nanog mailing list archives
Re: "Defensive" BGP hijacking?
From: Valdis.Kletnieks () vt edu
Date: Mon, 12 Sep 2016 14:15:26 -0400
On Mon, 12 Sep 2016 14:07:47 -0400, Jean-Francois Mezei said:
So there are some cases where BGP hijacking may be desirable. I guess this is where judgement kicks in.
I don't see "hijacking" in your description of the iStop case - it appears to have been fully coordinated and with permission.
Attachment:
_bin
Description:
Current thread:
- Re: "Defensive" BGP hijacking?, (continued)
- Re: "Defensive" BGP hijacking? Ryan, Spencer (Sep 12)
- Re: "Defensive" BGP hijacking? Mel Beckman (Sep 12)
- Re: "Defensive" BGP hijacking? Florian Weimer (Sep 12)
- Re: "Defensive" BGP hijacking? Jared Mauch (Sep 12)
- Re: "Defensive" BGP hijacking? Ryan, Spencer (Sep 12)
- Re: "Defensive" BGP hijacking? Paras Jha (Sep 12)
- Re: "Defensive" BGP hijacking? Mel Beckman (Sep 12)
- Re: "Defensive" BGP hijacking? Hugo Slabbert (Sep 12)
- Re: "Defensive" BGP hijacking? Jean-Francois Mezei (Sep 12)
- Re: "Defensive" BGP hijacking? Valdis . Kletnieks (Sep 12)
- Re: "Defensive" BGP hijacking? Jean-Francois Mezei (Sep 12)
- Re: "Defensive" BGP hijacking? Blake Hudson (Sep 12)
- Re: "Defensive" BGP hijacking? John Curran (Sep 12)
- Re: "Defensive" BGP hijacking? Mel Beckman (Sep 12)
- Re: "Defensive" BGP hijacking? Hugo Slabbert (Sep 12)
- Re: "Defensive" BGP hijacking? Blake Hudson (Sep 12)