TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Shutting Down the BGP Hijack Factory

218 pointsby pedro84almost 7 years ago

10 comments

zokieralmost 7 years ago
Well its nice that they are now shut down, although the process seems to been fairly slow and arduous. They were already identified as misbehaving in 2014, getting kicked out from deixp in 2017, and only now disconnected by transits. And even in the latest episode they could play this game of cat and mouse for a (short) while. And what if Guilmette wouldn&#x27;t had noticed this, or bothered to rant on nanog, would that happened at all?<p>I&#x27;m not sure what to do improve the situation, but there definitely seems like a need for improvement.
评论 #17502614 未加载
NKosmatosalmost 7 years ago
I fail to understand why there is no quick and official way to terminate such bad actors. Isn’t there a task force for monitoring and enforcing some rules? There should be a SPoC for every AS, available 24&#x2F;7 so that such notorious players are kicked out immediately. We live in an age where everything can be traced and monitored and we allow BGP hijacking and other similar acts. Oh well, my romantic idea for a properly moderated network.
评论 #17502941 未加载
评论 #17502932 未加载
lormaynaalmost 7 years ago
I have worked for a medium size ISP for many years (3 upstream Tier-1 provider, presence on 2 IXP) and we sometimes suffer from BGP hijaking. We had developed a software that every hour checks the BGP prefix assigned to every peer and update the BGP filter automatically. It takes some time to engineering it and develop but after then, it works like a charm.
评论 #17502246 未加载
phyzomealmost 7 years ago
So... what were they doing with the hijacks? Using it to evade IP reputation bans for spamming?
评论 #17502327 未加载
评论 #17505104 未加载
评论 #17505152 未加载
driverdanalmost 7 years ago
If they have been bad actors for years why didn&#x27;t they lose access earlier?
评论 #17503389 未加载
评论 #17502655 未加载
duxupalmost 7 years ago
Bitcanal sounds like an appropriately terrible name as it sounds like root canal... but for bits.<p>BGP really needs some more organized security, but that&#x27;s nothing new, and i&#x27;m sure not super easy to organize.
评论 #17505724 未加载
peteealmost 7 years ago
And yet still being peered - <a href="https:&#x2F;&#x2F;bgp.he.net&#x2F;AS197426#_peers" rel="nofollow">https:&#x2F;&#x2F;bgp.he.net&#x2F;AS197426#_peers</a>
评论 #17505787 未加载
nrkialmost 7 years ago
No comments about the cookie warning&#x2F;opt-out modal on the page? Perhaps it&#x27;s only visible in the EU?<p>The thing explicitly takes ~2-3mins to send a HTTP POST to each of their advertising partners saying you&#x27;ve opted out (and warns &quot;Some vendors cannot receive opt-out requests via https protocols so the processing of your opt-out request is incomplete&quot;)... lovely.
评论 #17506417 未加载
lossoloalmost 7 years ago
We have RIPE and other IANA organizations that have routing objects in their databases with information about through which ASN certain classes are announced, there are also LOAs. GTT and Cogent are huge Tier-1 providers, why they do not check which classes their clients are announcing? Am I missing something here?
评论 #17501660 未加载
评论 #17501615 未加载
评论 #17512805 未加载
EthanHeilmanalmost 7 years ago
<a href="http:&#x2F;&#x2F;www.bitcanal.com" rel="nofollow">http:&#x2F;&#x2F;www.bitcanal.com</a> is down.<p>Did they host it in their AS and now their AS is unreachable?
评论 #17501497 未加载
评论 #17503397 未加载