North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Revealed: The Internet's well known BGP behavior

  • From: Boyd, Benjamin R
  • Date: Thu Aug 28 11:36:18 2008

We've encountered the same diligence with LVL3, especially after
acquisitions where records haven't been updated yet.  Although a little
annoying it's quite refreshing.
 

>-----Original Message-----
>From: Eric Spaeth [mailto:[email protected]] 
>Sent: Thursday, August 28, 2008 1:41 AM
>To: Jon Lewis; [email protected]
>Subject: Re: Revealed: The Internet's well known BGP behavior
>
>Jon Lewis wrote:
>>> At 11:32 PM 27-08-08 -0500, John Lee wrote:
>>>
>>> They didn't have control of any routers other than their own.  What 
>>> they had to find is a single clueless upstream ISP that would allow 
>>> them to announce prefixes that didn't belong to them.
>>
>> Clueless or big and inattentive?  AFAIK, Level3 will accept anything 
>> from me...as long as I put it in one of the IRRs the day 
>before I plan 
>> to announce it.
>
>Working for a company that has been steadily growing through 
>acquisition, we have actually run into this problem a couple times 
>before.   I'm not sure if we hit the lottery, but our upstream 
>providers 
>(including LVL3) have definitely intervened when we've moved 
>netblocks from a company that doesn't match our name into our 
>facilities to be advertised under our ASNs.  I'm not sure how 
>diligent or widespread the validation checks are, but at least 
>on occasion they do occur.
>
>-Eric
>
>
>

***************************************************************************************

The information contained in this message, including attachments, may contain 
privileged or confidential information that is intended to be delivered only to the 
person identified above. If you are not the intended recipient, or the person 
responsible for delivering this message to the intended recipient, Windstream requests 
that you immediately notify the sender and asks that you do not read the message or its 
attachments, and that you delete them without copying or sending them to anyone else.