[sg-ops] Recent NANOG booting of BGP hijacker

Tom Paseka tom at cloudflare.com
Wed Jul 11 10:18:59 +08 2018


Thanks for sharing Nicholas. It's a reminder : malicious activity will not
be tolerated.

You should make sure security is Paramount. It's a first though, not
thought about later. Spoofing must be blocked from your networks. You must
secure your routers so they can't be hijcaked. You must filter your BGP
customers (and peers too!)

-Tom

On Tue, Jul 10, 2018 at 17:52 Nicholas ONG <nicholas at flarez.net> wrote:

> For those (especially IXP and transit operators) who haven't been
> following this in NANOG, this is an interesting case.
>
> https://dyn.com/blog/shutting-down-the-bgp-hijack-factory/
>
> Nicholas Ong
>
>
> _______________________________________________
> Sgops mailing list
> Sgops at list.sgnog.net
> http://list.sgnog.net/listinfo/sgops
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://list.sgnog.net/pipermail/sgops/attachments/20180710/df584af8/attachment.html>


More information about the Sgops mailing list