Re: Prefix hijacking, how to prevent and fix currently

2014-09-05 Thread Doug Madory
:25 PM Subject: Prefix hijacking, how to prevent and fix currently AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started hijacking our IPv4 prefix, while this prefix was NOT in production, it worries us that it was this easy for someone to hijack it. http://bgp.he.net

RE: Prefix hijacking, how to prevent and fix currently

2014-09-04 Thread Andy Davidson
Hi, Matthew Petach wrote: Be aware that even if you don't think you're peering with them directly, you may be picking up routes via the public route servers at exchange points, so check to see if you need to apply filters on your route server peerings as well. At the risk of receiving

Re: Prefix hijacking, how to prevent and fix currently

2014-09-04 Thread Nick Feamster
squatting for spam generation. Pierre and I have since compared notes on this topic. -Doug Madory - Original Message - From: Tarun Dua li...@tarundua.net To: nanog@nanog.org Sent: Thursday, August 28, 2014 12:55:25 PM Subject: Prefix hijacking, how to prevent and fix currently

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Doug Madory
http://www.bgpmon.net/using-bgp-data-to-find-spammers/ This blog post furthers this discussion, but it would have been appropriate to cite my original analysis explicitly, rather than simply citing some discussion on Nanog recently. If we want to foster a community where people share expertise

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Ca By
On Wed, Sep 3, 2014 at 10:27 AM, Doug Madory dmad...@renesys.com wrote: http://www.bgpmon.net/using-bgp-data-to-find-spammers/ This blog post furthers this discussion, but it would have been appropriate to cite my original analysis explicitly, rather than simply citing some discussion on

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Andree Toonk
.-- My secret spy satellite informs me that at 2014-09-03 10:27 AM Doug Madory wrote: http://www.bgpmon.net/using-bgp-data-to-find-spammers/ This blog post furthers this discussion, but it would have been appropriate to cite my original analysis explicitly, rather than simply citing some

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Saku Ytti
On (2014-09-01 21:34 +), Sriram, Kotikalapudi wrote: Hi Sriram, Please help me understand the argument. Some Org. D can maliciously announce a subprefix under Org. C's prefix, and get away with it due to the 'Loose' mode. So C is advertising valid 192.0.2.0/24 Is D advertising valid

RE: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Sriram, Kotikalapudi
Please help me understand the argument. Some Org. D can maliciously announce a subprefix under Org. C's prefix, and get away with it due to the 'Loose' mode. So C is advertising valid 192.0.2.0/24 Is D advertising valid 192.0.2.0/23? This is unfixable problem? If D is advertising

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Job Snijders
On Tue, Sep 02, 2014 at 03:08:28PM +, Sriram, Kotikalapudi wrote: The example that I gave was not that. In my example, C has legitimate ownership of the less specific (e.g., 192.0.2.0/23). D is malicious and attempting to hijack a subprefix (e.g., 192.0.2.0/24). Importantly, C has a

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Saku Ytti
On (2014-09-02 14:44 +), Sriram, Kotikalapudi wrote: Hi Sriram, Importantly, C has a created a ROA for 192.0.2.0/23 only to protect its address space, but currently *does not advertise* this prefix or any part of it. So D's more specific announcement (hijack) is 'Invalid' in this

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Christopher Morrow
On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders j...@instituut.net wrote: On Tue, Sep 02, 2014 at 03:08:28PM +, Sriram, Kotikalapudi wrote: The example that I gave was not that. In my example, C has legitimate ownership of the less specific (e.g., 192.0.2.0/23). D is malicious and

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Job Snijders
On Tue, Sep 02, 2014 at 11:53:15AM -0400, Christopher Morrow wrote: On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders j...@instituut.net wrote: What is the real damage of hijacking a prefix which is not in use? 'not in use' ... where? What if the 'owner' of the block has the block only routed

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Christopher Morrow
On Tue, Sep 2, 2014 at 12:08 PM, Job Snijders j...@instituut.net wrote: On Tue, Sep 02, 2014 at 11:53:15AM -0400, Christopher Morrow wrote: On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders j...@instituut.net wrote: What is the real damage of hijacking a prefix which is not in use? 'not in use'

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Tarun Dua
Would it not help if RIPE un-publishes these ASN's from their whois database ? I filed the abuse report at RIPE but haven't heard back from them. We are NOT a RIPE member but an APNIC member. Regards -Tarun On Mon, Sep 1, 2014 at 3:49 AM, Matthew Petach mpet...@netflight.com wrote: On Sun, Aug

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Anurag Bhatia
Hi Tarun Not really. People who are filtering route are filtering already since only you have route object for it and people who are not filtering, for them RIPE DB and whois won't matter. On Mon, Sep 1, 2014 at 2:58 PM, Tarun Dua li...@tarundua.net wrote: Would it not help if RIPE

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Saku Ytti
On (2014-09-01 14:58 +0530), Tarun Dua wrote: Hi, Would it not help if RIPE un-publishes these ASN's from their whois database ? I filed the abuse report at RIPE but haven't heard back from them. We are NOT a RIPE member but an APNIC member. Not sure against what RIPE rule it would be and

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Sriram, Kotikalapudi
Loose mode RPKI: - verified or unknown less-specific route is preferable to failing more-specific Or said otherwise when choosing route from Adj-RIBs-In to Loc-RIB longest match is not done to whole population, population is first divided to 'verified', 'unknown' and 'failed' routes, and

RE: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Doug Madory
Subject: Prefix hijacking, how to prevent and fix currently AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started hijacking our IPv4 prefix, while this prefix was NOT in production, it worries us that it was this easy for someone to hijack it. http://bgp.he.net/AS43239

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Saku Ytti
On (2014-08-31 14:04 -0400), Doug Madory wrote: Hi, FWIW, this is from an IP squatting operation I came across in recent weeks. I encounter these things regularly in the course of working with BGP data - probably others do too. Usually I look up the ASN or prefix and often it has already

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Matthew Kaufman
You're funny. What percentage of legacy holders have or will sign the LRSA do you suppose? Matthew Kaufman (Sent from my iPhone) On Aug 29, 2014, at 3:39 PM, Rob Seastrom r...@seastrom.com wrote: Matthew Kaufman matt...@matthew.at writes: I look forward to the ARIN fee schedule for

RE: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Doug Madory
Ah yes BusinessTorg (AS60937). I have also seen this one doing what you are describing. Not to MSFT or GOOG, but another major technology company that we peer with. In fact, it is going on right now but only visible if you receive routes directly from them. A while ago, I sent them a note

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Nick Hilliard
On 29/08/2014 23:39, Rob Seastrom wrote: I'd assume that it would be included in your annual LRSA maintenance fees. it will be interesting to see if we get proposals in the future to move legacy space between RIRs. Nick

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Matthew Petach
On Sun, Aug 31, 2014 at 12:47 PM, Doug Madory dmad...@renesys.com wrote: Ah yes BusinessTorg (AS60937). I have also seen this one doing what you are describing. Not to MSFT or GOOG, but another major technology company that we peer with. In fact, it is going on right now but only visible if

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 03:24 +), Fred Baker (fred) wrote: Do you implement RPKI? Are providers that neighbor with them implementing RPKI? I feel RPKI would be much more marketable if vendors would implement 'loose' mode. Loose mode would drop failing routes, iff there is covering (i.e. less

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:25:16PM +0900, Randy Bush wrote: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? The proposed 'loose' mode protects against unauthorized hole punching

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Brandon Butterworth
From: Saku Ytti s...@ytti.fi I feel RPKI would be much more marketable if vendors would implement 'loose' mode. Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. +10 And it would completely remove false-positive blackholing. This

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Karsten Thomann
Am 29.08.2014 11:25, schrieb Randy Bush: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? randy No, as the the more specific route is signed and is preferred (longest match routing)

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as the the more specific route is signed and is preferred (longest match routing) against the less specific hijacked route clearly i

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Karsten Thomann
Am 29.08.2014 11:39, schrieb Randy Bush: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as the the more specific route is signed and is preferred (longest match routing) against the

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as the the more specific route is signed and is preferred (longest match routing) against the less specific hijacked route clearly i

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:39:32PM +0900, Randy Bush wrote: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as the the more specific route is signed and is preferred (longest

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Sandra Murphy
On Aug 29, 2014, at 6:08 AM, Job Snijders j...@instituut.net wrote: On Fri, Aug 29, 2014 at 06:39:32PM +0900, Randy Bush wrote: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:17:09AM -0400, Sandra Murphy wrote: Loose mode A would look like this: In the case that 10.0.0.0/16 origin AS123 is not in your table, the loose mode would kick in and one could accept more specifics for 10.0.0.0/16, but only when originated by AS123.

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 18:39 +0900), Randy Bush wrote: clearly i am missing something. got a write-up? Job got to it, but shortly: Loose mode RPKI: - verified or unknown less-specific route is preferable to failing more-specific The main goal is always to have all routes, never to blackhole,

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 14:37 +0300), Saku Ytti wrote: clearly i am missing something. got a write-up? Loose mode RPKI: - verified or unknown less-specific route is preferable to failing more-specific Or said otherwise when choosing route from Adj-RIBs-In to Loc-RIB longest match is not done to

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread George, Wes
On 8/28/14, 11:28 PM, Mark Andrews ma...@isc.org wrote: The long term solution is to deploy RPKI and only use transits which use RPKI. No RPKI support = no business. Additionally make RPKI a peering requirement. WG] So should we ask for that before, or after we get everyone

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
Loose mode A B came into existence 15 minutes ago, its good to discuss what a loose mode could mean. ;-) i am ENOTIME. when you have a simple spec i can follow, i would really look forward to it. randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
The long term solution is to deploy RPKI and only use transits which use RPKI. No RPKI support = no business. Additionally make RPKI a peering requirement. WG] So should we ask for that before, or after we get everyone to roll out IPv6 everywhere by voting with our wallets? considering that

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread George, Wes
On 8/29/14, 9:08 AM, Randy Bush ra...@psg.com wrote: considering that measured rpki registration (which has a very tragic side) is ten time ipv6 penetration, i think we ask for rpki first. WG] I guess I should know better than to ask rhetorical questions on NANOG, lest I get an answer. The

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Paul WALL
On Friday, August 29, 2014, Randy Bush ra...@psg.com wrote: i am ENOTIME. when you have a simple spec i can follow, i would really look forward to it. Thanks for summing up in a few words how most of us outside your ivory tower feel about RPKI. Now if you'll excuse me, I'm a grown-up with

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Matthew Kaufman
I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI registrations. Matthew Kaufman (Sent from my iPhone) On Aug 28, 2014, at 8:28 PM, Mark Andrews ma...@isc.org wrote: See whois -r AS43239. The long term solution is to deploy RPKI and only use transits which

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
apologies. that was meant to be private. sigh. randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Rob Seastrom
Matthew Kaufman matt...@matthew.at writes: I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI registrations. I'd assume that it would be included in your annual LRSA maintenance fees. -r

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Jared Mauch
On Fri, Aug 29, 2014 at 06:39:07PM -0400, Robert E. Seastrom wrote: Matthew Kaufman matt...@matthew.at writes: I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI registrations. I'd assume that it would be included in your annual LRSA maintenance fees. Make

Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Tarun Dua
AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started hijacking our IPv4 prefix, while this prefix was NOT in production, it worries us that it was this easy for someone to hijack it. http://bgp.he.net/AS43239#_prefixes 103.20.212.0/22 - This belongs to us. 103.238.232.0/22 KNS

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Faisal Imtiaz
, 2014 12:55:25 PM Subject: Prefix hijacking, how to prevent and fix currently AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started hijacking our IPv4 prefix, while this prefix was NOT in production, it worries us that it was this easy for someone to hijack it. http

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Fred Baker (fred)
On Aug 28, 2014, at 9:55 AM, Tarun Dua li...@tarundua.net wrote: AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started hijacking our IPv4 prefix, while this prefix was NOT in production, it worries us that it was this easy for someone to hijack it.

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Suresh Ramasubramanian
Internet Telecom - Original Message - From: Tarun Dua li...@tarundua.net To: nanog@nanog.org Sent: Thursday, August 28, 2014 12:55:25 PM Subject: Prefix hijacking, how to prevent and fix currently AS Number 43239 AS Name SPETSENERGO-AS SpetsEnergo Ltd. Has started

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Mark Andrews
See whois -r AS43239. The long term solution is to deploy RPKI and only use transits which use RPKI. No RPKI support = no business. Additionally make RPKI a peering requirement. Mark In message