<div dir="ltr"><div class="gmail_extra">I agree with your assessment John, thank you. I asked because it seems many people were heavily focused on the whole point being allocation and not intended for abuse. While this may be true, the entire process has proven effective in abuse management.</div><div class="gmail_extra"><br></div><div class="gmail_extra">The question I would ask the community is simple and has been proposed previously:</div><div class="gmail_extra"><br></div><div class="gmail_extra">If the direction SWIPs have taken in recent years is less that of justification and more that of abuse management, is a /56 stringent enough? Should we consider focusing on ways to improve the abuse management process?</div><div class="gmail_extra"><br></div><div class="gmail_extra">Personally I would like to see the big providers SWIP more of their /29 or greater allocations or really anything to a small business with more than a basic internet package. I know they charge horrendous amounts to give small businesses "13 usable IPs". ($30.00+ monthly). I do not know what the rest of you see out there and I am not trying to start a conversation about abuse sources, but from my records I see just as many problems from /8s belonging to ABC Cable and XYZ Wireless as I do AFRINIC and RIPE.</div><div class="gmail_extra"><br></div><div class="gmail_extra">When I forward an abuse complaint to ABC Cable, I never see a response (nor do I care), but I also rarely if ever see attacks stop. HOWEVER and this is my point entirely - More often than not the attack is unknown to the small business who's equipment has been compromised due to any number of generic reasons.</div><div class="gmail_extra"><br></div><div class="gmail_extra">I strongly believe more SWIPs will generate better communication with end users and increase awareness of compromise thus creating a safer environment. If not by a little at least.</div><div class="gmail_extra"><br></div><div class="gmail_extra">-Chris<br>
<br><div class="gmail_quote">On Thu, Jun 15, 2017 at 6:52 AM, John Curran <span dir="ltr"><<a href="mailto:jcurran@arin.net" target="_blank">jcurran@arin.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div style="word-wrap:break-word">
On 15 Jun 2017, at 9:43 AM, Chris James <<a href="mailto:chris@datacate.com" target="_blank">chris@datacate.com</a>> wrote:<br>
<div>
<blockquote type="cite">...<br>
<div>
<div dir="ltr" style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px">
<div>Maybe I was not clear. Assuming you spend far more time reading each and every policy proposal that I do; and your position within ARIN:</div>
<div><br>
</div>
<div>Specifically from >>your<< point of view; do you see the SWIP policy currently in place to lean more to abuse management, or allocation justification.</div>
</div>
</div>
</blockquote>
<br>
</div>
<div>My recollection of history is that SWIPs originated for the purpose of reporting utilization to </div>
<div>support subsequent allocations, but the resulting entries in the public Whois have proved to </div>
<div>be important to law enforcement, network researcher and anti-abuse efforts. </div>
<div><br>
</div>
<div>The “correct” trajectory for the ARIN community going forward in this regard remains to be </div>
<div>determined. </div>
<div><br>
</div>
<div>Thanks,</div>
<div>/John</div><span class="HOEnZb"><font color="#888888">
<div><br>
</div>
<div>John Curran</div>
<div>President and CEO</div>
<div>ARIN</div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
</font></span></div>
</blockquote></div><br></div></div>
<br>
<font size="1" style="background-color:white"><span style="font-family:Arial,sans-serif"><span style="font:9px/11px Helvetica,Arial,sans-serif;color:rgb(153,153,153);text-transform:none;text-indent:0px;letter-spacing:normal;word-spacing:0px;float:none;display:inline!important;white-space:normal;background-color:rgb(255,255,255)">This e-mail message may contain confidential or legally privileged information and is intended only for the use of the intended recipient(s). Any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is prohibited. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, or contain viruses. Anyone who communicates with us by e-mail is deemed to have accepted these risks. This company is not responsible for errors or omissions in this message and denies any responsibility for any damage arising from the use of e-mail. Any opinion and other statement contained in this message and any attachment are solely those of the author and do not necessarily represent those of the company.</span></span></font>