This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/ipv6-wg@ripe.net/
[ipv6-wg] [routing-wg] MERIT Darknet Experiment and RPKI alerts
- Previous message (by thread): [ipv6-wg] [routing-wg] MERIT Darknet Experiment and RPKI alerts
- Next message (by thread): [ipv6-wg] [routing-wg] MERIT Darknet Experiment and RPKI alerts
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Daniel Karrenberg
daniel.karrenberg at ripe.net
Tue Nov 13 09:36:39 CET 2012
On 09.11.2012, at 12:05 , Wilfried Woeber wrote: > Overall, I think this is very dangerous approach, and the wrong way to start with. > > There might be very good reasons, why a full block of (IPv6) addresses, or a > subset of, ist not (yet) globally visible. Announcing/Hijacking those addresses > may seriously interfere with local tests or pilot deployment. > > IMHO this should be strictly opt-in, instead of opt-out! > > Wilfried. Wilfried, you are right. The agreement I thought we made with Merit was to use unallocated address space. Apparently a misunderstanding occurred somewhere along the way. We will talk to Merit and correct this. Daniel
- Previous message (by thread): [ipv6-wg] [routing-wg] MERIT Darknet Experiment and RPKI alerts
- Next message (by thread): [ipv6-wg] [routing-wg] MERIT Darknet Experiment and RPKI alerts
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ ipv6-wg Archives ]