i believe john curran just posted the follow up to the list yesterday on this matter
On Thu, Dec 10, 2009 at 10:51 AM, Dobbins, Roland <rdobb...@arbor.net>wrote: > > On Dec 11, 2009, at 1:35 AM, Jared Mauch wrote: > > > As always, good research by renesys. > > What happens when an ASN is requested, and it's discovered that said ASN is > already in use by an unauthorized network, and that some proportion of the > Internet are accepting it due to a lack of appropriate routing policy? Is > there a process to try and reclaim said ASN via persuasion, or some > jurisdictionally-appropriate legal action, or peer pressure (pardon the > pun), or . . . ? > > This is a different circumstance than either accidental or deliberate use > of an already-assigned and -utilized ASN; has this situation occurred in the > past, and if so, how was it resolved? If the situation isn't resolved in a > timely manner, is the ASN in question considered 'poisoned' until a > resolution is attained, and the next available ASN which isn't being > utilized in a rogue fashion issued in its place? > > Apologies if this is a naive question; I've not run into this particular > circumstance before, nor have I found any reference to it in any of the > various list archives. I do believe that it may become a bit more common, > given some of the confusion and drama regarding the operationalization of > 4-byte ASNs. > > ----------------------------------------------------------------------- > Roland Dobbins <rdobb...@arbor.net> // <http://www.arbornetworks.com> > > Injustice is relatively easy to bear; what stings is justice. > > -- H.L. Mencken > > > > >