Well its nice that they are now shut down, although the process seems to been fairly slow and arduous. They were already identified as misbehaving in 2014, getting kicked out from deixp in 2017, and only now disconnected by transits. And even in the latest episode they could play this game of cat and mouse for a (short) while. And what if Guilmette wouldn't had noticed this, or bothered to rant on nanog, would that happened at all?<p>I'm not sure what to do improve the situation, but there definitely seems like a need for improvement.
I fail to understand why there is no quick and official way to terminate such bad actors. Isn’t there a task force for monitoring and enforcing some rules? There should be a SPoC for every AS, available 24/7 so that such notorious players are kicked out immediately. We live in an age where everything can be traced and monitored and we allow BGP hijacking and other similar acts. Oh well, my romantic idea for a properly moderated network.
I have worked for a medium size ISP for many years (3 upstream Tier-1 provider, presence on 2 IXP) and we sometimes suffer from BGP hijaking.
We had developed a software that every hour checks the BGP prefix assigned to every peer and update the BGP filter automatically.
It takes some time to engineering it and develop but after then, it works like a charm.
Bitcanal sounds like an appropriately terrible name as it sounds like root canal... but for bits.<p>BGP really needs some more organized security, but that's nothing new, and i'm sure not super easy to organize.
And yet still being peered - <a href="https://bgp.he.net/AS197426#_peers" rel="nofollow">https://bgp.he.net/AS197426#_peers</a>
No comments about the cookie warning/opt-out modal on the page? Perhaps it's only visible in the EU?<p>The thing explicitly takes ~2-3mins to send a HTTP POST to each of their advertising partners saying you've opted out (and warns "Some vendors cannot receive opt-out requests via https protocols so the processing of your opt-out request is incomplete")... lovely.
We have RIPE and other IANA organizations that have routing objects in their databases with information about through which ASN certain classes are announced, there are also LOAs. GTT and Cogent are huge Tier-1 providers, why they do not check which classes their clients are announcing? Am I missing something here?
<a href="http://www.bitcanal.com" rel="nofollow">http://www.bitcanal.com</a> is down.<p>Did they host it in their AS and now their AS is unreachable?