<div dir="ltr">This method, i think, is very near to discrimination if not backed up with something concrete.<div>And for the RIPE NCC is a lot of work to detect witch new LIR has possible connections with all existing LIRS.</div><div>Can you think of a method that could do this detection automaticaly ?</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 11, 2015 at 4:59 PM, David Huberman <span dir="ltr"><<a href="mailto:David.Huberman@microsoft.com" target="_blank">David.Huberman@microsoft.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hello,<br>
<br>
I think it is time to consider the next step for dealing with the problem of a few individuals opening up dozens of LIRs for the exclusive purpose of selling the /22s. Such activity is outright fraud, and something the NCC should tackle with the assistance of the APWG.<br>
<br>
Obvious point 1:<br>
It is very difficult to write policy text which stops such behavior, but does not impact legitimate market behavior.<br>
<br>
Obvious point 2:<br>
The NCC staff likely know when a request is a duplicate of previous requests. (Or at least, in many cases they do.)<br>
<br>
We had discussed in Amsterdam that perhaps it was best to empower the staff to stop the activity when it is clear to them that such activity is taking place. So how about a policy sentence that reads something like:<br>
<br>
"When RIPE NCC staff have reason to believe a LIR is being opened for the purposes of selling the IPv4 block allocation, such a request may be denied."<br>
<br>
Just throwing out ideas,<br>
David<br>
<br>
David R Huberman<br>
Principal, Global IP Addressing<br>
Microsoft Corporation<br>
<br>
<br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature">Catrangiu Marius<br>Mobil: 0770481857<br>Mail: <a href="mailto:catrangiumarius@gmail.com" target="_blank">catrangiumarius@gmail.com</a></div>
</div>