Dr. Jeffrey Race wrote:
On Wed, 17 Mar 2004 12:26:13 -0500 (EST), Dean Anderson wrote:
I think these are worth pursuing, but these are not
subjects for the IETF.
IETF's documenting that this is the behavior expected of any firm offering
connectivity is certainly within the IETF's purview. And it would have
a dramatic effect. (Partly because of norms; partly, at least in the
U.S., because it would expose pollution-enabling ISPs to heavy-duty
legal liabilities. Stockholders would get after their boards.)
So what you are asking for is a BCP, nothing more?
Some of real world examples it can encompass cover:
1. How to properly apply blacklist information on incoming connections.
2. How to report and add entities to blacklists.
3. How to deal with hijacked machines.
Is this correct?