[181680] in North American Network Operators' Group
Re: NTT->HE earlier today (~10am EDT)
daemon@ATHENA.MIT.EDU (Job Snijders)
Tue Jun 30 18:42:05 2015
X-Original-To: nanog@nanog.org
Date: Wed, 1 Jul 2015 00:39:35 +0200
From: Job Snijders <job@instituut.net>
To: Ca By <cb.list6@gmail.com>
In-Reply-To: <CAD6AjGTq8GuzqS2zXkhN99MGsA4MnW3DX1EDCmNTcoeq6jesAQ@mail.gmail.com>
Cc: Tore Anderson <tore@fud.no>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Tue, Jun 30, 2015 at 03:32:42PM -0700, Ca By wrote:
> It is NTT that would have mitigated this issue if they deployed and
> enforcer rpki, right?
No, NTT deploying RPKI would not have helped in yesterday's issue.
But, RPKI could've made a difference in today's Bangladesh leak, even if
RPKI validation was not implemented by the direct upstream with
propagated the leak.
Kind regards,
Job