[157745] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: AS 1668 BGP contact - possible prefix hijacking

daemon@ATHENA.MIT.EDU (Brad Passwaters)
Tue Nov 6 09:27:42 2012

In-Reply-To: <CAOvEG7MJSOs9Mv4zv6fEHobZ1u+Aaf5snaUrF9ObFrFEbbDv5A@mail.gmail.com>
Date: Tue, 6 Nov 2012 09:27:24 -0500
From: Brad Passwaters <brad.passwaters@gmail.com>
To: Ben Bartsch <uwcableguy@gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Ben,

We don't believe there is prefix hijacking.  Due to various legal and
contractual obligations there are certain questions you asked that
we just can not answer.  However I have asked an engineer to sanitize our
internal audit and provide it to you.
Also I'll reach out to you later today by phone and make sure that it
answers your questions.

Brad Passwaters - Director Production Networks at Aol
(My Nanog participation predates my employment at Aol thus the use of a
personal account)

On Tue, Nov 6, 2012 at 9:02 AM, Ben Bartsch <uwcableguy@gmail.com> wrote:

> Hi:
>
> Is there anyone here who can help us with a possible prefix hijacking
> situation through ATDN?  Please contact me off list if you (or you know
> somebody) that can help us.  I've tried the ATDN NOC and Vikas, but they
> have been no help whatsoever.
>
> The hijacked prefix appears to be sent to AS 1668, then propagated from
> there.
>
> Thanks.
>
> Ben
> AS 32440
>



-- 

Brad Passwaters
------------------------------------------
brad.passwaters@gmail.com

home help back first fref pref prev next nref lref last post