Re: Prefix hijacking, how to prevent and fix currently

2014-09-05 Thread Doug Madory
Hi Nick, All, Thanks for the links. I'm glad to know people are working on this. I don't think anyone was suggesting that this was a new phenomenon. Someone wrote to this list about a particular incident and I shared details about how this was part of a larger IP squatting operation. Unique fr

Re: Prefix hijacking, how to prevent and fix currently

2014-09-04 Thread Nick Feamster
Hi Doug, All, We’ve seen similar things, including hijacks of less specific IP prefixes (even /8s), correlated with spam behavior. We presented on this at NANOG 35: http://nanog.org/meetings/nanog36/presentations/feamster.pdf Slide 4 shows a short-lived BGP announcement for IP space that was

RE: Prefix hijacking, how to prevent and fix currently

2014-09-04 Thread Andy Davidson
Hi, Matthew Petach wrote: > Be aware that even if you don't think you're peering with them > directly, you may be picking up routes via the public route > servers at exchange points, so check to see if you need to apply > filters on your route server peerings as well. At the risk of receiving 1

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Andree Toonk
.-- My secret spy satellite informs me that at 2014-09-03 10:27 AM Doug Madory wrote: > http://www.bgpmon.net/using-bgp-data-to-find-spammers/ > > This blog post furthers this discussion, but it would have been appropriate > to cite my original analysis explicitly, rather than simply citing "som

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Ca By
On Wed, Sep 3, 2014 at 10:27 AM, Doug Madory wrote: > http://www.bgpmon.net/using-bgp-data-to-find-spammers/ > > This blog post furthers this discussion, but it would have been appropriate > to cite my original analysis explicitly, rather than simply citing "some > discussion on Nanog recently."

Re: Prefix hijacking, how to prevent and fix currently

2014-09-03 Thread Doug Madory
http://www.bgpmon.net/using-bgp-data-to-find-spammers/ This blog post furthers this discussion, but it would have been appropriate to cite my original analysis explicitly, rather than simply citing "some discussion on Nanog recently." If we want to foster a community where people share expertis

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Christopher Morrow
On Tue, Sep 2, 2014 at 12:08 PM, Job Snijders wrote: > On Tue, Sep 02, 2014 at 11:53:15AM -0400, Christopher Morrow wrote: >> On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders wrote: >> >> > What is the real damage of hijacking a prefix which is not in use? >> >> 'not in use' ... where? >> >> What if

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Job Snijders
On Tue, Sep 02, 2014 at 11:53:15AM -0400, Christopher Morrow wrote: > On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders wrote: > > > What is the real damage of hijacking a prefix which is not in use? > > 'not in use' ... where? > > What if the 'owner' of the block has the block only routed > 'interna

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Christopher Morrow
On Tue, Sep 2, 2014 at 11:25 AM, Job Snijders wrote: > On Tue, Sep 02, 2014 at 03:08:28PM +, Sriram, Kotikalapudi wrote: >> The example that I gave was not that. In my example, C has legitimate >> ownership of the less specific (e.g., 192.0.2.0/23). D is malicious >> and attempting to hijack

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Saku Ytti
On (2014-09-02 14:44 +), Sriram, Kotikalapudi wrote: Hi Sriram, > Importantly, C has a created a ROA for 192.0.2.0/23 only to protect > its address space, but currently *does not advertise* this prefix or any part > of it. > So D's more specific announcement (hijack) is 'Invalid' in this sc

Re: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Job Snijders
On Tue, Sep 02, 2014 at 03:08:28PM +, Sriram, Kotikalapudi wrote: > The example that I gave was not that. In my example, C has legitimate > ownership of the less specific (e.g., 192.0.2.0/23). D is malicious > and attempting to hijack a subprefix (e.g., 192.0.2.0/24). > Importantly, C has a cr

RE: Prefix hijacking, how to prevent and fix currently

2014-09-02 Thread Sriram, Kotikalapudi
>Please help me understand the argument. > >> Some Org. D can maliciously announce a subprefix under Org. C's >> prefix, and get away with it due to the 'Loose' mode. > >So C is advertising valid 192.0.2.0/24 >Is D advertising valid 192.0.2.0/23? > >This is unfixable problem? If D is advert

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Saku Ytti
On (2014-09-01 21:34 +), Sriram, Kotikalapudi wrote: Hi Sriram, Please help me understand the argument. > Some Org. D can maliciously announce a subprefix under Org. C's prefix, > and get away with it due to the 'Loose' mode. So C is advertising valid 192.0.2.0/24 Is D advertising valid 192

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Sriram, Kotikalapudi
>> Loose mode RPKI: >> - verified or unknown less-specific route is preferable to failing >> more-specific >Or said otherwise when choosing route from Adj-RIBs-In to Loc-RIB longest >match is not done to whole population, population is first divided to >'verified', 'unknown' and 'failed' routes,

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Saku Ytti
On (2014-09-01 14:58 +0530), Tarun Dua wrote: Hi, > Would it not help if RIPE un-publishes these ASN's from their whois database ? > > I filed the abuse report at RIPE but haven't heard back from them. We > are NOT a RIPE member but an APNIC member. Not sure against what RIPE rule it would be a

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Anurag Bhatia
Hi Tarun Not really. People who are filtering route are filtering already since only you have route object for it and people who are not filtering, for them RIPE DB and whois won't matter. On Mon, Sep 1, 2014 at 2:58 PM, Tarun Dua wrote: > Would it not help if RIPE un-publishes these ASN's

Re: Prefix hijacking, how to prevent and fix currently

2014-09-01 Thread Tarun Dua
Would it not help if RIPE un-publishes these ASN's from their whois database ? I filed the abuse report at RIPE but haven't heard back from them. We are NOT a RIPE member but an APNIC member. Regards -Tarun On Mon, Sep 1, 2014 at 3:49 AM, Matthew Petach wrote: > On Sun, Aug 31, 2014 at 12:47 PM

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Matthew Petach
On Sun, Aug 31, 2014 at 12:47 PM, Doug Madory wrote: > Ah yes BusinessTorg (AS60937). I have also seen this one doing what you > are describing. Not to MSFT or GOOG, but another major technology company > that we peer with. In fact, it is going on right now but only visible if > you receive route

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Nick Hilliard
On 29/08/2014 23:39, Rob Seastrom wrote: > I'd assume that it would be included in your annual LRSA maintenance > fees. it will be interesting to see if we get proposals in the future to move legacy space between RIRs. Nick

RE: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Doug Madory
Ah yes BusinessTorg (AS60937). I have also seen this one doing what you are describing. Not to MSFT or GOOG, but another major technology company that we peer with. In fact, it is going on right now but only visible if you receive routes directly from them. A while ago, I sent them a note descri

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Matthew Kaufman
You're funny. What percentage of legacy holders have or will sign the LRSA do you suppose? Matthew Kaufman (Sent from my iPhone) > On Aug 29, 2014, at 3:39 PM, Rob Seastrom wrote: > > > Matthew Kaufman writes: > >> I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI >> regi

Re: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Saku Ytti
On (2014-08-31 14:04 -0400), Doug Madory wrote: Hi, > FWIW, this is from an IP squatting operation I came across in recent weeks. I > encounter these things regularly in the course of working with BGP data - > probably others do too. Usually I look up the ASN or prefix and often it has > alrea

RE: Prefix hijacking, how to prevent and fix currently

2014-08-31 Thread Doug Madory
FWIW, this is from an IP squatting operation I came across in recent weeks. I encounter these things regularly in the course of working with BGP data - probably others do too. Usually I look up the ASN or prefix and often it has already been added to someone's spam source list. When I see that,

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Jared Mauch
On Fri, Aug 29, 2014 at 06:39:07PM -0400, Robert E. Seastrom wrote: > > Matthew Kaufman writes: > > > I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI > > registrations. > > I'd assume that it would be included in your annual LRSA maintenance > fees. Make sure you ha

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Rob Seastrom
Matthew Kaufman writes: > I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI > registrations. I'd assume that it would be included in your annual LRSA maintenance fees. -r

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
apologies. that was meant to be private. sigh. randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Matthew Kaufman
I look forward to the ARIN fee schedule for legacy IPv4 holder RPKI registrations. Matthew Kaufman (Sent from my iPhone) > On Aug 28, 2014, at 8:28 PM, Mark Andrews wrote: > > >See "whois -r AS43239". > >The long term solution is to deploy RPKI and only use >transits which use R

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Paul WALL
On Friday, August 29, 2014, Randy Bush wrote: > > i am ENOTIME. when you have a simple spec i can follow, i would really > look forward to it. > Thanks for summing up in a few words how most of us outside your ivory tower feel about RPKI. Now if you'll excuse me, I'm a grown-up with real work

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread George, Wes
On 8/29/14, 9:08 AM, "Randy Bush" wrote: >considering that measured rpki registration (which has a very tragic >side) is ten time ipv6 penetration, i think we ask for rpki first. WG] I guess I should know better than to ask rhetorical questions on NANOG, lest I get an answer. The horse race to

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
>> The long term solution is to deploy RPKI and only use >> transits which use RPKI. No RPKI support => no business. >> Additionally make RPKI a peering requirement. > WG] So should we ask for that before, or after we get everyone to roll > out IPv6 everywhere by voting with our wallets? consideri

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
> Loose mode A & B came into existence 15 minutes ago, its good to > discuss what a loose mode could mean. ;-) i am ENOTIME. when you have a simple spec i can follow, i would really look forward to it. randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread George, Wes
On 8/28/14, 11:28 PM, "Mark Andrews" wrote: > The long term solution is to deploy RPKI and only use > transits which use RPKI. No RPKI support => no business. > Additionally make RPKI a peering requirement. WG] So should we ask for that before, or after we get everyone to roll

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 14:37 +0300), Saku Ytti wrote: > > clearly i am missing something. got a write-up? > > Loose mode RPKI: > - verified or unknown less-specific route is preferable to failing > more-specific Or said otherwise when choosing route from Adj-RIBs-In to Loc-RIB longest match is not do

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 18:39 +0900), Randy Bush wrote: > clearly i am missing something. got a write-up? Job got to it, but shortly: Loose mode RPKI: - verified or unknown less-specific route is preferable to failing more-specific The main goal is always to have all routes, never to blackhole, prefe

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:17:09AM -0400, Sandra Murphy wrote: > > Loose mode A would look like this: > > > >In the case that 10.0.0.0/16 origin AS123 is not in your table, the > >loose mode would kick in and one could accept more specifics for > >10.0.0.0/16, but only when originated

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Sandra Murphy
On Aug 29, 2014, at 6:08 AM, Job Snijders wrote: > On Fri, Aug 29, 2014 at 06:39:32PM +0900, Randy Bush wrote: > Loose mode would drop failing routes, iff there is covering (i.e. less > specific is ok) route already in RIB. isn't that exactly the hole punching attack? >>> No, as the

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:39:32PM +0900, Randy Bush wrote: > >>> Loose mode would drop failing routes, iff there is covering (i.e. less > >>> specific is ok) route already in RIB. > >> isn't that exactly the hole punching attack? > > No, as the the more specific route is signed and is preferred (l

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
> Loose mode would drop failing routes, iff there is covering (i.e. less > specific is ok) route already in RIB. isn't that exactly the hole punching attack? >>> No, as the the more specific route is signed and is preferred (longest >>> match routing) against the less specific hijacked

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Karsten Thomann
Am 29.08.2014 11:39, schrieb Randy Bush: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? No, as the the more specific route is signed and is preferred (longest match routing) against the le

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
>>> Loose mode would drop failing routes, iff there is covering (i.e. less >>> specific is ok) route already in RIB. >> isn't that exactly the hole punching attack? > No, as the the more specific route is signed and is preferred (longest > match routing) against the less specific hijacked route cl

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Karsten Thomann
Am 29.08.2014 11:25, schrieb Randy Bush: Loose mode would drop failing routes, iff there is covering (i.e. less specific is ok) route already in RIB. isn't that exactly the hole punching attack? randy No, as the the more specific route is signed and is preferred (longest match routing) against

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Brandon Butterworth
> From: Saku Ytti > I feel RPKI would be much more marketable if vendors would implement 'loose' > mode. > Loose mode would drop failing routes, iff there is covering (i.e. less > specific is ok) route already in RIB. +10 > And it would completely remove false-positive blackholing. This is why

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Job Snijders
On Fri, Aug 29, 2014 at 06:25:16PM +0900, Randy Bush wrote: > > Loose mode would drop failing routes, iff there is covering (i.e. less > > specific is ok) route already in RIB. > > isn't that exactly the hole punching attack? The proposed 'loose' mode protects against unauthorized hole punching

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Randy Bush
> Loose mode would drop failing routes, iff there is covering (i.e. less > specific is ok) route already in RIB. isn't that exactly the hole punching attack? randy

Re: Prefix hijacking, how to prevent and fix currently

2014-08-29 Thread Saku Ytti
On (2014-08-29 03:24 +), Fred Baker (fred) wrote: > Do you implement RPKI? Are providers that neighbor with them implementing > RPKI? I feel RPKI would be much more marketable if vendors would implement 'loose' mode. Loose mode would drop failing routes, iff there is covering (i.e. less spec

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Mark Andrews
See "whois -r AS43239". The long term solution is to deploy RPKI and only use transits which use RPKI. No RPKI support => no business. Additionally make RPKI a peering requirement. Mark In message , Tarun Dua writes: > AS Number 43239 > AS Name SPETSEN

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Suresh Ramasubramanian
In this case.. Google that ASN name. Then go upstream. On 29-Aug-2014 8:56 am, "Faisal Imtiaz" wrote: > I would say, start off with the NOC Contact > > http://bgp.he.net/AS43239#_whois > > It is most likely that someone has fat-fingered the IP space.. > > > Faisal Imtiaz > Snappy Internet & Tele

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Fred Baker (fred)
On Aug 28, 2014, at 9:55 AM, Tarun Dua wrote: > AS Number 43239 > AS Name SPETSENERGO-AS SpetsEnergo Ltd. > > Has started hijacking our IPv4 prefix, while this prefix was NOT in > production, it worries us that it was this easy for someone to hijack > it. > > http://bgp.he.net/AS43239#_prefixe

Re: Prefix hijacking, how to prevent and fix currently

2014-08-28 Thread Faisal Imtiaz
I would say, start off with the NOC Contact http://bgp.he.net/AS43239#_whois It is most likely that someone has fat-fingered the IP space.. Faisal Imtiaz Snappy Internet & Telecom - Original Message - > From: "Tarun Dua" > To: nanog@nanog.org > Sent: Thursday, August 28, 2014 12:55:25