AS4788 Telecom Malaysia major route leak?

Marty Strong marty at cloudflare.com
Fri Jun 12 10:15:25 UTC 2015


> Hi Marty,
> 
> Noted. We are still checking this issue.
> 
> 
> 
> 
> 
> Regards,
> 
> LEE BON SHENG | leebonsheng at tm.com.my | ipmc_ipcore at tm.com.my
> NOC2 IPCORE, ISP Network Management, Telekom Malaysia, AS4788
> TOLLFREE: 1-800-88-2646 (Opt 4) / International: +603-22466646 (Opt 4)
> 
> 
>  
> We're committed to perform.
> We strive to excel.
> We deliver THE BEST!

Regards,
Marty Strong
--------------------------------------
CloudFlare - AS13335
Network Engineer
marty at cloudflare.com
+44 20 3514 6970 UK (Office)
+44 7584 906 055 UK (Mobile)
+1 888 993 5273 US (Office)
smartflare (Skype)

http://www.peeringdb.com/view.php?asn=13335

> On 12 Jun 2015, at 10:41, Stephane Bortzmeyer <bortzmeyer at nic.fr> wrote:
> 
> On Fri, Jun 12, 2015 at 11:09:34AM +0200,
> Tore Anderson <tore at fud.no> wrote 
> a message of 10 lines which said:
> 
>> I see tons of bogus routes show up with AS4788 in the path, and at
>> least AS3549 is acceping them.
>> 
>> E.g. for the RIPE NCC (193.0.0.0/21):
>> 
>>                    [BGP/170] 00:20:29, MED 1000, localpref 150
>>                      AS path: 3549 4788 12859 3333 I, validation-state: valid
> 
> Unlike most BGP leaks, they kept the proper origin, so validation by ROA was
> useless :-(




More information about the NANOG mailing list