<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Times New Roman \(Cuerpo en alfa";
panose-1:2 2 6 3 5 4 5 2 3 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
pre
{mso-style-priority:99;
mso-style-link:"HTML con formato previo Car";
margin:0cm;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.HTMLconformatoprevioCar
{mso-style-name:"HTML con formato previo Car";
mso-style-priority:99;
mso-style-link:"HTML con formato previo";
font-family:Consolas;}
span.EstiloCorreo24
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1357198968;
mso-list-template-ids:-1370060608;}
@list l1
{mso-list-id:2101485938;
mso-list-type:hybrid;
mso-list-template-ids:-1046594164 67764241 67764249 67764251 67764239 67764249 67764251 67764239 67764249 67764251;}
@list l1:level1
{mso-level-text:"%1\)";
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level2
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level3
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
@list l1:level4
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level5
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level6
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
@list l1:level7
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level8
{mso-level-number-format:alpha-lower;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l1:level9
{mso-level-number-format:roman-lower;
mso-level-tab-stop:none;
mso-level-number-position:right;
text-indent:-9.0pt;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style></head><body lang=ES link=blue vlink=purple><div class=WordSection1><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=ES-TRAD style='font-size:12.0pt;mso-fareast-language:EN-US'>Hi Volker,</span><span lang=ES-TRAD style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'><o:p></o:p></span></p><p class=MsoNormal><span lang=ES-TRAD style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=ES-TRAD style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><div><div><p class=MsoNormal style='margin-left:35.4pt'>El 16/1/20 16:03, "anti-abuse-wg en nombre de Volker Greimann" <<a href="mailto:anti-abuse-wg-bounces@ripe.net">anti-abuse-wg-bounces@ripe.net</a> en nombre de <a href="mailto:vgreimann@key-systems.net">vgreimann@key-systems.net</a>> escribió:<o:p></o:p></p></div></div><div><p class=MsoNormal style='margin-left:35.4pt'><o:p> </o:p></p></div><p style='margin-left:35.4pt'>Hi Jordi, <o:p></o:p></p><p style='margin-left:35.4pt'>your example seems a bit off though. If your contract is with your ISP and you need to complain to them, why would you complain to another ISP you have no contract with?<o:p></o:p></p><p><span lang=EN-US style='font-size:12.0pt'>Text was not clear … I’m the victim. My ISP is A. The abuser ISP is B. I can complain to A, so he can complain to B.<o:p></o:p></span></p><p><span lang=EN-US style='font-size:12.0pt'>I also don’t see any issue anyway, for me to complain directly to B.<o:p></o:p></span></p><p style='margin-left:35.4pt'><span lang=EN-US>I agree that current GDPR implementations may impact the contactibility of the customer, but that can be improved in GDPR-compliant manners that do not require playing chinese whispers down the chain. <o:p></o:p></span></p><p style='margin-left:35.4pt'>Not objecting to your 3. but you need to consider it may not be the contractual partner acting against the contract. They may be a victim as well, and therefore enforcing any actions against them may be unproductive. Would you shut down Google.com because of one link to a site violating third party rights?<o:p></o:p></p><p><span lang=EN-US style='font-size:12.0pt'>Agree. I’m a family. I know nothing about IT. My wireless is open, or somehow my network has been hacked and is being used for sending spam or DDoS. The ISP is still responsible for making sure that the problem is resolved, either warning the user, helping them, or blocking (until the user solves the problem) the relevant ports (even the connection if needed). It is up to the local legislation if the user has any responsibility or not. This is probably out of scope for our policy, right? But if the ISP is not reacting at all, he is risking that other operators block him, right?<o:p></o:p></span></p><p><span lang=EN-US style='font-size:12.0pt'>That’s why I still believe that abuse-c must be mandatory, unless you clearly state that you ignore abuse cases.<o:p></o:p></span></p><p style='margin-left:35.4pt'><span lang=EN-US>Best,<o:p></o:p></span></p><p style='margin-left:35.4pt'>Volker<o:p></o:p></p><div><p class=MsoNormal style='margin-left:35.4pt'>Am 16.01.2020 um 15:52 schrieb JORDI PALET MARTINEZ via anti-abuse-wg:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>Hi Volker,</span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'> </span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>I don’t agree with that, because:</span><o:p></o:p></p><p class=MsoListParagraph style='margin-left:71.4pt;text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='mso-list:Ignore'>1)<span style='font:7.0pt "Times New Roman"'> </span></span><![endif]><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>I believe the electricity sample I provided proves otherwise. My contract is with the electricity provider (the Internet provider), so I need to complain to them and they need to follow the chain.</span><o:p></o:p></p><p class=MsoListParagraph style='margin-left:71.4pt;text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='mso-list:Ignore'>2)<span style='font:7.0pt "Times New Roman"'> </span></span><![endif]><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>For a victim, to complain directly to the customer (not the operator), will need to know the data of the “abuser” which may be protected by GDPR.</span><o:p></o:p></p><p class=MsoListParagraph style='margin-left:71.4pt;text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='mso-list:Ignore'>3)<span style='font:7.0pt "Times New Roman"'> </span></span><![endif]><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>Customers sign a contract with the operator. The contract must have clear conditions (AUP) about the appropriate use of the network. If you act against that contract, the problem is with the operator, not victims.</span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'> </span><o:p></o:p></p><div><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black'>By the way, if an operator has a badly designed AUP, either they are doing a bad job, or they have *<b>no interest</b>* in acting against abuses.</span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black'> </span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black'>Regards,</span><o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:12.0pt;margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>Jordi</span><o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:12.0pt;margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>@jordipalet</span><o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:12.0pt;margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'> </span><o:p></o:p></p></div><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'> </span><o:p></o:p></p><p class=MsoNormal style='margin-left:35.4pt'><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'> </span><o:p></o:p></p><div><div><p class=MsoNormal style='margin-left:70.8pt'>El 16/1/20 15:44, "anti-abuse-wg en nombre de Volker Greimann" <<a href="mailto:anti-abuse-wg-bounces@ripe.net">anti-abuse-wg-bounces@ripe.net</a> en nombre de <a href="mailto:vgreimann@key-systems.net">vgreimann@key-systems.net</a>> escribió:<o:p></o:p></p></div></div><div><p class=MsoNormal style='margin-left:70.8pt'> <o:p></o:p></p></div><p style='margin-left:70.8pt'>Obviously every user should lock their doors / protect themselves against fraud. I am just saying that the ability of many service providers to curtail abuse of their system (without impacting legitimate uses) is very limited as it may not their customers doing the abusing and any targeted action against those customers themselvesd would be inappropriate and affect many legitimate users of their services. <o:p></o:p></p><p style='margin-left:70.8pt'>At what point should a network service provider remove privileges from a customer that is himself being abused but is technically unable to deal with it properly? Would the complaint not be better directed at that customer, not the provider, since they are the ones that can resolve this issue in a more targetted and appropriate manner? How does the service provider differentiate between a customer that is abusing vs one that is being abused? Deputising the service providers will not necessarily solve the problems, and possibly create many new ones. <o:p></o:p></p><p style='margin-left:70.8pt'>In the domain industry, we were required to provide an abuse contact, however the reports we get to that address usually deal with issues we cannot do much about other than pulling or deactivating the domain name, which is usually the nuclear option. So we spend our time forwarding abuse mails to our customers that the complainant should have sent to the customer directly. <o:p></o:p></p><p style='margin-left:70.8pt'>Best,<o:p></o:p></p><p style='margin-left:70.8pt'>volker<o:p></o:p></p><p style='margin-left:70.8pt'> <o:p></o:p></p><div><p class=MsoNormal style='margin-left:70.8pt'>Am 16.01.2020 um 15:16 schrieb Serge Droz via anti-abuse-wg:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:70.8pt'>Hi Volker<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>On 16/01/2020 15:03, Volker Greimann wrote:<o:p></o:p></pre><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><pre style='margin-left:70.8pt'>isn't making the world (and the internet) first and foremost a job of<o:p></o:p></pre><pre style='margin-left:70.8pt'>law enforcement agencies like the police and Europol?<o:p></o:p></pre></blockquote><pre style='margin-left:70.8pt'>Law enforcement's job primarily is arresting criminals. And yes they do<o:p></o:p></pre><pre style='margin-left:70.8pt'>prevention. But you can't stop locking your door or walk by fight just<o:p></o:p></pre><pre style='margin-left:70.8pt'>ignoring it, because it's LEA's job.<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>This is even more true on the internet, where CERT's have long been<o:p></o:p></pre><pre style='margin-left:70.8pt'>working together fighting cybercrime etc.<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>While there obviously is an appeal to the notion of "The best problems<o:p></o:p></pre><pre style='margin-left:70.8pt'>are some one else's problem" my believe is we don't want to have an<o:p></o:p></pre><pre style='margin-left:70.8pt'>internet or a world, for that matter, where this is how things run. The<o:p></o:p></pre><pre style='margin-left:70.8pt'>internet is a bottom up thing, it is so cool because people follow<o:p></o:p></pre><pre style='margin-left:70.8pt'>protocols, that are not law.<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>There was a time whn this wasn't a given: During the "Browser wars"<o:p></o:p></pre><pre style='margin-left:70.8pt'>different producer leveraged ambiguities in the HTML standard, and the<o:p></o:p></pre><pre style='margin-left:70.8pt'>end result was horrible.<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>We don't want this. If we delegate the problem, we've already lost.<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'>Best<o:p></o:p></pre><pre style='margin-left:70.8pt'>Serge<o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre><pre style='margin-left:70.8pt'> <o:p></o:p></pre></blockquote><div><p class=MsoNormal style='margin-left:70.8pt'>-- <br>Volker A. Greimann<br>General Counsel and Policy Manager<br><strong><span style='font-family:"Calibri",sans-serif'>KEY-SYSTEMS GMBH</span></strong><br><br>T: +49 6894 9396901<br>M: +49 6894 9396851<br>F: +49 6894 9396851<br>W: <a href="http://www.key-systems.net">www.key-systems.net</a><br><br>Key-Systems GmbH is a company registered at the local court of Saarbruecken, Germany with the registration no. HR B 18835<br>CEO: Alexander Siffrin<br><br>Part of the CentralNic Group PLC (LON: CNIC) a company registered in England and Wales with company number 8576358.<o:p></o:p></p></div><p class=MsoNormal style='mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:12.0pt;margin-left:35.4pt'><br>**********************************************<br>IPv4 is over<br>Are you ready for the new Internet ?<br><a href="http://www.theipv6company.com">http://www.theipv6company.com</a><br>The IPv6 Company<br><br>This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.<o:p></o:p></p></blockquote><div><p class=MsoNormal style='margin-left:35.4pt'>-- <br>Volker A. Greimann<br>General Counsel and Policy Manager<br><strong><span style='font-family:"Calibri",sans-serif'>KEY-SYSTEMS GMBH</span></strong><br><br>T: +49 6894 9396901<br>M: +49 6894 9396851<br>F: +49 6894 9396851<br>W: <a href="http://www.key-systems.net">www.key-systems.net</a><br><br>Key-Systems GmbH is a company registered at the local court of Saarbruecken, Germany with the registration no. HR B 18835<br>CEO: Alexander Siffrin<br><br>Part of the CentralNic Group PLC (LON: CNIC) a company registered in England and Wales with company number 8576358.<o:p></o:p></p></div></div><br>**********************************************<br>
IPv4 is over<br>
Are you ready for the new Internet ?<br>
http://www.theipv6company.com<br>
The IPv6 Company<br>
<br>
This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.<br>
<br>
</body></html>