Heads up: Long AS-sets announced in the next few days

Kurt Erik Lindqvist kurtis at kurtis.pp.se
Thu Mar 3 09:53:12 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On 2005-03-03, at 10.27, Geoff Huston wrote:

>
>> On 2005-03-02, at 19.38, James A. T. Rice wrote:
>>
>> > This seems to suggest that you are just picking ASns at random to
>> > inject into the paths, and that you don't have a set of ASs which 
>> you
>> > have the assignees permission to use.
>>
>> Would't this then actually equate to resource hijacking along the 
>> lines
>> of prefix hijacking? Who will be the first to hit the RIRs?
>
> Isn't this a case of illustrating how easy it is to tell lies in BGP 
> today? I don't
> see what hitting the RIRs has do to with this. The problem appears to 
> be more
> basic than that - its just too easy to tell lies in BGP and get the 
> lies propagated
> globally.

Well agreed. And that is an important point in itself.

The reference to the RIRs was me trying to be ironic as when we have 
prefix hijacks that seems to be reported to the RIRs.

- - kurtis -

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBQibejKarNKXTPFCVEQKO6ACeIzkX5j04JA3RK3Y48fSsXM0DMLEAoM+k
6+j6phNoiKSg5Qai2CNSloLa
=TWvV
-----END PGP SIGNATURE-----




More information about the NANOG mailing list