29 Feb
2016
29 Feb
'16
4:09 p.m.
On 2/29/2016 3:09 AM, Suresh Ramasubramanian wrote:
On 29-Feb-2016, at 12:08 AM, Ruediger Volk <rv@NIC.DTAG.DE> wrote:
We have to assume that Internet number resource holders requested to establish abuse-c - usually are NOT focussed an abuse handling (different core business:-)
With all due respect - assume that the number resource holder is a corporation engaged in, for example, brewing beer. ... Wouldn’t they have a corporate IT team tasked with looking at compromises on their network that are causing abuse / DDoS issues ... With abuse-c an external reporter can reach out to the appropriate team, ...
+1 d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net