This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/routing-wg@ripe.net/
[routing-wg] Prefix hijacking possibility
- Previous message (by thread): [routing-wg] Prefix hijacking possibility
- Next message (by thread): [routing-wg] Prefix hijacking possibility
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Max Tulyev
president at ukraine.su
Sun Feb 20 23:34:47 CET 2011
Alex, In the most cases of real hijacks I know, the origin was the real ASN of the prefix. It is easy, like this (cisco style): router bgp $EVIL_AS network $TARGET_SITE_IP/24 route-map INSERT_ASN ... route-map INSERT_ASN permit 1 set as-path prepend $TARGET_SITE_ASN If you need to fight with the hijacks, you SURE need to check and filter the WHOLE chain of route. 20.02.11 12:45, Alex Band написав(ла): > Hi Amer, > > In order to help mitigate route hijacking issues, it is considered good practice to register your announcements as route objects in an Internet Routing Registry such as the RIPE Database. This allows other to base routing decisions on them, using filters. > > A new alternative is the RIPE NCC Resource Certification service, which was launched at the beginning of this year. This allows you to get a digital certificate for your IP address blocks and create Route Origin Authorisation (ROA) objects, which essentially state "From this Autonomous System, I shall announce these prefixes". This allows anyone on the Internet to *validate* if a certain route announcement has a valid ROA associated with it, created by the legitimate holder of the address space. > > You can find more information here: http://ripe.net/certification > And here is a quick-tour: http://youtu.be/Q0C0kEYa1d8 > > Kind regards, > > Alex Band > Product Manager, RIPE NCC > > > On 18 Feb 2011, at 16:10, Amer wrote: > >> Hi all >> I would like to ask you about what is the possibility of prefix hijacking by ISP after implementing the last RIPE's prefix advertisement procedures >> Is their an official documents regard that? >> >> Best regards >> > -- WBR, Max Tulyev (MT6561-RIPE, 2:463/253 at FIDO)
- Previous message (by thread): [routing-wg] Prefix hijacking possibility
- Next message (by thread): [routing-wg] Prefix hijacking possibility
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]