[124997] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: China prefix hijack

daemon@ATHENA.MIT.EDU (Frank Pater)
Thu Apr 8 13:20:21 2010

Date: Thu, 8 Apr 2010 13:19:35 -0400
From: Frank Pater <fpater@dca.net>
To: nanog@nanog.org
In-Reply-To: <k2u25dbbe251004080939n4db404f7iafae78b004b23873@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


--wULyF7TL5taEdwHz
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hi,

We received BGPmon notifications for all of our prefixes as well. Not sure =
if it's relevant, but this is also announced upstream from us by 3491. Exam=
ple:

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Possible Prefix Hijack (Code: 10)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Your prefix:          216.158.0.0/18:
Update time:          2010-04-08 15:58 (UTC)
Detected by #peers:   1
Detected prefix:      216.158.0.0/18
Announced by:         AS23724 (CHINANET-IDC-BJ-AP IDC, China Telecommunicat=
ions Corporation)
Upstream AS:          AS4134 (CHINANET-BACKBONE No.31,Jin-rong Street)
ASpath:               39792 4134 23724 23724


--
Frank Pater
DCANet
http://www.dca.net
voice: 888-4-DCANET (888-432-2638)
fax: 302-426-6386


On Thu, Apr 08, 2010 at 12:39:57PM -0400, Chris McDonald wrote:
> i think so yeah
>=20
> AS 23724 is now announcing 63.218.188.0/22 which is historically announced
> by ASes: 3491.
> Time: Thu Apr  8 16:55:02 2010 GMT
> Observed path: 812 174 4134 23724 23724
>=20
>=20
> On Thu, Apr 8, 2010 at 12:33 PM, Grzegorz Janoszka <Grzegorz@janoszka.pl>=
wrote:
>=20
> >
> > Just half an hour ago China Telecom hijacked one of our prefixes:
> >
> > Your prefix:          X.Y.Z.0/19:
> > Prefix Description:   NETNAME
> > Update time:          2010-04-08 15:58 (UTC)
> > Detected by #peers:   1
> > Detected prefix:      X.Y.Z.0/19
> > Announced by:         AS23724 (CHINANET-IDC-BJ-AP IDC, China
> > Telecommunications Corporation)
> > Upstream AS:          AS4134 (CHINANET-BACKBONE No.31,Jin-rong Street)
> > ASpath:               39792 4134 23724 23724
> >
> > Luckily it had to be limited as only one BGPmon peer saw it. Anyone else
> > noticed it?
> >
> > --
> > Grzegorz Janoszka
> >
> >


--wULyF7TL5taEdwHz
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFLvhAnTMDb+XbNbmIRAsaaAJ9q+ESvEN/3EdPic0HLYLARL/tR9gCeMUYF
2LTuF02HiucAa2Bqj9QZR3U=
=7Pww
-----END PGP SIGNATURE-----

--wULyF7TL5taEdwHz--


home help back first fref pref prev next nref lref last post