Get the latest tech news

DDoS Mitigation Leak


In this edition of Beyond Their Intended Scope, we take a look at last week’s BGP leak by a DDoS mitigation company which impacted networks around the world. We look at the impacts in both BGP and traffic data, and discuss how RFC 9234’s “Only to Customer” BGP Path Attribute could have helped.

If accepted into a router configuration, this AS-SET would generate an allowlist millions of lines long, covering the vast majority of IP space in the global routing table. Reading the highlighted AS path from left to right, we can see that this route is normally originated by TPG Telecom of Australia (AS7545) and prepended three times to Tata (AS6453) before arriving at Lumen (AS3356) over a peering connection 3356:666 in San Jose, California 3356:2011 according to the community strings. While the lower portion of the visualization shows a pruned ball-n-stick AS-level diagram, the upper graph depicts the ASes observed upstream of AS10310 for this route by count of BGP vantage points.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of leak

leak

Photo of DDoS Mitigation Leak

DDoS Mitigation Leak

Related news:

News photo

“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.

News photo

iOS 19 Leak Reveals Alleged New Design With Rounder App Icons, Floating Tab Bar, and More

News photo

Unreleased Retro Studios Nintendo Switch game, Ridge Racer prototype and more leak online