Draft Policy ARIN-2019-15: Hijacking Authorization Not-intended

ARIN info at arin.net
Tue Jun 25 17:18:29 EDT 2019


On 20 June 2019, the ARIN Advisory Council (AC) accepted "ARIN-prop-275: 
Hijacking Authorization Not-intended" as a Draft Policy.

Draft Policy ARIN-2019-15 is below and can be found at:

https://www.arin.net/participate/policy/drafts/2019_15/

You are encouraged to discuss all Draft Policies on PPML. The AC will 
evaluate the discussion in order to assess the conformance of this draft 
policy with ARIN's Principles of Internet number resource policy as 
stated in the Policy Development Process (PDP). Specifically, these 
principles are:

* Enabling Fair and Impartial Number Resource Administration
* Technically Sound
* Supported by the Community

The PDP can be found at:
https://www.arin.net/participate/policy/pdp/

Draft Policies and Proposals under discussion can be found at:
https://www.arin.net/participate/policy/drafts/

Regards,

Sean Hopkins
Policy Analyst
American Registry for Internet Numbers (ARIN)



Draft Policy ARIN-2019-15: Hijacking Authorization Not-intended

Problem Statement:

When prop-254 (Clarification on IPv6 Sub-assignments), it was not 
related, neither intended, to modify the “exclusivity” criterion.

Of course, it was not intended to provide an explicit authorization for 
incidental or transient uses of address space by third parties, which in 
fact it is a hijacking of addresses.

However, surprisingly, the resulting text (last paragraph of the NRPM 
section 2.5), after the ARIN AC editorial process, is doing that.

This policy proposal tries to fix this specific text in the NRPM section 
2.5 to avoid that misinterpretation.

Policy Statement:

Actual Text

Note that the incidental or transient use of address space by third 
parties shall not be considered a reassignment or a violation of the 
exclusive use criterion.

New Text

Note that the incidental or transient use of address space by third 
parties, within the network of the recipient organization, shall not be 
considered a reassignment or a violation of the exclusive use criterion

Timetable for Implementation: Immediate

Anything Else:

Situation in other regions: There is not equivalent explicit hijacking 
authorization in other RIRs.


More information about the Info mailing list