[58031] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: The in-your-face hijacking example, was: Re: Who is announcing

daemon@ATHENA.MIT.EDU (Sean Donelan)
Tue Apr 29 15:24:16 2003

Date: Tue, 29 Apr 2003 15:23:47 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: kai@pac-rim.net
Cc: nanog@merit.edu
In-Reply-To: <124239451603.20030429141436@conti.nu>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, 29 Apr 2003 kai@pac-rim.net wrote:
> On 4/29/2003 at 3:10 AM, Sean Donelan wrote on NANOG-L:
> > So which ISPs are confused?  Bogon's don't spontaneously occur in
> > BGP.  Some ASN must originate them, and ASNs must pass them to
> > other ASNs.  BGP helpfully includes the ASNs in the path.
>
> > What should be done about ASNs which repeatedly announce false or
> > unauthorized routes?
>
> Like: AS 15188 (rogue) ?

It appears this AS is on the tail of

7018 10910 12124 15188
701 10910 12124 15188

AT&T (7018)
InterNAP (10910)
Thorn.net (12124)
UUNET (701)

Who isn't filtering?



home help back first fref pref prev next nref lref last post