On 4 Dec 2019, at 09:51, Valdis Klētnieks <valdis.kletnieks@vt.edu> wrote:
On Wed, 04 Dec 2019 07:47:25 +1100, Mark Andrews said:
Why not use someone else’s IPv4 addresses? Really. What is wrong with using someone else’s IPv4 addresses if it achieves the need? As far as I can tell nothing.
Other than the fact that a /24 is being advertised out of one AS and it's part of some other AS's /14 and looks suspiciously like a hijack? And we currently don't deal well with identifying and preventing true hijacks and mess up false positives a lot of the time?
I’m curious if you actually read the example of use of another’s IPv4 address before starting talking about hijacking addresses? Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: marka@isc.org