support address to complain to. This really should be a no-brainer.<o:p></o:p></p><div><p class=MsoNormal style='margin-left:35.4pt'>On 2020/09/19 10:59, Frank Habicht wrote:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>Hi,<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>On 19/09/2020 08:40, lucilla fornaro wrote:<o:p></o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>I have to disagree!<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>The point is: the proposal does not define or give an indicator of what<o:p></o:p></pre><pre style='margin-left:35.4pt'>an abuse is.<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>It does NOT need to do that.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>The policy is NOT about abuses.<o:p></o:p></pre><pre style='margin-left:35.4pt'>It is about *abuse contacts*.<o:p></o:p></pre><pre style='margin-left:35.4pt'>It is about publishing *abuse contacts* in case someone, like a network<o:p></o:p></pre><pre style='margin-left:35.4pt'>operator (who knows what an abuse is), wants to send an abuse complaint.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>Network operators know what an abuse is - if they care.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Others, and this policy, don't need to know what an abuse is.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>People, including participants on this list, may even disagree about<o:p></o:p></pre><pre style='margin-left:35.4pt'>what constitutes abuse. They might also conclude, and agree that "what<o:p></o:p></pre><pre style='margin-left:35.4pt'>is an abuse" depends on country, opinion, operator policy, time-of-day,<o:p></o:p></pre><pre style='margin-left:35.4pt'>etc.<o:p></o:p></pre><pre style='margin-left:35.4pt'>These are all things irrelevant to this policy.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>This was stated multiple times.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Some people seem to ignore this.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Some people seem to reiterate that a definition of abuse is needed.<o:p></o:p></pre><pre style='margin-left:35.4pt'>I believe that others and myself have explained why that is not the case.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>Do the chairs agree that issues are re-iterated that have been shown to<o:p></o:p></pre><pre style='margin-left:35.4pt'>be irrelevant to the discussion of this policy?<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>It is not functional to propose a policy if the elements<o:p></o:p></pre><pre style='margin-left:35.4pt'>present in it are not clear.<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>I humbly request to differentiate between "abuse" (which this policy is<o:p></o:p></pre><pre style='margin-left:35.4pt'>not directly about), and "abuse contacts" - which this policy aims to<o:p></o:p></pre><pre style='margin-left:35.4pt'>ensure are to be published.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>We have discussed sufficiently that the definition of "abuse" can vary.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Depending on /many/ things.<o:p></o:p></pre><pre style='margin-left:35.4pt'>I believe we have agreed that the definition can vary.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Maybe the chairs can confirm that. I think this might be helpful.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>The policy is about "abuse contacts".<o:p></o:p></pre><pre style='margin-left:35.4pt'>I believe the 'elements present in it' are in fact clear.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>The main focus of the proposal is the<o:p></o:p></pre><pre style='margin-left:35.4pt'>abuse,<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>no. "abuse contacts".<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>you said that the proposal makes sure that there is a valid<o:p></o:p></pre><pre style='margin-left:35.4pt'>response incase of an abuse report. BUT if people do not know what<o:p></o:p></pre><pre style='margin-left:35.4pt'>Afrinic means for abuse,<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>AfriNIC doesn't mean anything about "abuse".<o:p></o:p></pre><pre style='margin-left:35.4pt'>AfriNIC, I believe, doesn't have a policy about what "abuse" is.<o:p></o:p></pre><pre style='margin-left:35.4pt'>It is *NOT* for AfriNIC to decide that.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Network operators are capable of doing that.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Network operators are willing to do that.<o:p></o:p></pre><pre style='margin-left:35.4pt'>If others - including participants on this list - are not able to define<o:p></o:p></pre><pre style='margin-left:35.4pt'>what abuse is, that fact is irrelevant [1].<o:p></o:p></pre><pre style='margin-left:35.4pt'>Because this policy is for the benefits of network operators.<o:p></o:p></pre><pre style='margin-left:35.4pt'>And this policy affects AfriNIC Resource Members.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>Participants on this mailing list are not required to be network<o:p></o:p></pre><pre style='margin-left:35.4pt'>operators, nor are they required to be AfriNIC Resource Members.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Everybody is welcome.<o:p></o:p></pre><pre style='margin-left:35.4pt'>But when it comes to discussing about the subject of this policy (which<o:p></o:p></pre><pre style='margin-left:35.4pt'>is *abuse contacts*), it seems to be beneficial to understand some<o:p></o:p></pre><pre style='margin-left:35.4pt'>distinctions.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>the reports will be too many, often<o:p></o:p></pre><pre style='margin-left:35.4pt'>unreasonable, with a consequent waste of time and resources.<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>so-called "Waste of resources" :<o:p></o:p></pre><pre style='margin-left:35.4pt'>a) not on the part of AfriNIC<o:p></o:p></pre><pre style='margin-left:35.4pt'>b) not on the part of network operators ignoring abuse complaints<o:p></o:p></pre><pre style='margin-left:35.4pt'>c) possibly on the part of network operators filing abuse complaints<o:p></o:p></pre><pre style='margin-left:35.4pt'> [who do understand that there is an unfortunately high chance of<o:p></o:p></pre><pre style='margin-left:35.4pt'> getting ignored]<o:p></o:p></pre><pre style='margin-left:35.4pt'>d) not on the part of recipients of abuse complaints who appreciate the<o:p></o:p></pre><pre style='margin-left:35.4pt'> information in the complaints and are willing to<o:p></o:p></pre><pre style='margin-left:35.4pt'> i) communicate with the complaintant<o:p></o:p></pre><pre style='margin-left:35.4pt'> ii) clean up their network or customers, thus<o:p></o:p></pre><pre style='margin-left:35.4pt'> iii) improving their own security and posture (housekeeping)<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>So, for those who want to be able to get abuse complaints, and for those<o:p></o:p></pre><pre style='margin-left:35.4pt'>who want to "waste their time" with writing these abuse complaints, can<o:p></o:p></pre><pre style='margin-left:35.4pt'>we pass this policy so that AfriNIC can enforce resource holders to<o:p></o:p></pre><pre style='margin-left:35.4pt'>publish the abuse contacts....<o:p></o:p></pre><pre style='margin-left:35.4pt'>..... without AfriNIC knowing or defining what constitutes abuse.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>In an ideal<o:p></o:p></pre><pre style='margin-left:35.4pt'>world, the proposal would be efficient the way it is. But we do not live<o:p></o:p></pre><pre style='margin-left:35.4pt'>in an ideal world.<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>Is it an improvement? progress in the right direction?<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>If we want it to be effective in the long run, it is<o:p></o:p></pre><pre style='margin-left:35.4pt'>necessary to make adjustments. <o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'>disagree.<o:p></o:p></pre><pre style='margin-left:35.4pt'>Also: you "forgot" to suggest the improvements here.<o:p></o:p></pre><pre style='margin-left:35.4pt'>I wonder why.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>I request the chairs to agree that supporters of the policy have shown<o:p></o:p></pre><pre style='margin-left:35.4pt'>that a definition of "abuse" is not needed and continued calls for that<o:p></o:p></pre><pre style='margin-left:35.4pt'>are not relevant.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>Regards,<o:p></o:p></pre><pre style='margin-left:35.4pt'>Frank<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>[1]<o:p></o:p></pre><pre style='margin-left:35.4pt'>sorry, for the strong language of "irrelevant", but I think I better<o:p></o:p></pre><pre style='margin-left:35.4pt'>make the thoughts very clear<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>Lucilla <o:p></o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'>Il giorno ven 18 set 2020 alle ore 21:43 Fernando Frediani<o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'><<a href="mailto:fhfrediani@gmail.com">fhfrediani@gmail.com</a> <a href="mailto:fhfrediani@gmail.com"><mailto:fhfrediani@gmail.com></a>> ha scritto:<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> On 18/09/2020 05:22, JORDI PALET MARTINEZ via RPD wrote:<o:p></o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'> <clip>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Again, this is not about defining what is abuse, this is among the<o:p></o:p></pre><pre style='margin-left:35.4pt'> parties. It is about making sure that there is a valid responsible<o:p></o:p></pre><pre style='margin-left:35.4pt'> contact in case of anyone needs to report what he considers an<o:p></o:p></pre><pre style='margin-left:35.4pt'> abuse. AFRINIC will not punish anyone that believes that his<o:p></o:p></pre><pre style='margin-left:35.4pt'> customer is not doing an abuse because in his country is not an abuse.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre></blockquote><pre style='margin-left:35.4pt'> Exactly !<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Often people are misunderstanding the intention of the proposals and<o:p></o:p></pre><pre style='margin-left:35.4pt'> opposing them for reasons that are not written on them, which end up<o:p></o:p></pre><pre style='margin-left:35.4pt'> causing more confusion to other people.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I support this proposal<o:p></o:p></pre><pre style='margin-left:35.4pt'> Fernando<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Jordi____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> @jordipalet____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> El 18/9/20 9:59, "Lamiaa Chnayti" <<a href="mailto:lamiaachnayti@gmail.com">lamiaachnayti@gmail.com</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:lamiaachnayti@gmail.com"><mailto:lamiaachnayti@gmail.com></a>> escribió:____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hello Jordi,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> RFC2142 only defines a tiny portion of the network abuse. In real<o:p></o:p></pre><pre style='margin-left:35.4pt'> world operation, abuse consists of a much boarder range :<o:p></o:p></pre><pre style='margin-left:35.4pt'> DMCA(copy rights) claims, unsolicited emails , phishing websites<o:p></o:p></pre><pre style='margin-left:35.4pt'> , trade mark disputes etc. ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> All those are legal issues that vary vastly across different<o:p></o:p></pre><pre style='margin-left:35.4pt'> juridictions in which no one but each of the juridiction’s judges<o:p></o:p></pre><pre style='margin-left:35.4pt'> can decide if it is an abuse or an illegal activity. Claiming that<o:p></o:p></pre><pre style='margin-left:35.4pt'> RFC2142 defines not even 1% of real world abuse is laughable.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lamiaa____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Le jeu. 17 sept. 2020 à 15:51, JORDI PALET MARTINEZ via RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:rpd@afrinic.net">rpd@afrinic.net</a> <a href="mailto:rpd@afrinic.net"><mailto:rpd@afrinic.net></a>> a écrit :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hi Lamiaa,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I’ve said this already. This policy doesn’t enforce abuse, it<o:p></o:p></pre><pre style='margin-left:35.4pt'> enforces that the abuse contact is there, and works.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Today AFRINIC is paying for the cost of the abuse handling<o:p></o:p></pre><pre style='margin-left:35.4pt'> because only a tiny fraction of the members has the abuse<o:p></o:p></pre><pre style='margin-left:35.4pt'> contacts in place.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> If the contacts in the RIR database aren’t actual and<o:p></o:p></pre><pre style='margin-left:35.4pt'> accurate, this is a clear violation of the RSA. So what is<o:p></o:p></pre><pre style='margin-left:35.4pt'> unacceptable is not having the contacts, not on the other way<o:p></o:p></pre><pre style='margin-left:35.4pt'> around.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Abuse is not defined by the RIRs, everybody knows it and this<o:p></o:p></pre><pre style='margin-left:35.4pt'> is the reason why NONE of the RIRs have re-defined it, because<o:p></o:p></pre><pre style='margin-left:35.4pt'> it is already stated in RFC2142. Can you justify why AFRINIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> is different and need a definition?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> How you define it in the networks that you operate?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Jordi____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> @jordipalet____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> El 17/9/20 10:49, "Lamiaa Chnayti" <<a href="mailto:lamiaachnayti@gmail.com">lamiaachnayti@gmail.com</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:lamiaachnayti@gmail.com"><mailto:lamiaachnayti@gmail.com></a>> escribió:____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hello,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I will have to agree with Lucilla on what she said and would<o:p></o:p></pre><pre style='margin-left:35.4pt'> like to add to it that :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Firstly, Abuse enforcement is out of scope for RIRs.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Secondly, RIRs have no ability to define what is “abuse”, one<o:p></o:p></pre><pre style='margin-left:35.4pt'> abuse or even criminal activity could be entirely a legal<o:p></o:p></pre><pre style='margin-left:35.4pt'> operation in a different jurisdiction.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Finally, making a member forcefully reply to abuse contact<o:p></o:p></pre><pre style='margin-left:35.4pt'> Emails are a waste of resources and totally pointless, it is<o:p></o:p></pre><pre style='margin-left:35.4pt'> entirely up to the member to define what they think is<o:p></o:p></pre><pre style='margin-left:35.4pt'> acceptable in their network operation and how they react to<o:p></o:p></pre><pre style='margin-left:35.4pt'> it. AFRINIC has no mandate to force any member to reply to an<o:p></o:p></pre><pre style='margin-left:35.4pt'> “abuse”, since AFRINIC doesn’t even have the ability to<o:p></o:p></pre><pre style='margin-left:35.4pt'> identify what is considered an abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Therefore the entire policy is out of scope for the RIR<o:p></o:p></pre><pre style='margin-left:35.4pt'> operation.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lamiaa____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Le jeu. 17 sept. 2020 à 07:42, JORDI PALET MARTINEZ via RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:rpd@afrinic.net">rpd@afrinic.net</a> <a href="mailto:rpd@afrinic.net"><mailto:rpd@afrinic.net></a>> a écrit :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hi Lucilla,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Today we already have mnt-IRT, and everybody who operate<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks understand what it is an abuse. If you operate<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks you know that **anything** which is a<o:p></o:p></pre><pre style='margin-left:35.4pt'> non-authorized use of a network is an abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> If you send spam, attack networks, try to intrude<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks, etc., all those are abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> What the policy ask is to make sure that in AFRINIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> everybody has an abuse contact (today we have mnt-IRT, but<o:p></o:p></pre><pre style='margin-left:35.4pt'> is not mandatory, and as a results many African networks<o:p></o:p></pre><pre style='margin-left:35.4pt'> are filtered because lack of that – and consequently they<o:p></o:p></pre><pre style='margin-left:35.4pt'> do not respond to abuse cases -, which exist in all the<o:p></o:p></pre><pre style='margin-left:35.4pt'> other regions of the world).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Not having an abuse means more chances of legal actions,<o:p></o:p></pre><pre style='margin-left:35.4pt'> more cost, for both the victims and the ISPs. Having that<o:p></o:p></pre><pre style='margin-left:35.4pt'> means that you have more chances to resolve it in<o:p></o:p></pre><pre style='margin-left:35.4pt'> goodfaith.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> One of the **most important** Afrinic missions is to have<o:p></o:p></pre><pre style='margin-left:35.4pt'> accuracy on the database, which includes accuracy on the<o:p></o:p></pre><pre style='margin-left:35.4pt'> contacts. We are not fulfilling that in this situation.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Remember that **all** the other RIRs have already this<o:p></o:p></pre><pre style='margin-left:35.4pt'> kind of policy. This one is like the one that has been<o:p></o:p></pre><pre style='margin-left:35.4pt'> implemented in APNIC, and the accuracy of the contacts is<o:p></o:p></pre><pre style='margin-left:35.4pt'> now 87.5% as reported this month in the last APNIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> meeting. In that report **none** of the members indicated<o:p></o:p></pre><pre style='margin-left:35.4pt'> any of the issues that you indicated (didn't happened as<o:p></o:p></pre><pre style='margin-left:35.4pt'> well in the other regions).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> You know who is interested in not having abuse contacts?<o:p></o:p></pre><pre style='margin-left:35.4pt'> Those that use their networks for doing abuse (hijacking,<o:p></o:p></pre><pre style='margin-left:35.4pt'> spam, DoS, intrusions, etc.).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Can you explain if the network that you operate has an<o:p></o:p></pre><pre style='margin-left:35.4pt'> abuse contact an how if one of your customes is trying to<o:p></o:p></pre><pre style='margin-left:35.4pt'> penetrate my network or do a DoS, I will be able to<o:p></o:p></pre><pre style='margin-left:35.4pt'> contact you and if you will do anything or just ignore it?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Jordi____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> @jordipalet____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> El 17/9/20 2:21, "lucilla fornaro"<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:lucillafornarosawamoto@gmail.com">lucillafornarosawamoto@gmail.com</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:lucillafornarosawamoto@gmail.com"><mailto:lucillafornarosawamoto@gmail.com></a>> escribió:____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Dear all,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I have some concerns about the “Abuse Contact Policy”.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> First of all, it does not offer a specific and regulated<o:p></o:p></pre><pre style='margin-left:35.4pt'> description of the term “abuse” and this opens the door<o:p></o:p></pre><pre style='margin-left:35.4pt'> to potentially bigger problems: a surplus of reports,<o:p></o:p></pre><pre style='margin-left:35.4pt'> discrimination/legal issues, and a waste of resources.<o:p></o:p></pre><pre style='margin-left:35.4pt'> Around the world, we can perceive what abuse is in very<o:p></o:p></pre><pre style='margin-left:35.4pt'> different ways.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Afrinic is not entitled to force members to report abuses<o:p></o:p></pre><pre style='margin-left:35.4pt'> and most importantly, this proposal does not represent<o:p></o:p></pre><pre style='margin-left:35.4pt'> Afrinic’s purpose.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I, therefore, oppose this policy.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Thank you,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lucilla ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________ RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> mailing list <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> **********************************************<o:p></o:p></pre><pre style='margin-left:35.4pt'> IPv4 is over<o:p></o:p></pre><pre style='margin-left:35.4pt'> Are you ready for the new Internet ?<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="http://www.theipv6company.com">http://www.theipv6company.com</a> <a href="http://www.theipv6company.com/"><http://www.theipv6company.com/></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> The IPv6 Company<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> This electronic message contains information which may be<o:p></o:p></pre><pre style='margin-left:35.4pt'> privileged or confidential. The information is intended to<o:p></o:p></pre><pre style='margin-left:35.4pt'> be for the exclusive use of the individual(s) named above<o:p></o:p></pre><pre style='margin-left:35.4pt'> and further non-explicilty authorized disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information,<o:p></o:p></pre><pre style='margin-left:35.4pt'> even if partially, including attached files, is strictly<o:p></o:p></pre><pre style='margin-left:35.4pt'> prohibited and will be considered a criminal offense. If<o:p></o:p></pre><pre style='margin-left:35.4pt'> you are not the intended recipient be aware that any<o:p></o:p></pre><pre style='margin-left:35.4pt'> disclosure, copying, distribution or use of the contents<o:p></o:p></pre><pre style='margin-left:35.4pt'> of this information, even if partially, including attached<o:p></o:p></pre><pre style='margin-left:35.4pt'> files, is strictly prohibited, will be considered a<o:p></o:p></pre><pre style='margin-left:35.4pt'> criminal offense, so you must reply to the original sender<o:p></o:p></pre><pre style='margin-left:35.4pt'> to inform about this communication and delete it.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> **********************************************<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> IPv4 is over<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Are you ready for the new Internet ?<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="http://www.theipv6company.com">http://www.theipv6company.com</a> <a href="http://www.theipv6company.com/"><http://www.theipv6company.com/></a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> The IPv6 Company<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> This electronic message contains information which may be<o:p></o:p></pre><pre style='margin-left:35.4pt'> privileged or confidential. The information is intended to be<o:p></o:p></pre><pre style='margin-left:35.4pt'> for the exclusive use of the individual(s) named above and<o:p></o:p></pre><pre style='margin-left:35.4pt'> further non-explicilty authorized disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information, even<o:p></o:p></pre><pre style='margin-left:35.4pt'> if partially, including attached files, is strictly prohibited<o:p></o:p></pre><pre style='margin-left:35.4pt'> and will be considered a criminal offense. If you are not the<o:p></o:p></pre><pre style='margin-left:35.4pt'> intended recipient be aware that any disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information, even<o:p></o:p></pre><pre style='margin-left:35.4pt'> if partially, including attached files, is strictly<o:p></o:p></pre><pre style='margin-left:35.4pt'> prohibited, will be considered a criminal offense, so you must<o:p></o:p></pre><pre style='margin-left:35.4pt'> reply to the original sender to inform about this<o:p></o:p></pre><pre style='margin-left:35.4pt'> communication and delete it.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Le jeu. 17 sept. 2020 à 15:49, JORDI PALET MARTINEZ via RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:rpd@afrinic.net">rpd@afrinic.net</a> <a href="mailto:rpd@afrinic.net"><mailto:rpd@afrinic.net></a>> a écrit :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hi Lamiaa,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I’ve said this already. This policy doesn’t enforce abuse, it<o:p></o:p></pre><pre style='margin-left:35.4pt'> enforces that the abuse contact is there, and works.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Today AFRINIC is paying for the cost of the abuse handling<o:p></o:p></pre><pre style='margin-left:35.4pt'> because only a tiny fraction of the members has the abuse<o:p></o:p></pre><pre style='margin-left:35.4pt'> contacts in place.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> If the contacts in the RIR database aren’t actual and<o:p></o:p></pre><pre style='margin-left:35.4pt'> accurate, this is a clear violation of the RSA. So what is<o:p></o:p></pre><pre style='margin-left:35.4pt'> unacceptable is not having the contacts, not on the other way<o:p></o:p></pre><pre style='margin-left:35.4pt'> around.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Abuse is not defined by the RIRs, everybody knows it and this<o:p></o:p></pre><pre style='margin-left:35.4pt'> is the reason why NONE of the RIRs have re-defined it, because<o:p></o:p></pre><pre style='margin-left:35.4pt'> it is already stated in RFC2142. Can you justify why AFRINIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> is different and need a definition?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> How you define it in the networks that you operate?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Jordi____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> @jordipalet____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> El 17/9/20 10:49, "Lamiaa Chnayti" <<a href="mailto:lamiaachnayti@gmail.com">lamiaachnayti@gmail.com</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:lamiaachnayti@gmail.com"><mailto:lamiaachnayti@gmail.com></a>> escribió:____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hello,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I will have to agree with Lucilla on what she said and would<o:p></o:p></pre><pre style='margin-left:35.4pt'> like to add to it that :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Firstly, Abuse enforcement is out of scope for RIRs.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Secondly, RIRs have no ability to define what is “abuse”, one<o:p></o:p></pre><pre style='margin-left:35.4pt'> abuse or even criminal activity could be entirely a legal<o:p></o:p></pre><pre style='margin-left:35.4pt'> operation in a different jurisdiction.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Finally, making a member forcefully reply to abuse contact<o:p></o:p></pre><pre style='margin-left:35.4pt'> Emails are a waste of resources and totally pointless, it is<o:p></o:p></pre><pre style='margin-left:35.4pt'> entirely up to the member to define what they think is<o:p></o:p></pre><pre style='margin-left:35.4pt'> acceptable in their network operation and how they react to<o:p></o:p></pre><pre style='margin-left:35.4pt'> it. AFRINIC has no mandate to force any member to reply to an<o:p></o:p></pre><pre style='margin-left:35.4pt'> “abuse”, since AFRINIC doesn’t even have the ability to<o:p></o:p></pre><pre style='margin-left:35.4pt'> identify what is considered an abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Therefore the entire policy is out of scope for the RIR<o:p></o:p></pre><pre style='margin-left:35.4pt'> operation.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lamiaa____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Le jeu. 17 sept. 2020 à 07:42, JORDI PALET MARTINEZ via RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:rpd@afrinic.net">rpd@afrinic.net</a> <a href="mailto:rpd@afrinic.net"><mailto:rpd@afrinic.net></a>> a écrit :____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Hi Lucilla,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Today we already have mnt-IRT, and everybody who operate<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks understand what it is an abuse. If you operate<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks you know that **anything** which is a<o:p></o:p></pre><pre style='margin-left:35.4pt'> non-authorized use of a network is an abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> If you send spam, attack networks, try to intrude<o:p></o:p></pre><pre style='margin-left:35.4pt'> networks, etc., all those are abuse.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> What the policy ask is to make sure that in AFRINIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> everybody has an abuse contact (today we have mnt-IRT, but<o:p></o:p></pre><pre style='margin-left:35.4pt'> is not mandatory, and as a results many African networks<o:p></o:p></pre><pre style='margin-left:35.4pt'> are filtered because lack of that – and consequently they<o:p></o:p></pre><pre style='margin-left:35.4pt'> do not respond to abuse cases -, which exist in all the<o:p></o:p></pre><pre style='margin-left:35.4pt'> other regions of the world).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Not having an abuse means more chances of legal actions,<o:p></o:p></pre><pre style='margin-left:35.4pt'> more cost, for both the victims and the ISPs. Having that<o:p></o:p></pre><pre style='margin-left:35.4pt'> means that you have more chances to resolve it in<o:p></o:p></pre><pre style='margin-left:35.4pt'> goodfaith.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> One of the **most important** Afrinic missions is to have<o:p></o:p></pre><pre style='margin-left:35.4pt'> accuracy on the database, which includes accuracy on the<o:p></o:p></pre><pre style='margin-left:35.4pt'> contacts. We are not fulfilling that in this situation.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Remember that **all** the other RIRs have already this<o:p></o:p></pre><pre style='margin-left:35.4pt'> kind of policy. This one is like the one that has been<o:p></o:p></pre><pre style='margin-left:35.4pt'> implemented in APNIC, and the accuracy of the contacts is<o:p></o:p></pre><pre style='margin-left:35.4pt'> now 87.5% as reported this month in the last APNIC<o:p></o:p></pre><pre style='margin-left:35.4pt'> meeting. In that report **none** of the members indicated<o:p></o:p></pre><pre style='margin-left:35.4pt'> any of the issues that you indicated (didn't happened as<o:p></o:p></pre><pre style='margin-left:35.4pt'> well in the other regions).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> You know who is interested in not having abuse contacts?<o:p></o:p></pre><pre style='margin-left:35.4pt'> Those that use their networks for doing abuse (hijacking,<o:p></o:p></pre><pre style='margin-left:35.4pt'> spam, DoS, intrusions, etc.).____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Can you explain if the network that you operate has an<o:p></o:p></pre><pre style='margin-left:35.4pt'> abuse contact an how if one of your customes is trying to<o:p></o:p></pre><pre style='margin-left:35.4pt'> penetrate my network or do a DoS, I will be able to<o:p></o:p></pre><pre style='margin-left:35.4pt'> contact you and if you will do anything or just ignore it?____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Regards,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Jordi____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> @jordipalet____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> El 17/9/20 2:21, "lucilla fornaro"<o:p></o:p></pre><pre style='margin-left:35.4pt'> <<a href="mailto:lucillafornarosawamoto@gmail.com">lucillafornarosawamoto@gmail.com</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:lucillafornarosawamoto@gmail.com"><mailto:lucillafornarosawamoto@gmail.com></a>> escribió:____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Dear all,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I have some concerns about the “Abuse Contact Policy”.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> First of all, it does not offer a specific and regulated<o:p></o:p></pre><pre style='margin-left:35.4pt'> description of the term “abuse” and this opens the door<o:p></o:p></pre><pre style='margin-left:35.4pt'> to potentially bigger problems: a surplus of reports,<o:p></o:p></pre><pre style='margin-left:35.4pt'> discrimination/legal issues, and a waste of resources.<o:p></o:p></pre><pre style='margin-left:35.4pt'> Around the world, we can perceive what abuse is in very<o:p></o:p></pre><pre style='margin-left:35.4pt'> different ways.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Afrinic is not entitled to force members to report abuses<o:p></o:p></pre><pre style='margin-left:35.4pt'> and most importantly, this proposal does not represent<o:p></o:p></pre><pre style='margin-left:35.4pt'> Afrinic’s purpose.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> I, therefore, oppose this policy.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Thank you,____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lucilla ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________ RPD<o:p></o:p></pre><pre style='margin-left:35.4pt'> mailing list <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> **********************************************<o:p></o:p></pre><pre style='margin-left:35.4pt'> IPv4 is over<o:p></o:p></pre><pre style='margin-left:35.4pt'> Are you ready for the new Internet ?<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="http://www.theipv6company.com">http://www.theipv6company.com</a> <a href="http://www.theipv6company.com"><http://www.theipv6company.com></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> The IPv6 Company<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> This electronic message contains information which may be<o:p></o:p></pre><pre style='margin-left:35.4pt'> privileged or confidential. The information is intended to<o:p></o:p></pre><pre style='margin-left:35.4pt'> be for the exclusive use of the individual(s) named above<o:p></o:p></pre><pre style='margin-left:35.4pt'> and further non-explicilty authorized disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information,<o:p></o:p></pre><pre style='margin-left:35.4pt'> even if partially, including attached files, is strictly<o:p></o:p></pre><pre style='margin-left:35.4pt'> prohibited and will be considered a criminal offense. If<o:p></o:p></pre><pre style='margin-left:35.4pt'> you are not the intended recipient be aware that any<o:p></o:p></pre><pre style='margin-left:35.4pt'> disclosure, copying, distribution or use of the contents<o:p></o:p></pre><pre style='margin-left:35.4pt'> of this information, even if partially, including attached<o:p></o:p></pre><pre style='margin-left:35.4pt'> files, is strictly prohibited, will be considered a<o:p></o:p></pre><pre style='margin-left:35.4pt'> criminal offense, so you must reply to the original sender<o:p></o:p></pre><pre style='margin-left:35.4pt'> to inform about this communication and delete it.____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> **********************************************<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> IPv4 is over<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Are you ready for the new Internet ?<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="http://www.theipv6company.com">http://www.theipv6company.com</a> <a href="http://www.theipv6company.com"><http://www.theipv6company.com></a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> The IPv6 Company<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> This electronic message contains information which may be<o:p></o:p></pre><pre style='margin-left:35.4pt'> privileged or confidential. The information is intended to be<o:p></o:p></pre><pre style='margin-left:35.4pt'> for the exclusive use of the individual(s) named above and<o:p></o:p></pre><pre style='margin-left:35.4pt'> further non-explicilty authorized disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information, even<o:p></o:p></pre><pre style='margin-left:35.4pt'> if partially, including attached files, is strictly prohibited<o:p></o:p></pre><pre style='margin-left:35.4pt'> and will be considered a criminal offense. If you are not the<o:p></o:p></pre><pre style='margin-left:35.4pt'> intended recipient be aware that any disclosure, copying,<o:p></o:p></pre><pre style='margin-left:35.4pt'> distribution or use of the contents of this information, even<o:p></o:p></pre><pre style='margin-left:35.4pt'> if partially, including attached files, is strictly<o:p></o:p></pre><pre style='margin-left:35.4pt'> prohibited, will be considered a criminal offense, so you must<o:p></o:p></pre><pre style='margin-left:35.4pt'> reply to the original sender to inform about this<o:p></o:p></pre><pre style='margin-left:35.4pt'> communication and delete it.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a>____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> -- ____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> Lamiaa CHNAYTI____<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> __ __<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> **********************************************<o:p></o:p></pre><pre style='margin-left:35.4pt'> IPv4 is over<o:p></o:p></pre><pre style='margin-left:35.4pt'> Are you ready for the new Internet ?<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="http://www.theipv6company.com">http://www.theipv6company.com</a> <a href="http://www.theipv6company.com"><http://www.theipv6company.com></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> The IPv6 Company<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> This electronic message contains information which may be<o:p></o:p></pre><pre style='margin-left:35.4pt'> privileged or confidential. The information is intended to be for<o:p></o:p></pre><pre style='margin-left:35.4pt'> the exclusive use of the individual(s) named above and further<o:p></o:p></pre><pre style='margin-left:35.4pt'> non-explicilty authorized disclosure, copying, distribution or use<o:p></o:p></pre><pre style='margin-left:35.4pt'> of the contents of this information, even if partially, including<o:p></o:p></pre><pre style='margin-left:35.4pt'> attached files, is strictly prohibited and will be considered a<o:p></o:p></pre><pre style='margin-left:35.4pt'> criminal offense. If you are not the intended recipient be aware<o:p></o:p></pre><pre style='margin-left:35.4pt'> that any disclosure, copying, distribution or use of the contents<o:p></o:p></pre><pre style='margin-left:35.4pt'> of this information, even if partially, including attached files,<o:p></o:p></pre><pre style='margin-left:35.4pt'> is strictly prohibited, will be considered a criminal offense, so<o:p></o:p></pre><pre style='margin-left:35.4pt'> you must reply to the original sender to inform about this<o:p></o:p></pre><pre style='margin-left:35.4pt'> communication and delete it.<o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a><o:p></o:p></pre></blockquote><pre style='margin-left:35.4pt'> _______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'> RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a> <a href="mailto:RPD@afrinic.net"><mailto:RPD@afrinic.net></a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'> <a href="https://lists.afrinic.net/mailman/listinfo/rpd"><https://lists.afrinic.net/mailman/listinfo/rpd></a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre><pre style='margin-left:35.4pt'>_______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'>RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'><a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a><o:p></o:p></pre><pre style='margin-left:35.4pt'><a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre><pre style='margin-left:35.4pt'><o:p> </o:p></pre></blockquote><pre style='margin-left:35.4pt'>_______________________________________________<o:p></o:p></pre><pre style='margin-left:35.4pt'>RPD mailing list<o:p></o:p></pre><pre style='margin-left:35.4pt'><a href="mailto:RPD@afrinic.net">RPD@afrinic.net</a><o:p></o:p></pre><pre style='margin-left:35.4pt'><a href="https://lists.afrinic.net/mailman/listinfo/rpd">https://lists.afrinic.net/mailman/listinfo/rpd</a><o:p></o:p></pre></blockquote><div><p class=MsoNormal style='margin-left:35.4pt'>-- <o:p></o:p></p><p style='margin-left:35.4pt'>Mark James ELKINS - Posix Systems - (South) Africa<br><a href="mailto:mje@posix.co.za">mje@posix.co.za</a> Tel: <a href="tel:+27826010496">+27.826010496</a><br>For fast, reliable, low cost Internet in ZA: <a href="https://ftth.posix.co.za">https://ftth.posix.co.za</a><br><br><img border=0 width=250 height=165 style='width:2.6041in;height:1.7187in' id="_x0000_i1026" src="cid:image001.jpg@01D69007.4637A130" alt="Posix
Systems"><img border=0 width=164 height=164 style='width:1.7083in;height:1.7083in' id="_x0000_i1025" src="cid:image002.png@01D69007.4637A130" alt="VCARD for
MJ Elkins"><o:p></o:p></p></div><p class=MsoNormal style='margin-left:35.4pt'>_______________________________________________ RPD mailing list RPD@afrinic.net https://lists.afrinic.net/mailman/listinfo/rpd <o:p></o:p></p></div><br>**********************************************<br>
IPv4 is over<br>
Are you ready for the new Internet ?<br>
http://www.theipv6company.com<br>
The IPv6 Company<br>
<br>
This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.<br>
<br>
</body></html>