[189397] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Question on peering strategies

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue May 24 06:19:31 2016

X-Original-To: nanog@nanog.org
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <574428E2.2060405@netassist.ua>
Date: Tue, 24 May 2016 06:19:23 -0400
To: Max Tulyev <maxtul@netassist.ua>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


> On May 24, 2016, at 6:11 AM, Max Tulyev <maxtul@netassist.ua> wrote:
>=20
> If you dig into hijacking topic more, you will see that hijacks =
through
> Tier1 is same or even more popular than through IXes.

You may not have a view into that you=E2=80=99re being hijacked and used =
to send
SPAM for example:

https://ripe72.ripe.net/presentations/45-Invisible_Hijacking.pdf

Their space was hijacked and announced facing Yahoo.  I=E2=80=99m hoping =
that
Yahoo is now feeding public route views services as a method to help
with detection.  Same goes for Microsoft and Google and other e-mail
providers.  Some sunlight here would help avoid similar localized =
hijacks.

> And if someone want to make me a transit offer for the price of DE-CIX
> (I do not even ask the price of DTEL-IX peering ;) ) - please, contact
> me off-list, I will be really happy.

Pricing obviously varies based on location and a few other criteria, but
you should be shopping if this is a major part of your business.

- Jared=

home help back first fref pref prev next nref lref last post