{"id":313,"date":"2010-04-09T09:38:51","date_gmt":"2010-04-09T09:38:51","guid":{"rendered":""},"modified":"2010-04-09T09:38:51","modified_gmt":"2010-04-09T09:38:51","slug":"313","status":"publish","type":"post","link":"https:\/\/3v.org.cn\/?p=313","title":{"rendered":"2010\u5e744\u67089\u65e5\u51cc\u6668\u5168\u56fd\u65ad\u7f51\u4e8b\u4ef6\u53ca\u6211\u7684LA\u673a\u623f\u670d\u52a1\u5668\uff0c\u53c8\u88ab\u4e2d\u56fd\u7535\u4fe1XX\u4e86\u4e24\u5c0f\u65f6\u6839\u6e90\u3002"},"content":{"rendered":"<p>This morning BGPmon.net users have received and alert regarding a possible prefix hijack.<br \/>It seems that AS23724 CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation has originated about ~37,000 unique prefixes that are not assigned to them. This is what we typically call a prefix hijack.<br \/>This incident follows another concerning incident from China 2 weeks ago. <\/p>\n<p>Although it seems they have leaked a whole table, only about 10% of these prefixes propagated outside of the Chinese network. These include prefixes for popular websites such as dell.com, cnn.com, www.amazon.de, www.rapidshare.com and www.geocities.jp.<br \/>A large number of networks impacted this morning were actually Chinese networks. These include some popular Chinese website such as<br \/>www.joy.cn , www.pconline.com.cn , www.huanqiu.com, www.tianya.cn and www.chinaz.com<br \/>A list of all prefixes that were announced\/hijacked can be found here<\/p>\n<p>The event has been detected globally by peers in The Netherland, UK, Rusia, Italy, Sweded USA, Japan and Brazil. However not all individual prefix \u2018hijacks\u2019 were detected globally, many only by a few peers, in one or 2 countries, but some by more.<\/p>\n<p>Some details<br \/>All announcement had part of the AS path in common. The common part in the ASpath is (note the prepend).<br \/>4134 23724 23724<\/p>\n<p>Which are:<br \/>AS4134 CHINANET-BACKBONE No.31,Jin-rong Street<br \/>AS23724 CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation<\/p>\n<p>ASns peering with AS4134 seem to have picked this up and propagated that to their customers.<br \/>Some of these ASns include:<br \/>AS9002 RETN-AS ReTN.net Autonomous System<br \/>AS12956 TELEFONICA Telefonica Backbone Autonomous System<br \/>AS209 ASN-QWEST \u2013 Qwest Communications Company, LLC<br \/>AS3320 DTAG Deutsche Telekom AG<br \/>AS3356 LEVEL3 Level 3 Communications<br \/>AS7018 ATT-INTERNET4 \u2013 AT&#038;T WorldNet Services<\/p>\n<p>All RIS peers that detected this where behind (transit\/peer) one of those ANS\u2019s.<\/p>\n<p>AS2914 NTT-COMMUNICATIONS-2914 \u2013 NTT America, Inc. customers <br \/>Looking at more routing information it seems that AS2914 saw more then just the 10% mentioned above. So the impact for NTT America customers might have been bigger.<\/p>\n<p>Impact<br \/>28% of the RIS collectors used by BGPmon.net have detected these events. This means that quite a number of networks were impacted by this. The first announcement was detected at 2010-04-08 17:54:31 (UTC), the last hijack announcement was at 2010-04-08 18:10:14.<br \/>Most \u2018alerts\u2019 have now been cleared, they typically lasted a few minutes. <\/p>\n<p>Probably more then the 51 peers mention above would have detected the prefix, but not have chosen this as the best path. Most likely due to the ASpath length or other policies. <\/p>\n<p>Possible Cause<br \/>I have not spoken with engineers from AS23724, so I can only speculate. Given the large number of prefixes and short interval I don\u2019t believe this is an intentional hijack, infact, these are very rare.<br \/>Most likely it\u2019s because of configuration issue, i.e. fat fingers. But again, this is just speculation.<\/p>\n<p>Prefix distribution<br \/>Most prefixes impacted by this were prefixes from the US and China. Below you\u2019ll find the top countries impacted:<\/p>\n<p>Country =&gt; number of prefixes hijacked by AS23724<br \/>US =&gt; 10547<br \/>CN =&gt; 10298<br \/>KR =&gt; 2857<br \/>AU =&gt; 1650<br \/>MX =&gt; 885<br \/>IN =&gt; 719<br \/>JP =&gt; 604<br \/>BR =&gt; 592<br \/>FR =&gt; 508<br \/>RU =&gt; 471<br \/>CA =&gt; 425<br \/>TH =&gt; 372<br \/>ID =&gt; 369<br \/>IT =&gt; 338<br \/>CO =&gt; 328<br \/>GB =&gt; 322<br \/>CL =&gt; 302<br \/>SE =&gt; 281<br \/>HK =&gt; 276<br \/>EC =&gt; 272<br \/>DE =&gt; 227<\/p>\n<p>Example alert message <\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/attachments\/month_1004\/o20104993837.png\" \/><\/p>\n<p>====================================================================<br \/>Possible Prefix Hijack (Code: 10)<br \/>====================================================================<br \/>Your prefix: 203.190.56.0\/21:<br \/>Prefix Description: www.infoseek.co.jp<br \/>Update time: 2010-04-08 16:09 (UTC)<br \/>Detected by #peers: 4<br \/>Detected prefix: 203.190.56.0\/21<br \/>Announced by: AS23724 (CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation)<br \/>Upstream AS: AS4134 (CHINANET-BACKBONE No.31,Jin-rong Street)<br \/>ASpath: 8331 9002 9002 4134 23724 23724<br \/>Alert details: <a href=\"http:\/\/bgpmon.net\/alerts.php?details\" target=\"_blank\" rel=\"external\">http:\/\/bgpmon.net\/alerts.php?details<\/a>&#038;alert_id=6617721<br \/>Mark as false alert: <a href=\"http:\/\/bgpmon.net\/fp.php?aid=6617721\" target=\"_blank\" rel=\"external\">http:\/\/bgpmon.net\/fp.php?aid=6617721<\/a><\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This morning BGPmon.net users have received and alert r<\/p>\n<div class=\"more-link\">\n\t\t\t\t <a href=\"https:\/\/3v.org.cn\/?p=313\" class=\"link-btn theme-btn\"><span>Read More <\/span> <i class=\"fa fa-caret-right\"><\/i><\/a>\n\t\t\t<\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-313","post","type-post","status-publish","format-standard","hentry","category-5"],"_links":{"self":[{"href":"https:\/\/3v.org.cn\/index.php?rest_route=\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3v.org.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3v.org.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3v.org.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/3v.org.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=313"}],"version-history":[{"count":0,"href":"https:\/\/3v.org.cn\/index.php?rest_route=\/wp\/v2\/posts\/313\/revisions"}],"wp:attachment":[{"href":"https:\/\/3v.org.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3v.org.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3v.org.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}