Did you investigate whether the impersonation persisted after the route leak 
was fixed? That is, if someone is impersonating K-root for the vantage points 
that you saw, they might be doing it all the time, not just when there is a 
known route leak. A route leak makes impersonation easier, but it is not a 
requirement.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to