[194699] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cogent BGP Hijack

daemon@ATHENA.MIT.EDU (Tom Paseka via NANOG)
Tue May 23 19:16:16 2017

X-Original-To: nanog@nanog.org
In-Reply-To: <7010.1495560721@turing-police.cc.vt.edu>
Date: Tue, 23 May 2017 16:16:12 -0700
To: valdis.kletnieks@vt.edu
From: Tom Paseka via NANOG <nanog@nanog.org>
Reply-To: Tom Paseka <tom@cloudflare.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Looking at bgplay data, Hetzner possibly had some outages at the time?
Cogent isn't quick at withdrawing routes and will often blackhole inside
their network, but i can't see a large leak/hijack as happened.

On Tue, May 23, 2017 at 10:32 AM, <valdis.kletnieks@vt.edu> wrote:

> On Tue, 23 May 2017 10:10:25 +0300, Scott Christopher said:
> > https://www.lowendtalk.com/discussion/114865/hetzner-and-
> other-traffic-passin
> g-cogent-rerouted-over-moscow#latest
> >
> > A report that all Cogent traffic got re-routed into Moscow. Looks
> > innocent but happened right after UA blocked RU websites (e.g.,
> > VKontakte, Yandex, etc)
> >
> > Any thoughts ?
>
> Similar happened like 3 weeks ago.  Big collective yawn when I posted
> about it.
>

home help back first fref pref prev next nref lref last post