This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/db-wg@ripe.net/
[db-wg] abuse-mailbox
- Previous message (by thread): [db-wg] abuse-mailbox
- Next message (by thread): [db-wg] RIPE Whois Server version 3.3.0
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Daniel Roesen
dr at cluenet.de
Wed May 25 00:20:53 CEST 2005
On Tue, May 24, 2005 at 11:32:28PM +0200, Philippe Bourcier wrote: > I'd like to know what would you recommend as the behavior for catching the > "best possible" abuse-contact in the RIPE db. > > Here is how the cyberabuse whois used to work (for RIPE) : > 1 - search for an IRT object (mnt-irt), if one exist, go catch the > associated e-mail > 2 - search for an email in all the remarks/trouble/descr fields with the > abuse/security/cert/csirt string in it > 3 - search for the admin-c's email, if any > 4 - search for the tech-c's, if any > 5 - search for the first email found [...] > Any other comments/suggestions ? I think steps 3 and 4 should be swapped, and 5 removed completely. Best regards, Daniel -- CLUE-RIPE -- Jabber: dr at cluenet.de -- dr at IRCnet -- PGP: 0xA85C8AA0
- Previous message (by thread): [db-wg] abuse-mailbox
- Next message (by thread): [db-wg] RIPE Whois Server version 3.3.0
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ db-wg Archives ]