[107733] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: community real-time BGP hijack notification service

daemon@ATHENA.MIT.EDU (Nathan Ward)
Fri Sep 12 09:28:08 2008

From: Nathan Ward <nanog@daork.net>
To: nanog <nanog@merit.edu>
In-Reply-To: <c93a55220809120614p6f413628qcbb3d56aa580f25c@mail.gmail.com>
Date: Sat, 13 Sep 2008 01:27:31 +1200
Errors-To: nanog-bounces@nanog.org

On 13/09/2008, at 1:14 AM, Christian Koch wrote:

> Maybe a better idea would be if you were able to input your origin asn
> and define your upstreams and/or peers, to be alerted on as well. (ie:
> Do not alert me on any paths containing  123_000, 456_000, 789_000).


Again, that is trivially easy to falsify.

My best quick hack solution so far is to fire off a traceroute and  
make sure that the traceroute gets ICMP TTL expire messages from IP  
addresses that are in prefixes originated from all the ASes in the  
ASPATH.
Still forgeable, but a bit more difficult.. still far from perfect  
though.

--
Nathan Ward






home help back first fref pref prev next nref lref last post