[107310] in North American Network Operators' Group
Re: Revealed: The Internet's well known BGP behavior
daemon@ATHENA.MIT.EDU (Nathan Ward)
Fri Aug 29 23:24:45 2008
From: Nathan Ward <nanog@daork.net>
To: nanog <nanog@merit.edu>
In-Reply-To: <87zlmvbi0n.fsf@mid.deneb.enyo.de>
Date: Sat, 30 Aug 2008 15:24:34 +1200
Errors-To: nanog-bounces@nanog.org
On 30/08/2008, at 9:58 AM, Florian Weimer wrote:
> * Alex Pilosov:
>
>> We've demonstrated ability to monitor traffic to arbitrary
>> prefixes. Slides for presentation can be found here:
>> http://eng.5ninesdata.com/~tkapela/iphd-2.ppt
>
> The interesting question is whether it's acceptable to use this trick
> for non-malicious day-to-day traffic engineering.
The technique of path stuffing ASes who you do not want to receive an
announcement is called AS PATH poisoning. It's a fairly well known
trick.
--
Nathan Ward