|
You are here |
www.dwheeler.com | ||
| | | | |
www.bgp.org
|
|
| | | | | [AI summary] This blog post discusses the vulnerabilities of the Border Gateway Protocol (BGP), focusing on prefix hijack attacks and route leaks, and their potential to disrupt internet traffic and services. | |
| | | | |
networkphil.com
|
|
| | | | | BGP is the de facto routing protocol for inter-domain routing, or in other words, the global internet. It's used to exchange routing information among autonomous systems around the entire world. Therefore, it's extremely important we do what we can to secure BGP communications, what we advertise, and the methods we use to create peering relationships.... | |
| | | | |
blog.caida.org
|
|
| | | | | [AI summary] Researchers propose a workflow to identify suspicious IRR records that could be exploited for BGP hijack attacks, highlighting inconsistencies and vulnerabilities in the IRR system despite its widespread use for routing security. | |
| | | | |
berthub.eu
|
|
| | | Note: For context, please see this article on the Economist Job. I also want to thank Job Snijders who was of great help in writing this article. How the Internet Leaks A few weeks ago large swathes of the internet stopped working around the world. The cause was quickly found: a computer networking mistake over at a specialty metals company based in Pittsburgh, Pennsylvania. Earlier that month, a similar accident took down payment terminals in The Netherlands because of a misconfiguration in a Swiss datacenter which rerouted key parts of the internet to China. | ||