Validating possible BGP MITM attack

Steve Feldman feldman at twincreeks.net
Thu Aug 31 17:23:04 UTC 2017


Interesting.  We also got similar BGPMon alerts about disaggregated portions of couple of our prefixes. I didn't see any of the bad prefixes in route-views, though.

The AS paths in the alerts started with "131477 38478 ..." and looked valid after that.  Job's suggestion would explain that.

     Steve

> On Aug 31, 2017, at 10:01 AM, Job Snijders <job at instituut.net> wrote:
> 
> Hi Andy,
> 
> It smells like someone in 38478 or 131477 is using Noction or some other
> BGP "optimizer" that injects hijacks for the purpose of traffic
> engineering. :-(
> 
> Kind regards,
> 
> Job
> 
> On Thu, 31 Aug 2017 at 19:38, Andy Litzinger <andy.litzinger.lists at gmail.com>
> wrote:
> 
>> Hello,
>> we use BGPMon.net to monitor our BGP announcements.  This morning we
>> received two possible BGP MITM alerts for two of our prefixes detected by a
>> single BGPMon probe located in China.  I've reached out to BGPMon to see
>> how much credence I should give to an alert from a single probe location,
>> but I'm interested in community feedback as well.
>> 
>> The alert detailed that one of our /23 prefixes has been broken into /24
>> specifics and the AS Path shows a peering relationship with us that does
>> not exist:
>> 131477(Shanghai Huajan) 38478(Sunny Vision LTD) 3491(PCCW Global) 14042
>> (me)
>> 
>> We do not peer directly with PCCW Global.  I'm going to reach out to them
>> directly to see if they may have done anything by accident, but presuming
>> they haven't and the path is spoofed, can I prove that?  How can I detect
>> if traffic is indeed swinging through that hijacked path? How worried
>> should I be and what are my options for resolving the situation?
>> 
>> thanks!
>> -andy
>> 
> 




More information about the NANOG mailing list