[184357] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Wrong use of 100.64.0.0/10

daemon@ATHENA.MIT.EDU (Justin M. Streiner)
Fri Oct 2 11:02:36 2015

X-Original-To: nanog@nanog.org
Date: Fri, 2 Oct 2015 10:52:15 -0400 (EDT)
From: "Justin M. Streiner" <streiner@cluebyfour.org>
To: Marco Paesani <marco@paesani.it>
In-Reply-To: <CAOAnmEjYNg-W6AEm4ode_fFeWgeX1=6w8ATupGWP4P+K0jW8=A@mail.gmail.com>
Cc: nanog <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Fri, 2 Oct 2015, Marco Paesani wrote:

> Hi,
> probably this route is wrong, see RFC 6598, as you can see:
>
> show route 100.64.0.0/10
>
> inet.0: 563509 destinations, 1528595 routes (561239 active, 0 holddown,
> 3898 hidden)
> + = Active Route, - = Last Active, * = Both
>
> 100.100.1.0/24     *[BGP/170] 2d 14:46:05, MED 100, localpref 100
>                      AS path: 5580 9498 9730 I, validation-state:
> unverified
>                    > to 78.152.54.166 via ge-2/0/0.0

My guess is someone leaking an internal route.  It's not uncommon to see 
people using random IPv4 space for internal purposes.  Ranges such as
100.100.x.0/24 or 20.20.x.0/24 are often mis-used in this way.

It also looks like at least one of their upsteams is not filtering out any 
advertisements from 100.64/10.

jms

home help back first fref pref prev next nref lref last post