[109274] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Prefix Hijack Tool Comaprision

daemon@ATHENA.MIT.EDU (Danny McPherson)
Thu Nov 13 16:09:52 2008

From: Danny McPherson <danny@tcb.net>
To: Todd Underwood <todd@renesys.com>
In-Reply-To: <20081113200513.GW20914@renesys.com>
Date: Thu, 13 Nov 2008 14:09:45 -0700
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org


On Nov 13, 2008, at 1:05 PM, Todd Underwood wrote:
>
> as such, i don't count it as a hijacking or leak of any great
> significance and wouldn't want to alert anyone about it.  that's why i
> recommend that prefix hijacking detection systems do thresholding of
> peers to prevent a single, rogue, unrepresentative peer from reporting
> a hijacking when none is really happening.  others may have a
> different approach, but without thresholding prefix alert systems can
> be noisy and more trouble than they are worth.

While I agree that this incident didn't appear to much impact
anyone beyond CTBC and their customers (where we very clearly
impacted considerably), I would contend that ANY time anyone
asserts reachability of another ASNs address space the owner
of that space should be alerted.

IMO, if an actual intentional targeted attack were to be launched,
versus, say, the slew of accidental leaks we mostly see, then it
may very well be scoped to some insignificant corner of the Internet,
as close to the targets as possible - that's precisely what I'd do
if I were to launch such an attack....

Now, if the goal is denial of service or a leak, sure, it'll
likely propagate much wider - and be detected much quicker.



-danny


home help back first fref pref prev next nref lref last post