Did you investigate whether the impersonation persisted after the route leak was fixed? That is, if someone is impersonating K-root for the vantage points that you saw, they might be doing it all the time, not just when there is a known route leak. A route leak makes impersonation easier, but it is not a requirement.
--Paul Hoffman
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dns-operations mailing list [email protected] https://lists.dns-oarc.net/mailman/listinfo/dns-operations
