Hi Marty,
Noted. We are still checking this issue.
Regards,
LEE BON SHENG | leebonsheng@tm.com.my | ipmc_ipcore@tm.com.my NOC2 IPCORE, ISP Network Management, Telekom Malaysia, AS4788 TOLLFREE: 1-800-88-2646 (Opt 4) / International: +603-22466646 (Opt 4)
We're committed to perform. We strive to excel. We deliver THE BEST!
Regards, Marty Strong -------------------------------------- CloudFlare - AS13335 Network Engineer marty@cloudflare.com +44 20 3514 6970 UK (Office) +44 7584 906 055 UK (Mobile) +1 888 993 5273 US (Office) smartflare (Skype) http://www.peeringdb.com/view.php?asn=13335
On 12 Jun 2015, at 10:41, Stephane Bortzmeyer <bortzmeyer@nic.fr> wrote:
On Fri, Jun 12, 2015 at 11:09:34AM +0200, Tore Anderson <tore@fud.no> wrote a message of 10 lines which said:
I see tons of bogus routes show up with AS4788 in the path, and at least AS3549 is acceping them.
E.g. for the RIPE NCC (193.0.0.0/21):
[BGP/170] 00:20:29, MED 1000, localpref 150 AS path: 3549 4788 12859 3333 I, validation-state: valid
Unlike most BGP leaks, they kept the proper origin, so validation by ROA was useless :-(