Remove category rpki
article thumbnail

A Brief History of the Internet’s Biggest BGP Incidents

Kentik

In this blog post, I will address selected specific incidents which have demonstrated the range and gravity of threats to the stability and security of the internet’s routing system. Two competing methodologies, RPSL and RPKI, are used to inform the defensive configuration of routers. routed) at the time of the leak or hijack.