[170643] in North American Network Operators' Group
Re: BGPMON Alert Questions
daemon@ATHENA.MIT.EDU (Curtis Doty)
Wed Apr 2 17:18:20 2014
In-Reply-To: <CAJvB4tnUTuqv+jDqP6MoiVoAA6LfLCysQnzYPkYbv+vftWcNBw@mail.gmail.com>
Date: Wed, 2 Apr 2014 13:57:08 -0700
From: Curtis Doty <Curtis@GreenKey.net>
To: Blake Dunlap <ikiris@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Wed, Apr 2, 2014 at 1:24 PM, Blake Dunlap <ikiris@gmail.com> wrote:
> Is this malicious or did someone redistribute all of bgp with bad upstream
> filtering?
>
They perfectly re-advertized all mine. Loos like a huge mistake. And still
ongoing.
Although this was nice to see:
====================================================================
RPKI Validation Failed (Code: 9)
====================================================================
Your prefix: 199.47.80.0/21:
Prefix Description: NET-199-47-80-0-1
Update time: 2014-04-02 20:29 (UTC)
Detected by #peers: 1
Detected prefix: 199.47.80.0/21
Announced by: AS4761 (INDOSAT-INP-AP INDOSAT Internet Network
Provider,ID)
Upstream AS: AS4651 (THAI-GATEWAY The Communications Authority of
Thailand(CAT),TH)
ASpath: 18356 38794 4651 4761
RPKI Status: ROA validation failed: Invalid Origin ASN, expected
46851
Albeit ineffective.
../C