Hello Shane,
... https://labs.ripe.net/Members/kranjbar/implementation-details-of-policy-2011...
I can't get to that article as the site is currently down, but basically I think you're describing something like this:
I am sorry to hear that, I have reported the issue to our Webmaster. It seems to be all fine at the moment.
+----------+ org: +--------------+ | resource +------->| ORGANISATION | +----------+ +--------+-----+ | | abuse-c: v -------- +------+ ( e-mail )<----------------+ ROLE | -------- abuse-mailbox: +------+
In the article, it is exactly like that :)
While it seems a bit complicated, the layers of indirection make sense, and if the Whois server follows the chains automatically then it should be workable.
Yes. That's exactly what we have proposed to implement (and again detailed in the article). The query server will automatically follow the path and shows the contacts when answering relevant queries.
Cool. Looking forward to having this implemented so we can move on to the much scarier phase of abuse contact management. :)
Thank you very much for your feedback. All the best, Kaveh. --- Kaveh Ranjbar, RIPE NCC Database Group Manager