<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-chen-grow-stealthy-hijacking-00" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Stealthy BGP Hijacking Risk">Risk of Stealthy BGP Hijacking under Incomplete Adoption of Route Origin Validation (ROV)</title>

    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>yh-chen21@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>

    <date year="2025" month="May" day="09"/>

    <area>Operations and Management</area>
    <workgroup>GROW Working Group</workgroup>
    <keyword>Resource Public Key Infrastructure</keyword> <keyword>Route Origin Validation</keyword> <keyword>BGP Hijacking</keyword>

    <abstract>


<?line 150?>

<t>This document describes how incomplete adoption of Route Origin Validation (ROV) makes certain forms of BGP hijacking less visible on the control plane while still capable of diverting traffic. We explain the underlying mechanism, define the form of the threat, analyze an real-world incident that exemplifies the issue, and discuss potential countermeasures to mitigate its impact.</t>



    </abstract>



  </front>

  <middle>


<?line 154?>

<section anchor="introduction"><name>Introduction</name>

<t>BGP hijacking occurs when an Autonomous System (AS), accidentally or maliciously, mis-announces an address prefix it is not authorized to originate. ASes that accept such announcement may divert traffic destined for the prefix to an incorrect AS instead of the actual prefix holder. To mitigate this risk, Route Origin Validation (ROV) <xref target="RFC6811"/> was introduced as part of the Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>. ROV-enabled ASes validate route announcements using Route Origin Authorizations (ROAs) <xref target="RFC9582"/>, which specify which ASes are permitted to originate specfic prefixes. The best current practice <xref target="RFC7115"/> suggests configuring routing policies to drop or give a very low preference to routes deemed invalid by ROV.</t>

<t>However, ROV adoption across the Internet is incomplete and expected to remain so for the foreseeable future. In such a state, invalid announcements may still propagate through non-ROV ASes to a certain extent, before being dropped by ROV-enabled ASes. This limited propagation creates a situation where some ASes never receive the invalid routes and are therefore unware of the ongoing incident (e.g., potential BGP hijacking). Yet they are not fully protected either, as the traffic they originate, along the data forwarding path,  may traverse a non-ROV AS that has accepted the invalid route. This non-ROV AS will forward traffic towards the incorrect origin AS. As a result, the traffic originating ASes unknowingly fall victim to BGP hijacking, unless they conduct active measurements (e.g., traceroute) or receive alerts from other network operators who spot the incident. In effect, BGP hijacking becomes stealthier in this case, due to incomplete adoption of ROV across global ASes.</t>

<t>The objective of this document is to highlight the side effect of incomplete ROV adoption on BGP hijacking, which results in highly stealthy BGP hijacking that is invisible to victims on the control plane. This document defines this form of BGP hijacking, explains its underlying mechanisms, analyzes a real-world incident, and discusses possible detection and mitigation approaches.</t>

<t>The rest of this document is structured as follows: Section 2 details the side effect of ROV in incomplete adoption. Section 3 defines the resulting stealthy BGP hijacking. Section 4 analyzes a representative real-world incident. Section 5 discusses potential detection and mitigation strategies. Finally, Section 6 concludes the document.</t>

</section>
<section anchor="problem"><name>Side Effect of Incomplete ROV Adoption</name>

<t>This section explains how BGP hijacking can still succeed and even become stealthier under incomplete ROV adoption. <xref target="control-plane"/> illustrates the control-plane behavior when a malicious AS initiates a BGP hijacking attempt. In this scenario, AS G (the hijacker) announces a (sub-)prefix legitimately owned by AS E (the target). ROV-enabled ASes B and D filter out the invalid announcement, so only AS C and F may accept the hijacker&#39;s route into their routing tables, depending on their routing policies.</t>

<figure title="BGP hijacking under incomplete ROV adoption" anchor="control-plane"><artwork><![CDATA[
          <==           <==           <==           <==           
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                        <~~       |     ~~>                       
                                  |                               
                                  |                               
                                  |                               
                                  |     <~~         <~~           
    ==>  E's announcement         |         +------+      +------+
    ~~>  G's announcement         +---------| AS F |------| AS G |
                                            +------+      +-Hijker
                                         ==>           ==>        
]]></artwork></figure>

<t>Consider AS A as an example. AS A only receives a route to the legitimate origin (AS E), since its upstream provider AS B rejects the invalid route. As a result, from AS A&#39;s control-plane perspective, the only available route is valid, and one can expect traffic destined for the target to be correctly delivered. However, as shown in <xref target="data-plane"/>, from a global perspective, AS A&#39;s traffic is forwarded through AS C, which accpets the hijacker&#39;s route. In this case, the traffic is silently redirected to the hijacker.</t>

<figure title="Discrepancy between control plane and data plane" anchor="data-plane"><artwork><![CDATA[
   (Route in A's table)                                           
   ---------------------------------------------------------->    
                                                                  
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                                  |                               
   --------------------------+    |                               
   (Actual forwarding path)  |    |                               
                             |    |                               
                             |    |                               
                             |    |         +------+      +------+
                             |    +---------| AS F |------| AS G |
                             |              +------+      +-Hijker
                             |                                    
                             +-------------------------------->   
]]></artwork></figure>

<t>Because AS A lacks a route to the hijacker, it remains unaware of the attack unless it conducts active measurements (e.g., traceroute) or receives external notifications. Its local control-plane protections are ineffective in detecting or responding to the hijack in this case. This highlights an unexpected side effect of incomplete ROV adoption: it prevents certain ASes from observing invalid routes, making ongoing hijacking more difficult to detect. We refer to such BGP hijacking, which compromises traffic forwarding while remaining invisible to affected ASes on the control plane, as stealthy BGP hijacking. An AS is susceptible to stealthy BGP hijacking if:</t>

<t><list style="symbols">
  <t>It has no route to the hijacker due to ROV filtering, and</t>
  <t>At least one non-ROV AS along the legitimate path accepts the hijacker&#39;s route.</t>
</list></t>

<t>This vulnerability applies to both BGP hijacking that targets a prefix and a sub-prefix.</t>

</section>
<section anchor="definition"><name>Definition of Stealthy BGP Hijacking</name>

<t>From a control-plane-only standpoint, this section defines stealthy BGP hijacking under incomplete ROV adoption.</t>

<section anchor="notation"><name>Notation and Terminology</name>

<t>In this document, we use the following notation to describe BGP routes:</t>

<t><spanx style="verb">
p: V ... (M) ... O
</spanx></t>

<t>This notation represents a BGP route to prefix <spanx style="verb">p</spanx> as observed from a vantage point <spanx style="verb">V</spanx>. The sequence of ASes from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx> may include one or more intermediate ASes <spanx style="verb">M</spanx>.</t>

<t>The symbols used are defined as:</t>

<dl>
  <dt><spanx style="verb">p</spanx>:</dt>
  <dd>
    <t>The IP prefix being routed.</t>
  </dd>
  <dt><spanx style="verb">V</spanx>:</dt>
  <dd>
    <t>The vantage point, i.e., the AS from which the route is observed (typically via a BGP route collector).</t>
  </dd>
  <dt><spanx style="verb">M</spanx>:</dt>
  <dd>
    <t>An intermediate AS, representing any AS that appears on the path from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx>. There may be multiple such ASes, or may be none.</t>
  </dd>
  <dt><spanx style="verb">O</spanx>:</dt>
  <dd>
    <t>The origin AS, which originates the route and claims to originate the prefix <spanx style="verb">p</spanx>.</t>
  </dd>
</dl>

<t>We also define the following terminology for clarity in later discussions:</t>

<dl>
  <dt>Conflict:</dt>
  <dd>
    <t>Two routes are said to be in conflict if they refer to the same prefix or to overlapping prefixes (e.g., one is a more specific sub-prefix of the other), but their origin ASes differ. This indicates a potential inconsistency in prefix ownership or announcement.</t>
  </dd>
  <dt>RPKI-invalid:</dt>
  <dd>
    <t>A route is considered RPKI-invalid if its prefix matches an ROA, but the origin AS does not match the AS specified, or the prefix exceeds the max length specified allowable for origination. This typically signals an unauthorized or misconfigured route announcement, which may lead to BGP hijacking.</t>
  </dd>
  <dt>RPKI-valid:</dt>
  <dd>
    <t>A route is considered RPKI-valid if its origin AS matches an ROA for the prefix under RPKI, and the route is not RPKI-invalid.</t>
  </dd>
  <dt>Risk-critical:</dt>
  <dd>
    <t>An AS is said to be risk-critical if it chooses to forward traffic towards an invalid route to the hijacker, while it also has route to the legitimate origin in its routing table.</t>
  </dd>
</dl>

</section>
<section anchor="stealthy-bgp-hijacking"><name>Stealthy BGP Hijacking Definition</name>

<t>Given a pair of observed routes:</t>

<t><spanx style="verb">
p1: V1 ... (M1) ... O1
p2: V2 ... (M2) ... O2
</spanx></t>

<t>A stealthy BGP hijacking is said to occur when the following conditions hold:</t>

<t><list style="numbers" type="1">
  <t>The two routes conflict, i.e., <spanx style="verb">p2</spanx> is equal to or a more specific sub-prefix of <spanx style="verb">p1</spanx>, and <spanx style="verb">O2</spanx> does not equal to <spanx style="verb">O1</spanx>.</t>
  <t>Their authorization states disagree, i.e., the prefix-origin <spanx style="verb">p2-O2</spanx> is RPKI-invalid, while <spanx style="verb">p1-O1</spanx> is RPKI-valid.</t>
  <t>The invalid route is invisible to the victim, i.e., vantage point <spanx style="verb">V1</spanx> has no observable route to prefix <spanx style="verb">p2</spanx> that is originated by <spanx style="verb">O2</spanx>.</t>
  <t>A risk-critical AS redirects traffic to the hijacker, i.e., there exists <spanx style="verb">M1</spanx> such that <spanx style="verb">M1</spanx> equals <spanx style="verb">V2</spanx>.</t>
</list></t>

<t>Under these conditions, <spanx style="verb">O2</spanx> is a potential hijacker that announces the prefix <spanx style="verb">p2</spanx>, which is owned by <spanx style="verb">O1</spanx>. The invalid route does not propagate to vantage point <spanx style="verb">V1</spanx>. As a result, <spanx style="verb">V1</spanx> observes only the legitimate route to <spanx style="verb">p1</spanx> and remains unaware of the conflicting route to <spanx style="verb">p2</spanx> originated by <spanx style="verb">O1</spanx>. However, due to the presence of a risk-critical AS <spanx style="verb">M1</spanx>, which appears in the legitimate path and also has a route to <spanx style="verb">p2</spanx>, traffic destined for <spanx style="verb">p2</spanx> is silently diverted to the hijacker.</t>

</section>
</section>
<section anchor="example"><name>Real-World Incident Example</name>

<t>This section presents an real-world incident consistent with the definition of stealthy BGP hijacking in <xref target="stealthy-bgp-hijacking"/>. The incident was last observed on April 24, 2025. As illustrated in <xref target="incident"/>, both AS37100 (SEACOM) and AS6762 (TISparkle) observe the prefix 203.127.0.0/16 announced by its legitimate origin, AS3758 (SingNet). Meanwhile, the sub-prefix 203.127.225.0/24 is announced by an unauthorized origin, AS17894 (Innove Communications). The two origins are located in different countries and have no link between them ever observed during the most recent month. According to the APNIC&#39;s ROV filtering measurement <xref target="APNIC"/>, AS37100 adopts ROV with a 100% filtering rate. Therefore, it discards the RPKI-invalid /24 route. However, traffic from AS37100 (or its downstream customers) to the /24 prefix is still hijacked when it transits through non-ROV AS6762, which accepts the /24 route.</t>

<figure title="A real-world stealthy BGP hijacking incident" anchor="incident"><artwork><![CDATA[
  Route to 203.127.0.0/16                                           
@------------------@------------------------------------------>     
                                                                    
+---------+        +---------+        +---------+        +---------+
| AS37100 |--------| AS6762  |--------| AS7473  |--------| AS3758  |
| SEACOM  |        |TISparkle|        | SingTel |        | SingNet |
+---------+        +---------+        +---------+        +---------+
ROV-enabled        @    |                                           
                   |    |                                           
                   |    | +----------+   +---------+   +-----------+
                   |    +-| AS15412  |---| AS4775  |---|  AS17894  |
@: vantage point   |      | FLAG Tel |   |Globe Tel|   |Innove Comm|
                   |      +----------+   +---------+   +-----------+
                   |                                                
                   +------------------------------------------>     
                    Route to 203.127.225.0/24                       
]]></artwork></figure>

<t>An examination using AS37100&#39;s looking glass &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> corroborates the hijack. The command &quot;show ip bgp 203.127.0.0/16&quot; shows a valid route via the path 37100 6762 6461 7473 3758. Meanwhile, &quot;show ip bgp 203.127.225.0/24&quot; returns no matching routes, confirming that AS37100 does not have visibility of the route from the unauthorized origin AS17894. However, a traceroute from AS37100 to an address within 203.127.225.0/24 shows that the final hops traverse AS17894, indicating that traffic is indeed diverted to the illegitimate origin, demonstrating a successful hijack at the data plane, even though control-plane filtering is in place.</t>

<t>We emphasize that the incident, while in the form of stealthy BGP hijacking, is likely caused by benign misconfigurations, given that AS17894 and AS3758 have business connections through their parent companies <xref target="SingTel"/> <xref target="GlobeTel"/>, We reported the incident to AS4775 (Globe Telecoms) on February 10, 2025, and received confirmationa that it would investigate. The original looking glass output is provided in <xref target="looking-glass-output"/>.</t>

</section>
<section anchor="measure"><name>Detection and Mitigation</name>

<t>The definition of stealthy BGP hijacking naturally enables a practical detection method based on inconsistencies across routing tables. By comparing routing data from multiple vantage points, one can identify route pairs that satisfy the conditions outlined in <xref target="stealthy-bgp-hijacking"/>. Such data can be collected from self-operated ASes or public platforms, such as RouteViews <xref target="RouteViews"/> and RIPE RIS <xref target="RIPE_RIS"/>. The incident discussed in <xref target="incident"/> was discovered using this approach. In fact, an existing public monitoring service already applies this method to track stealthy BGP hijacking events in real time <xref target="Chen"/>.</t>

<t>We emphasize that increasing ROV adoption across global ASes remains essential for improving BGP security. As the adoption rate increases, the feasibility and impact of stealthy BGP hijacking are expected to diminish significantly.</t>

<t>Meanwhile, immediate countermeasures are available. One promising approach is ROV++ <xref target="Morillo"/>, an extension to standard ROV that enables collaboration among ROV-enabled ASes. Upon detecting RPKI-invalid routes, participating ASes can share threat intelligence, allowing for more responsive mitigation even with limited visibility. Beyond simply discarding invalid routes, ROV++ enables ROV-enabled ASes to enforce data-plane filtering or access control policies, thus effectively preventing traffic redirection to unauthorized origins.</t>

</section>
<section anchor="conclusion"><name>Conclusion</name>

<t>This document formalizes stealthy BGP hijacking, a threat enabled by incomplete ROV adoption that evades control-plane detection while still diverting traffic. We define its conditions, present a real-world case, and demonstrate how it can be detected via routing table comparisons across vantage points. While broader ROV adoption remains essential, mechanisms like ROV++ offer practical mitigation by enabling coordination among ROV-enabled ASes. Addressing this risk is critical for improving the security of interdomain routing.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>This document includes no request to IANA.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The stealthy BGP hijacking behavior described in this document can be actively exploited by malicious ASes to divert traffic with less likelihood of being detected. While the success of such attacks depends on factors like accurate knowledge of ROV deployment, their impact can be significant, particularly in scenarios involving non-ROV transit. Detection and mitigation strategies are discussed in <xref target="measure"/>. Network operators are advised to adopt ROV where possible, explore collaborative defenses such as ROV++, and monitor both control- and data-plane behavior to identify and respond to suspicious routing activity.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC6480">
  <front>
    <title>An Infrastructure to Support Secure Internet Routing</title>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6480"/>
  <seriesInfo name="DOI" value="10.17487/RFC6480"/>
</reference>

<reference anchor="RFC9582">
  <front>
    <title>A Profile for Route Origin Authorizations (ROAs)</title>
    <author fullname="J. Snijders" initials="J." surname="Snijders"/>
    <author fullname="B. Maddison" initials="B." surname="Maddison"/>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="D. Kong" initials="D." surname="Kong"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="May" year="2024"/>
    <abstract>
      <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9582"/>
  <seriesInfo name="DOI" value="10.17487/RFC9582"/>
</reference>

<reference anchor="RFC6811">
  <front>
    <title>BGP Prefix Origin Validation</title>
    <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6811"/>
  <seriesInfo name="DOI" value="10.17487/RFC6811"/>
</reference>

<reference anchor="RFC7115">
  <front>
    <title>Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)</title>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <date month="January" year="2014"/>
    <abstract>
      <t>Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has many operational considerations. This document attempts to collect and present those that are most critical. It is expected to evolve as RPKI-based origin validation continues to be deployed and the dynamics are better understood.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="185"/>
  <seriesInfo name="RFC" value="7115"/>
  <seriesInfo name="DOI" value="10.17487/RFC7115"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="APNIC" target="https://stats.labs.apnic.net/rpki">
  <front>
    <title>Measuring ROAs and ROV.</title>
    <author initials="G." surname="Huston" fullname="Geoff Huston">
      <organization>APNIC</organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SingTel" target="https://en.wikipedia.org/wiki/Singtel">
  <front>
    <title>Wikipedia - SingTel.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="GlobeTel" target="https://en.wikipedia.org/wiki/Globe_Telecom">
  <front>
    <title>Wikipedia - Globe Telecom.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SEACOM" target="https://lg.seacomnet.com">
  <front>
    <title>Looking Glass lg-01-ams.nl.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="RouteViews" target="http://routeviews.org/">
  <front>
    <title>MRT format RIBs and UPDATEs.</title>
    <author >
      <organization>University of Oregon Route Views Project</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="RIPE_RIS" target="https://ris.ripe.net/docs/">
  <front>
    <title>Routing Information Service (RIS).</title>
    <author >
      <organization>RIPE NCC</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="Morillo" >
  <front>
    <title>Routing Information Service (RIS).</title>
    <author initials="R." surname="Morillo" fullname="Reynaldo Morillo">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Furuness" fullname="Justin Furuness">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="C." surname="Morris" fullname="Cameron Morris">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Breslin" fullname="James Breslin">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="B." surname="Wang" fullname="Bing Wang">
      <organization>University of Connecticut</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
</reference>
<reference anchor="Chen" target="https://yhchen.cn/stealthy-bgp-hijacking/">
  <front>
    <title>Stealthy BGP Hijakcing Incidents.</title>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>


    </references>

</references>


<?line 338?>

<section anchor="looking-glass-output"><name>Looking Glass Output</name>

<t>All commands were executed on &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> on February 10, 2025.</t>

<t><xref target="output-1"/> shows the output for executing &quot;show ip bgp 203.127.0.0/16&quot;.</t>

<t><xref target="output-2"/> shows the output for executing &quot;show ip bgp 203.127.225.0/24&quot;.</t>

<t><xref target="output-3"/> shows the output for executing &quot;traceroute ip 203.127.225.1&quot;.</t>

<figure title="Output for &quot;show ip bgp 203.127.0.0/16&quot;" anchor="output-1"><artwork><![CDATA[
#################################################################
BGP routing table entry for 203.127.0.0/16, version 3804070796
Paths: (2 available, best #2, table default)
  Not advertised to any peer
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.17 from 105.26.64.17 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external
      Commnuity: 37100:1 37100:13
      path 108E73DC RPKI State valid
      rx pathid: 0, tx pathid: 0
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.1 from 105.26.64.1 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external, best
      Commnuity: 37100:1 37100:13
      path 0AB3654C RPKI State valid
      rx pathid: 0, tx pathid: 0x0
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;show ip bgp 203.127.225.0/24&quot;" anchor="output-2"><artwork><![CDATA[
#################################################################
% Network not in table
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;traceroute ip 203.127.225.1&quot;" anchor="output-3"><artwork><![CDATA[
#################################################################
Tracing the route to 203.127.225.1
VRF info: (vrf in name/id, vrf out name/id)
  1 ae-2-21.er-01-ams.nl.seacomnet.com (105.26.64.1) [AS 37100]
      0 msec 200 msec 0 msec
  2 ce-0-0-11.er-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 200 msec
    ce-0-0-11.cr-01-mrs.fr.seacomnet.com (105.16.8.201) [AS 37100]
      [MPLS: Label 4474 Exp 0] 204 msec
    ce-0-0-11.cr-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 20 msec
  3 ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
    ce-0-0-2.br-02-mrs.fr.seacomnet.com (105.16.32.253) [AS 37100]
      24 msec
    ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
  4 213.144.184.130 [AS 6762] 24 msec 20 msec 24 msec
  5 213.144.170.125 [AS 6762] 40 msec 44 msec 40 msec
  6 ae10.0.cjr01.mrs005.flagtel.com (62.216.131.154) [AS 15412]
      [MPLS: Label 7391 Exp 0] 172 msec 172 msec 168 msec
  7 ae1.0.cjr02.sin001.flagtel.com (62.216.129.181) [AS 15412]
      [MPLS: Label 3621 Exp 0] 168 msec 156 msec 156 msec
  8 ae18.0.cjr01.sin001.flagtel.com (62.216.137.165) [AS 15412]
      160 msec 160 msec 172 msec
  9 80.81.75.186 [AS 15412] 164 msec 164 msec 160 msec
 10 112.198.1.185 [AS 4775] 204 msec 216 msec 204 msec
 11  *  *  *
 12 120.28.4.38 [AS 4775] 220 msec 220 msec 216 msec
 13 202.126.45.138 [AS 17894] 224 msec
    202.126.45.134 [AS 17894] 220 msec 232 msec
 14 202.126.45.180 [AS 17894] 208 msec 216 msec 224 msec
 15  *  *  *
 16  *  *  *
#################################################################
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

