On May 6, 2019, at 9:26 AM, Keith W. Hare <[email protected]<mailto:[email protected]>> wrote: ...Owen Delong described two technical mechanisms used for BGP hijacking:
1. (Easiest and most common) Find a location in the internet where you can inject a route and have it propagate and exploit it. 2. (less common but does happen) Find address space issued to a defunct organization or an organization that does not appear to be actively using it and attempt to steal it from them through the RIR process by creating a new similar looking organization and then attempting to fraudulently "reclaim" the resources. I think the ARIN policies & practice already handle mechanism 2, so I'm going to ignore that for the moment. ... FYI - for those interested in our current practices with regard to handling reports of potential route hijacking, please see our recent blog post - https://teamarin.net/2019/05/06/how-does-arin-handle-reports-of-route-hijacking/ Thanks! /John John Curran President and CEO American Registry for Internet Numbers
_______________________________________________ ARIN-PPML You are receiving this message because you are subscribed to the ARIN Public Policy Mailing List ([email protected]). Unsubscribe or manage your mailing list subscription at: https://lists.arin.net/mailman/listinfo/arin-ppml Please contact [email protected] if you experience any issues.
