skip to main content
10.1145/2070562.2070574acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

The great IPv4 land grab: resource certification for the IPv4 grey market

Published: 14 November 2011 Publication History
  • Get Citation Alerts
  • Abstract

    The era of free IPv4 address allocations has ended and the grey market in IPv4 addresses is now emerging. This paper argues that one cannot and should not try to regulate who sells addresses and at what price, but one does need to provide some proof of ownership in the form of resource certification. In this paper we identify key requirements of resource certification, gained from both theoretical analysis and operational history. We further argue these requirements can be achieved by making use of the existing reverse DNS hierarchy, enhanced with DNS Security. Our analysis compares reverse DNS entries and BGP routing tables and shows this is both feasible and achievable today; an essential requirement as the grey market is also emerging today and solutions are needed now, not years in the future.

    References

    [1]
    Addrex. http://www.addrex.net.
    [2]
    APNIC guidelines for IPv4 allocation and assignment requests. http://www.apnic.net/.
    [3]
    Depository. http://www.depository.net.
    [4]
    IANA IPv4 Address Space Registry. http://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xml.
    [5]
    IPv4 IANA Free Pool Depletion FAQ. https://www.arin.net/resources/request/ipv4_depletion.html.
    [6]
    Microsoft spends $7.5m on ip addresses.http://www.theregister.co.uk/2011/03/24/microsoft_ip_spend/.
    [7]
    tradeipv4: Ipv4 address block exchange. http://www.tradeipv4.com.
    [8]
    AfriNIC. Policy - IPv4 Address Allocation Policies. AFPUB-2005-v4-001.
    [9]
    R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. DNS Security Introduction and Requirement. RFC 4033, March 2005.
    [10]
    ARIN. ARIN Number Resource Policy Manual. https://www.arin.net/policy/nrpm.html.
    [11]
    Network World Carolyn Duffy Marsan. Need IPv4 addresses? Get 'em here. April 25, 2011.
    [12]
    H. Eidnes, G. de Groot, and P. Vixie. Classless IN-ADDR.ARPA delegation. RFC 2317, March 1998.
    [13]
    Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos. Dynamics of prefix usage at an edge router. In PAM'11, 2011.
    [14]
    K. Hubbard, M. Kosters, D. Conrad, D. Karrenberg, and J. Postel. Internet Registry IP Allocation Guidelines. RFC 2050, Nov 1996.
    [15]
    Geoff Huston. List of ASN organizations. http://www.potaroo.net/bgp/iana/asn.txt.
    [16]
    IETF. DANE. https://datatracker.ietf.org/wg/dane/charter/.
    [17]
    LACNIC. LACNIC - Policies. http://lacnic.net/en/politicas/index.html.
    [18]
    Ang Li, Xin Liu, and Xiaowei Yang. Bootstrapping accountability in the internet we have. NSDI'11, 2011.
    [19]
    Milton L Mueller. Scarcity in IP addresses: IPv4 Address Transfer Markets and the Regional Internet Address Registries. Internet Governance Project Paper IGP08002, (September 1981):1--20, 2008.
    [20]
    RIPE. IPv4 Address Allocation and Assignment Policies for the RIPE NCC Service Region. RIPE-509.
    [21]
    Ars Technica Iljitsch van Beijnum. ARIN fights IP address trading as transition to IPv6 may get new deadlines. August 2008.
    [22]
    Xiaowei Yang and Xin Liu. Internet Protocol Made Accountable. In HotNets-VIII, 2009.

    Cited By

    View all
    • (2024)The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future ProspectsIEEE Transactions on Network and Service Management10.1109/TNSM.2023.332745521:2(2353-2373)Online publication date: Apr-2024
    • (2016)Using Geolocation for the Strategic Preincident Preparation of an IT Forensics AnalysisIEEE Systems Journal10.1109/JSYST.2015.238951810:4(1338-1349)Online publication date: Dec-2016
    • (2015)A Decentralized Framework for Geolocation-Based Pre-Incident Network ForensicsProceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems10.1109/HPCC-CSS-ICESS.2015.233(1210-1218)Online publication date: 24-Aug-2015
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks
    November 2011
    148 pages
    ISBN:9781450310598
    DOI:10.1145/2070562
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    HOTNETS-X
    Sponsor:
    HOTNETS-X: Tenth ACM Workshop on Hot Topics in Networks
    November 14 - 15, 2011
    Massachusetts, Cambridge

    Acceptance Rates

    Overall Acceptance Rate 110 of 460 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)2

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future ProspectsIEEE Transactions on Network and Service Management10.1109/TNSM.2023.332745521:2(2353-2373)Online publication date: Apr-2024
    • (2016)Using Geolocation for the Strategic Preincident Preparation of an IT Forensics AnalysisIEEE Systems Journal10.1109/JSYST.2015.238951810:4(1338-1349)Online publication date: Dec-2016
    • (2015)A Decentralized Framework for Geolocation-Based Pre-Incident Network ForensicsProceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems10.1109/HPCC-CSS-ICESS.2015.233(1210-1218)Online publication date: 24-Aug-2015
    • (2014)From the consent of the routedACM SIGCOMM Computer Communication Review10.1145/2740070.262629344:4(51-62)Online publication date: 17-Aug-2014
    • (2014)From the consent of the routedProceedings of the 2014 ACM conference on SIGCOMM10.1145/2619239.2626293(51-62)Online publication date: 17-Aug-2014
    • (2013)A first look at IPv4 transfer marketsProceedings of the ninth ACM conference on Emerging networking experiments and technologies10.1145/2535372.2535416(7-12)Online publication date: 9-Dec-2013
    • (2012)Estimating the number of hosts corresponding to an address while preserving anonymityProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_13(166-179)Online publication date: 21-Nov-2012

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media