6 Jun
2024
6 Jun
'24
11:54 a.m.
But if a bad actor manages to masquerade as somebody else’s ASN, either directly or via ‘downstream’ routes then neither of the above help. If anything there is a risk that if we blindly consider a route that matches a route object / ROA to be beyond doubt we may be less able to identify such actions. Of course, this is obvious. But we are trying to solve only one aspect of the problem: by not using anymore the unauthenticated IRRs we will have removed a whole class of
On Jun 06, "Mullally, Ronan via connect-wg" <connect-wg@ripe.net> wrote: possibile hijackings. For the others indeed other technologies will be needed. -- ciao, Marco