[107310] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Revealed: The Internet's well known BGP behavior

daemon@ATHENA.MIT.EDU (Nathan Ward)
Fri Aug 29 23:24:45 2008

From: Nathan Ward <nanog@daork.net>
To: nanog <nanog@merit.edu>
In-Reply-To: <87zlmvbi0n.fsf@mid.deneb.enyo.de>
Date: Sat, 30 Aug 2008 15:24:34 +1200
Errors-To: nanog-bounces@nanog.org

On 30/08/2008, at 9:58 AM, Florian Weimer wrote:

> * Alex Pilosov:
>
>> We've demonstrated ability to monitor traffic to arbitrary
>> prefixes. Slides for presentation can be found here:
>> http://eng.5ninesdata.com/~tkapela/iphd-2.ppt
>
> The interesting question is whether it's acceptable to use this trick
> for non-malicious day-to-day traffic engineering.


The technique of path stuffing ASes who you do not want to receive an  
announcement is called AS PATH poisoning. It's a fairly well known  
trick.

--
Nathan Ward






home help back first fref pref prev next nref lref last post