> Hi Marty, > > Noted. We are still checking this issue. > > > > > > Regards, > > LEE BON SHENG | leebonsh...@tm.com.my | ipmc_ipc...@tm.com.my > NOC2 IPCORE, ISP Network Management, Telekom Malaysia, AS4788 > TOLLFREE: 1-800-88-2646 (Opt 4) / International: +603-22466646 (Opt 4) > > > > We're committed to perform. > We strive to excel. > We deliver THE BEST!
Regards, Marty Strong -------------------------------------- CloudFlare - AS13335 Network Engineer ma...@cloudflare.com +44 20 3514 6970 UK (Office) +44 7584 906 055 UK (Mobile) +1 888 993 5273 US (Office) smartflare (Skype) http://www.peeringdb.com/view.php?asn=13335 > On 12 Jun 2015, at 10:41, Stephane Bortzmeyer <bortzme...@nic.fr> wrote: > > On Fri, Jun 12, 2015 at 11:09:34AM +0200, > Tore Anderson <t...@fud.no> wrote > a message of 10 lines which said: > >> I see tons of bogus routes show up with AS4788 in the path, and at >> least AS3549 is acceping them. >> >> E.g. for the RIPE NCC (193.0.0.0/21): >> >> [BGP/170] 00:20:29, MED 1000, localpref 150 >> AS path: 3549 4788 12859 3333 I, validation-state: valid > > Unlike most BGP leaks, they kept the proper origin, so validation by ROA was > useless :-(