[149339] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: [#135346] Unauthorized BGP Announcements (follow up to Hijacked

daemon@ATHENA.MIT.EDU (George Bonser)
Wed Feb 1 16:21:51 2012

From: George Bonser <gbonser@seven.com>
To: "nanog@nanog.org" <nanog@nanog.org>
Date: Wed, 1 Feb 2012 21:21:01 +0000
In-Reply-To: <CAJvB4tmLd1A53M76aimbO+uxenX5f8c9eppqpdF00t5niU5WXw@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> The problem is no one will actually blacklist a big ASN because its not
> in the individual best interest, which scales greatly with size. RPKI
> is pretty much the only real fix for this if the chain until the major
> carrier refuses to delist, and RPKI has it's own issues.
>=20
> -Blake

Sadly, you're right. But my guess is that such a blacklisting would have to=
 be done for only a very short period of time and once it is done once or t=
wice, it would never need to be done again.  But it probably is too big a h=
ammer.

Until there is some sort of registry that is the source of truth and is eas=
y to use (distributed?), we're going to keep repeating this process. =20


home help back first fref pref prev next nref lref last post