<div dir="ltr"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">But, anyway, it is a hijack by perception: the LIR managing the<br>
prefixes didn't authorize the split announcement. Also, frankly, it's<br>
not really clear if it's an optimizer just *leaking* or that's on<br>
purpose.<br></blockquote><div><br></div><div>Has this route split (not including 25s) been visible globally? Hijacks or simular behavior happening only in scope of certain IXP are undoubtfully problematic in terms of automated issue escalation as IXP members probably had some sort of agreement on traffic engineering and whatever else being used within a limited scope. The 2019-03 is not about having a purpose or not and I highly doubt that it will be possible to define legal matters for hijacks with limited visibility scope as no trusted parties could observe it at a time. Covering all possible misuses of a global routing table certainly seems possible when we are describing global leaks, because everything else is a matter of trusted route propagation and not the application of a policy where trusted actors not always be able detect the problem at all.</div><div><br></div><div>tl;dr - don't try to fix all possible leak scenarios with the policy, consider only ones been globally (a bad term, yeah) visible where space owner has a complaint against the leak</div></div></div>