Para los que no creen que el route hijacking es una posibilidad real :-) Y miren que los responsables de propagara estas rutas no autorizadas son carriers grandes.<div><br></div><div>s2,</div><div><br></div><div>Carlos<br>
<br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Geoff Huston</b> <span dir="ltr"><<a href="mailto:gih@apnic.net">gih@apnic.net</a>></span><br>Date: Sat, Oct 30, 2010 at 7:24 PM<br>
Subject: Route hijacking<br>To: nanog list <<a href="mailto:nanog@nanog.org">nanog@nanog.org</a>><br><br><br>My bgp monitor tells me:<br>
<br>
*> <a href="http://1.2.3.0/24" target="_blank">1.2.3.0/24</a> 203.119.76.3 0 4608 1221 4637 3561 1299 12025 ?<br>
*> <a href="http://5.4.3.0/24" target="_blank">5.4.3.0/24</a> 202.12.28.1 0 4777 2516 1239 1299 12025 ?<br>
<br>
<br>
These are _not_ authorized announcements, so could<br>
<br>
AS3561 Savvis<br>
AS1299 Telia<br>
AS1239 Sprintlink<br>
<br>
<br>
kindly DROP these unauthorized route advertisements (and clean up their route acceptance processes so that they stop announcing unauthorized noise to the rest of the Internet).<br>
<br>
And could the folk who run AS12025 IO-DATA-CENTERS - IO Data Centers kindly stop route hijacking?<br>
<br>
<br>
thanks,<br>
<font color="#888888"><br>
Geoff<br>
<br>
<br>
<br>
<br>
</font></div><br><br clear="all"><br>-- <br>--<br>=========================<br>Carlos M. Martinez-Cagnazzo<br><a href="http://cagnazzo.name">http://cagnazzo.name</a><br>=========================<br>
</div>