[181680] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NTT->HE earlier today (~10am EDT)

daemon@ATHENA.MIT.EDU (Job Snijders)
Tue Jun 30 18:42:05 2015

X-Original-To: nanog@nanog.org
Date: Wed, 1 Jul 2015 00:39:35 +0200
From: Job Snijders <job@instituut.net>
To: Ca By <cb.list6@gmail.com>
In-Reply-To: <CAD6AjGTq8GuzqS2zXkhN99MGsA4MnW3DX1EDCmNTcoeq6jesAQ@mail.gmail.com>
Cc: Tore Anderson <tore@fud.no>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Tue, Jun 30, 2015 at 03:32:42PM -0700, Ca By wrote:
> It is NTT that would have mitigated this issue if they deployed and
> enforcer rpki, right?

No, NTT deploying RPKI would not have helped in yesterday's issue.

But, RPKI could've made a difference in today's Bangladesh leak, even if
RPKI validation was not implemented by the direct upstream with
propagated the leak.

Kind regards,

Job

home help back first fref pref prev next nref lref last post