[SANOG] Prefix hijacking, how to prevent and fix currently
Paul Wilson
pwilson at apnic.net
Fri Aug 29 05:09:30 UTC 2014
Tarun, good luck resolving this!
The case also illustrates the need for secure routing through RPKI and secure BGP.
For more info on RPKI, see www.apnic.net/rpki
best,
Paul
On 29 Aug 2014, at 5:19 am, Octavio Alvarez <alvarezp at alvarezp.ods.org> wrote:
> This happens more often than you think. That's why BGP prefix filtering
> is so important.
>
> BGPmon [1] is a good tool to monitor BGP prefixes.
>
> [1] http://www.bgpmon.net/
>
> On 28/08/14 09:54, Tarun Dua wrote:
>> AS Number 43239
>> AS Name SPETSENERGO-AS SpetsEnergo Ltd.
>>
>> Has started hijacking our IPv4 prefix, while this prefix was NOT in
>> production, it worries us that it was this easy for someone to hijack
>> it.
>>
>> http://bgp.he.net/AS43239#_prefixes
>>
>> 103.20.212.0/22 <- This belongs to us.
>>
>> 103.238.232.0/22 KNS Techno Integrators Pvt. Ltd.
>> 193.43.33.0/24 hydrocontrol S.C.R.L.
>> 193.56.146.0/24 TRAPIL - Societe des Transports Petroliers par Pipeline
>>
>> Where do we complain to get this fixed.
>>
>> -Tarun
>> AS132420
>> _______________________________________________
>> sanog mailing list
>> sanog at sanog.org
>> https://lists.sanog.org/mailman/listinfo/sanog
>>
> _______________________________________________
> sanog mailing list
> sanog at sanog.org
> https://lists.sanog.org/mailman/listinfo/sanog
More information about the sanog
mailing list