Hi all, We have submitted a new draft now available at https://datatracker.ietf.org/doc/draft-li-sidrops-stealthy-hijacking/. It describes the risk of stealthy BGP hijacking under incomplete ROV adoption. Since this issue is related to the global routing system security or malpractice, we would like to hear your feedback.
Your comments are welcome. Thank you. Best, Yihao Chen > -----Original Messages----- > From: [email protected] > Send time:Friday, 09/05/2025 12:48:17 > To: "Jianping Wu" <[email protected]>, "Ke Xu" <[email protected]>, > "Li Qi" <[email protected]>, "Qi Li" <[email protected]>, "Yihao > Chen" <[email protected]>, "Zhuotao Liu" > <[email protected]>, "Zhuotao liu" <[email protected]> > Subject: New Version Notification for > draft-li-sidrops-stealthy-hijacking-00.txt > > A new version of Internet-Draft draft-li-sidrops-stealthy-hijacking-00.txt has > been successfully submitted by Yihao Chen and posted to the > IETF repository. > > Name: draft-li-sidrops-stealthy-hijacking > Revision: 00 > Title: Risk of Stealthy BGP Hijacking under Incomplete Adoption of Route > Origin Validation (ROV) > Date: 2025-05-09 > Group: Individual Submission > Pages: 13 > URL: > https://www.ietf.org/archive/id/draft-li-sidrops-stealthy-hijacking-00.txt > Status: > https://datatracker.ietf.org/doc/draft-li-sidrops-stealthy-hijacking/ > HTMLized: > https://datatracker.ietf.org/doc/html/draft-li-sidrops-stealthy-hijacking > > > Abstract: > > This document describes how incomplete adoption of Route Origin > Validation (ROV) makes certain forms of BGP hijacking less visible on > the control plane while still capable of diverting traffic. We > explain the underlying mechanism, define the form of the threat, > analyze an real-world incident that exemplifies the issue, and > discuss potential countermeasures to mitigate its impact. > > > > The IETF Secretariat > _______________________________________________ GROW mailing list -- [email protected] To unsubscribe send an email to [email protected]
