Randy Bush wrote:
route-views.oregon-ix.net>sh ip bg 203.10.63.0 BGP routing table entry for 0.0.0.0/, version 2 Paths: (1 available, best #1, table Default-IP-Routing-Table) Not advertised to any peer 286 134.222.85.45 from 134.222.85.45 (134.222.85.45) Origin IGP, localpref 100, valid, external, best Community: 286:286 286:3031 286:3809
Well, if you take a look at the communities here, from what they publish in the text of the AS286 AUT-NUM object in the RIPE database: 286:286 Customer routes 286:3031 Customer in Amsterdam 286:3089 No description I've no idea what 286:3089 is since its not described but it appears that all prefixes tagged with 286:3089 have 286 as the origin. Taking a look at these they appear to be customers. So it could be that these are prefixes that do not belong to KPN but are advertised by KPN themselves (or rather, with KPN as the origin) probably because the customer in question does not have an ASN (or at least a non-private ASN) So its entirely possible this could be a leak of a default from a private ASN customer that KPN carried in their backbone. Of course, since they are providing RV a full feed, not the same as they would to their peers, this should not be a problem for anybody else except KPN (and their customer). The sensible thing to have done would be to have informed KPN privately. Dave.