Draft Policy ARIN-2019-15: Hijacking Authorization Not-intended
ARIN
info at arin.net
Tue Jun 25 17:18:29 EDT 2019
On 20 June 2019, the ARIN Advisory Council (AC) accepted "ARIN-prop-275:
Hijacking Authorization Not-intended" as a Draft Policy.
Draft Policy ARIN-2019-15 is below and can be found at:
https://www.arin.net/participate/policy/drafts/2019_15/
You are encouraged to discuss all Draft Policies on PPML. The AC will
evaluate the discussion in order to assess the conformance of this draft
policy with ARIN's Principles of Internet number resource policy as
stated in the Policy Development Process (PDP). Specifically, these
principles are:
* Enabling Fair and Impartial Number Resource Administration
* Technically Sound
* Supported by the Community
The PDP can be found at:
https://www.arin.net/participate/policy/pdp/
Draft Policies and Proposals under discussion can be found at:
https://www.arin.net/participate/policy/drafts/
Regards,
Sean Hopkins
Policy Analyst
American Registry for Internet Numbers (ARIN)
Draft Policy ARIN-2019-15: Hijacking Authorization Not-intended
Problem Statement:
When prop-254 (Clarification on IPv6 Sub-assignments), it was not
related, neither intended, to modify the “exclusivity” criterion.
Of course, it was not intended to provide an explicit authorization for
incidental or transient uses of address space by third parties, which in
fact it is a hijacking of addresses.
However, surprisingly, the resulting text (last paragraph of the NRPM
section 2.5), after the ARIN AC editorial process, is doing that.
This policy proposal tries to fix this specific text in the NRPM section
2.5 to avoid that misinterpretation.
Policy Statement:
Actual Text
Note that the incidental or transient use of address space by third
parties shall not be considered a reassignment or a violation of the
exclusive use criterion.
New Text
Note that the incidental or transient use of address space by third
parties, within the network of the recipient organization, shall not be
considered a reassignment or a violation of the exclusive use criterion
Timetable for Implementation: Immediate
Anything Else:
Situation in other regions: There is not equivalent explicit hijacking
authorization in other RIRs.
More information about the Info
mailing list