[164868] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: questions regarding prefix hijacking

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Wed Aug 7 06:07:48 2013

In-Reply-To: <CAJx5YvF0K_aM3Kb46RLWU3g9BKXgqCyrq_atG+WRkJLcKoshhQ@mail.gmail.com>
Date: Wed, 7 Aug 2013 03:07:04 -0700
From: Paul Ferguson <fergdawgster@gmail.com>
To: Martin T <m4rtntns@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Aug 7, 2013 at 2:13 AM, Martin T <m4rtntns@gmail.com> wrote:

> Ok. And such attacks have happened in the past? For example one could
> do a pretty widespread damage for at least short period of time if it
> announces for example some of the root DNS server prefixes(as long
> prefixes as possible) to it's upstream provider and as upstream
> provider probably prefers client traffic over it's peerings or
> upstreams, it will prefer those routes by malicious ISP for all the
> traffic to root DNS servers?
>
>

Historically, most prefix hijacks have been accidental, generally due
to configuration error -- for instance:

http://www.renesys.com/2008/02/pakistan-hijacks-youtube-1/

Having said that, there are quite a few documented cases of it being
done intentionally, and for nefarious purposes.

- ferg



-- 
"Fergie", a.k.a. Paul Ferguson
 fergdawgster(at)gmail.com


home help back first fref pref prev next nref lref last post