Click any tag below to further narrow down your results
Links
This article explains BGP zombies, which are routing entries that linger in the Internet's routing tables despite being withdrawn. It describes how path hunting can lead to these zombies forming and discusses the operational challenges they create for network operators. The piece also illustrates scenarios where BGP zombies can occur, both between networks and within a single network.
The article examines a BGP route leak involving Venezuela's state ISP, CANTV (AS8048), which redistributed routes improperly on January 2. This incident highlights potential issues with CANTV's routing policies rather than malicious intent, as similar leaks have occurred frequently in recent months.
This article explains how the author's custom traceroute program, ktr, works to display the path packets take across the Internet. It details the use of ICMP and TTL in routing, and the importance of autonomous systems in shaping Internet traffic. The author also touches on BGP and the history of networking protocols.
Cilium's BGP Auto-Discovery feature simplifies the management of BGP configurations in large Kubernetes environments by automatically discovering peer IP addresses, reducing operational complexity. This enhancement allows for more efficient and reliable network automation, particularly in scenarios with numerous nodes across multiple racks. The article provides guidance on configuring and implementing this feature using Minikube for testing purposes.
The Open-MPIC project is focused on defending against BGP attacks that target certificate validation, a critical aspect of internet security. By enhancing the verification processes, the initiative aims to mitigate vulnerabilities that could be exploited by malicious actors, thereby strengthening the overall integrity of network communications.
A BGP message propagated on May 20th, 2025, caused session resets in JunOS and Arista EOS, leading to significant internet routing instability and brief connectivity loss for numerous networks. The incident stems from a corrupt BGP Prefix-SID Attribute that unexpectedly leaked into the global routing table, impacting various autonomous systems and illustrating the vulnerabilities within BGP error handling. The widespread disruption highlights the potential real-world consequences of such network bugs as reliance on IP-based services increases.