[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
AS4788 Telecom Malaysia major route leak?
> Hi Marty,
>
> Noted. We are still checking this issue.
>
>
>
>
>
> Regards,
>
> LEE BON SHENG | leebonsheng at tm.com.my | ipmc_ipcore at tm.com.my
> NOC2 IPCORE, ISP Network Management, Telekom Malaysia, AS4788
> TOLLFREE: 1-800-88-2646 (Opt 4) / International: +603-22466646 (Opt 4)
>
>
>
> We're committed to perform.
> We strive to excel.
> We deliver THE BEST!
Regards,
Marty Strong
--------------------------------------
CloudFlare - AS13335
Network Engineer
marty at cloudflare.com
+44 20 3514 6970 UK (Office)
+44 7584 906 055 UK (Mobile)
+1 888 993 5273 US (Office)
smartflare (Skype)
http://www.peeringdb.com/view.php?asn=13335
> On 12 Jun 2015, at 10:41, Stephane Bortzmeyer <bortzmeyer at nic.fr> wrote:
>
> On Fri, Jun 12, 2015 at 11:09:34AM +0200,
> Tore Anderson <tore at fud.no> wrote
> a message of 10 lines which said:
>
>> I see tons of bogus routes show up with AS4788 in the path, and at
>> least AS3549 is acceping them.
>>
>> E.g. for the RIPE NCC (193.0.0.0/21):
>>
>> [BGP/170] 00:20:29, MED 1000, localpref 150
>> AS path: 3549 4788 12859 3333 I, validation-state: valid
>
> Unlike most BGP leaks, they kept the proper origin, so validation by ROA was
> useless :-(