[94199] in North American Network Operators' Group
Re: i wanna be a kpn peer
daemon@ATHENA.MIT.EDU (David Freedman)
Fri Jan 12 12:22:00 2007
To: nanog@merit.edu
From: David Freedman <david.freedman@uk.clara.net>
Date: Fri, 12 Jan 2007 17:27:54 +0000
X-Complaints-To: usenet@sea.gmane.org
In-Reply-To: <17829.44843.884869.114590@roam.psg.com>
Errors-To: owner-nanog@merit.edu
Randy Bush wrote:
> route-views.oregon-ix.net>sh ip bg 203.10.63.0
> BGP routing table entry for 0.0.0.0/, version 2
> Paths: (1 available, best #1, table Default-IP-Routing-Table)
> Not advertised to any peer
> 286
> 134.222.85.45 from 134.222.85.45 (134.222.85.45)
> Origin IGP, localpref 100, valid, external, best
> Community: 286:286 286:3031 286:3809
>
>
Well, if you take a look at the communities here, from what they publish
in the text of the AS286 AUT-NUM object in the RIPE database:
286:286 Customer routes
286:3031 Customer in Amsterdam
286:3089 No description
I've no idea what 286:3089 is since its not described but it appears
that all prefixes tagged with 286:3089 have 286 as the origin.
Taking a look at these they appear to be customers.
So it could be that these are prefixes that do not belong to KPN
but are advertised by KPN themselves (or rather, with KPN as the origin)
probably because the customer in question does not have an ASN (or at
least a non-private ASN)
So its entirely possible this could be a leak of a default from a
private ASN customer that KPN carried in their backbone.
Of course, since they are providing RV a full feed, not the same as they
would to their peers, this should not be a problem for anybody else
except KPN (and their customer).
The sensible thing to have done would be to have informed KPN privately.
Dave.