[180924] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: AS4788 Telecom Malaysia major route leak?

daemon@ATHENA.MIT.EDU (Marty Strong via NANOG)
Fri Jun 12 06:38:30 2015

X-Original-To: nanog@nanog.org
In-Reply-To: <20150612094130.GA24974@nic.fr>
Date: Fri, 12 Jun 2015 11:15:25 +0100
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
From: Marty Strong via NANOG <nanog@nanog.org>
Reply-To: Marty Strong <marty@cloudflare.com>
Cc: Tore Anderson <tore@fud.no>, gore@esnog.net, NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

> Hi Marty,
>=20
> Noted. We are still checking this issue.
>=20
>=20
>=20
>=20
>=20
> Regards,
>=20
> LEE BON SHENG | leebonsheng@tm.com.my | ipmc_ipcore@tm.com.my
> NOC2 IPCORE, ISP Network Management, Telekom Malaysia, AS4788
> TOLLFREE: 1-800-88-2646 (Opt 4) / International: +603-22466646 (Opt 4)
>=20
>=20
> =20
> We're committed to perform.
> We strive to excel.
> We deliver THE BEST!

Regards,
Marty Strong
--------------------------------------
CloudFlare - AS13335
Network Engineer
marty@cloudflare.com
+44 20 3514 6970 UK (Office)
+44 7584 906 055 UK (Mobile)
+1 888 993 5273 US (Office)
smartflare (Skype)

http://www.peeringdb.com/view.php?asn=3D13335

> On 12 Jun 2015, at 10:41, Stephane Bortzmeyer <bortzmeyer@nic.fr> =
wrote:
>=20
> On Fri, Jun 12, 2015 at 11:09:34AM +0200,
> Tore Anderson <tore@fud.no> wrote=20
> a message of 10 lines which said:
>=20
>> I see tons of bogus routes show up with AS4788 in the path, and at
>> least AS3549 is acceping them.
>>=20
>> E.g. for the RIPE NCC (193.0.0.0/21):
>>=20
>>                    [BGP/170] 00:20:29, MED 1000, localpref 150
>>                      AS path: 3549 4788 12859 3333 I, =
validation-state: valid
>=20
> Unlike most BGP leaks, they kept the proper origin, so validation by =
ROA was
> useless :-(


home help back first fref pref prev next nref lref last post