On Mon, May 6, 2019 at 4:26 PM Keith W. Hare <[email protected]> wrote: > If an organization uses a IPv4 prefix allocated/assigned > to some other organization (the DoD 30.0.0.0/8 for example) > within their internal network and filters out all references > at the edges of their network so that the general public > never sees any references, is that BGP Hijacking?
The prop-266 establishes a difference between intentional and occasional hijacking. Now, consider a case when a Chinese ISP accidentally leaks 30/8 away. Imagine the newspaper headlines next morning, given that 30/8 is formally allocated to the DoD. Imagine Joe Sixpacks talking about the issue, treating that as a direct violent attack against the DoD, almost (if almost) an act of war. After that, consider the PR consequences when ARIN (APNIC etc.) decides that was accidental and thus just fine. This is one of the scenarios that makes me worry the most: exposing the cute and simple network address registry to all sorts of politicians with their ambitions. -- Töma _______________________________________________ ARIN-PPML You are receiving this message because you are subscribed to the ARIN Public Policy Mailing List ([email protected]). Unsubscribe or manage your mailing list subscription at: https://lists.arin.net/mailman/listinfo/arin-ppml Please contact [email protected] if you experience any issues.
