<div dir="ltr"><br><div class="gmail_extra">That's true I didn't mention those techniques to prevent these incidents. That's not the same as saying they wouldn't prevent them if everyone filtered bogus announcements based on <span tabindex="-1" id=":2zk.9" style class="">RPKI</span> or origin validation.<br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
What is interesting to consider is that for nearly all of these incidents, we're seeing 100% of our 400+ peers accept these bogus routes. While we don't peer with every single AS on the Internet, I have yet to encounter evidence that things like RPKI or origin validation are making any measurable difference.<br>
<br>
If those techniques were widely used, I would expect to see a percentage less than 100% carrying the bogus routes.<br>
<br></blockquote><div><br></div><div>(<span tabindex="-1" id=":2zk.10" style class="">Roque</span>) We know it is not widely used yet and we need to work to create a wider adoption. <br><br></div><div>That is why I was surprise with your article conclusions because it gives little hope as there is nothing that operators can do today. In reality we can call them to action to start signing their objects and in a close future to start filter based on origin validation and thus eliminating a large part of the problem. Else, we will be on a chicken and egg circle for a long time until some external catastrophic event will force us to do something about it...As global problem there are not simple solutions.<br><br></div></div></div><div class="gmail_extra"><span tabindex="-1" id=":2zk.12" style class="">Roque</span><br clear="all"></div><div class="gmail_extra"><br>-- <br><div class="gmail_signature"><br><br>At least I did something<br>Don Draper - Mad Men</div>
</div></div>