@thousandeyes
Cisco ThousandEyes
5 years
Starting at ~7am ET, a major internet disruption occurred in what appears to be a significant BGP route leak event affecting a variety of prefixes from multiple providers, including Cloudflare & AWS. Sites served through the Cloudflare CDN were impacted for ~2 hours.
2
27
23

Replies

@thousandeyes
Cisco ThousandEyes
5 years
ThousandEyes data saw multiple instances where the network of Allegheny Technologies (AS396531) was inserted as a new next hop for altered BGP paths going to prefixes owned by AWS and Cloudflare.
Tweet media one
1
5
10
@thousandeyes
Cisco ThousandEyes
5 years
ThousandEyes saw multiple, more specific /21 prefixes advertised that impacted legitimate /20 prefixes from @Cloudflare . For example, here is a view of a BGP path for 104.20.88.0/21, a more specific prefix introduced into the Internet’s routing table during the route leak event.
Tweet media one
1
1
3
@thousandeyes
Cisco ThousandEyes
5 years
A more specific prefix is preferred by Internet routing over a less specific prefix, even if the latter is more legitimate. In this case, 104.20.88.0/21 was preferred over the legitimate but less specific prefix 104.20.80.0/20 advertised by Cloudflare.
1
0
1
@thousandeyes
Cisco ThousandEyes
5 years
The result was that traffic going to any services located in this block of Internet addresses followed the altered path that included the Allegheny Technologies network.
1
1
0
@thousandeyes
Cisco ThousandEyes
5 years
It appears likely that DQE is the original source of the route leak that was propagated through its downstream customer Allegheny to Verizon, which accepted the leaked routes and propagated them further.
1
0
1
@thousandeyes
Cisco ThousandEyes
5 years
Allegheny Technologies, a metals manufacturing enterprise, is the first ASN that we see the route leak advertised from. They are customers of both DQE (a regional transit provider) and Verizon.
1
0
1
@thousandeyes
Cisco ThousandEyes
5 years
The scope of routes involved is consistent with a route leak from a transit provider. The presence of more specific routes to Cloudflare as part of the route leak doesn’t appear to be malicious, and may have been due to route optimization employed by DQE.
2
0
2
@thousandeyes
Cisco ThousandEyes
5 years
[Update] Analysis of today’s incident is now live on the blog:
1
3
3
@thousandeyes
Cisco ThousandEyes
5 years
Register now for a live breakdown of today's incident, as seen in the ThousandEyes platform, happening this Friday, June 28, at 9am PT. [Webinar] Outage Analysis: BGP Routing Errors Ripple Across the Internet
0
2
2
@sellbot
Adam Sellers
5 years
@thousandeyes @ibigfoot7 - BGP exploit 😬
0
0
0