It's hard to respond to this without giving bad guys good ideas, so I'll keep it vague.
The observation that the protocol started out being open is valid. However, remember the times. Not everyone had the skill, resources, and platform for running a mud. It is now trivial to run a mud from mobile platforms behind varying levels of source obfuscation. The casual approach of dealing with griefers in 1996 manifestly no longer works.
For now this means you need an admin or two that pay attention and responds to threats. Probably this is a weakness in the long term.
One alternative is to develop a network that works on a community consensus as to who is good and who is bad, and has points of trust from which blacklist and whitelists can conveniently be shared, and....and this is the important part....and a protocol whose implementation can be conveniently updated and distributed as new ways of undermining the community arise.
This is a pretty tall order for a community trundling along mostly on momentum. I think we're probably better off having a few trusted community figures run peer i3 nodes, and clean up the Inter Router Networking protocol.
I certainly like the idea of a distributed network: it's less work for me. I just happen to have seen it work poorly (i2) and I think it needs not only a critical mass but also a minimum adoption rate and a very robust maintainership cadre for it to be something other than a pet coding project.
No fense, sorry if this sounds like rain on the parade, and anyway, I hope I'm wrong so dudes like you know who aren't my problem

-Crat