It is really important that ever organization grasp the risk from BGP Hijacking. The CIO, CISO, Security Professional, Network Engineers, and all others in the organization must understand that the BGP Hijacking Threat to their organization is Real. Miscreants have BGP hijacked critical resources away from the owning organization and caused damage. These BGP Hijacks have happened and will happen again. It will be a while before we have a massive deployment of BGPSEC and RPKI throughout all telecom and the world. So taking action now to minimize the risk is critical.
Where do we start our “BGP Hijack Knowledge Empowerment?” Fortunately, we have peers on the Internet who explain it for us.
First, look back at the BGP, RTBH, and other training videos from the early 2000s @ NANOG, APRICOT, and RIPE. The concept of moving traffic around the Internet is core to the Internet.
Second, watch NANOG 44 – Stealing the Internet by Anton Kapela, 5Nines Data Alex Pilosov, Pilsoft
This is a talk linking back to Anton’s reaction to the DEFCON 16 talk: Stealing The Internet – A Routed, Wide-area, Man in the Middle Attack
Video & Slides: Stealing The Internet – A Routed, Wide-area, Man in the Middle
Third, listen to NANOG 45 – Hijacking and Tools by Joel Jaeggli and Andree Toonk
Forth, listen to the NANOG 46 – Hijacking Mitigation: Something is Better Than Nothing:
Finally, please watch the NANOG 63 2015 talk from Andree Toonk – Recent BGP routing incidents – malicious or not
Back to the main guide BGP Route Hijacks & Routing Mistakes – What can be done Today?
These BGP security materials are provided to help people around the Internet understand how do their part to deploy a more resilient BGP infrastructure. Seek out more information on www.senki.org.