<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-li-sidrops-stealthy-hijacking-00" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Stealthy BGP Hijacking Risk">Risk of Stealthy BGP Hijacking under Incomplete Adoption of Route Origin Validation (ROV)</title>

    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>yh-chen21@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>

    <date year="2025" month="May" day="09"/>

    <area>Operations and Management</area>
    <workgroup>SIDROPS Working Group</workgroup>
    <keyword>Resource Public Key Infrastructure</keyword> <keyword>Route Origin Validation</keyword> <keyword>BGP Hijacking</keyword>

    <abstract>


<?line 150?>

<t>This document describes how incomplete adoption of Route Origin Validation (ROV) makes certain forms of BGP hijacking less visible on the control plane while still capable of diverting traffic. We explain the underlying mechanism, define the form of the threat, analyze an real-world incident that exemplifies the issue, and discuss potential countermeasures to mitigate its impact.</t>



    </abstract>



  </front>

  <middle>


<?line 154?>

<section anchor="introduction"><name>Introduction</name>

<t>BGP hijacking occurs when an Autonomous System (AS), accidentally or maliciously, mis-announces an address prefix it is not authorized to originate. ASes that accept such announcement may divert traffic destined for the prefix to an incorrect AS instead of the actual prefix holder. To mitigate this risk, Route Origin Validation (ROV) <xref target="RFC6811"/> was introduced as part of the Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>. ROV-enabled ASes validate route announcements using Route Origin Authorizations (ROAs) <xref target="RFC9582"/>, which specify which ASes are permitted to originate specfic prefixes. The best current practice <xref target="RFC7115"/> suggests configuring routing policies to drop or give a very low preference to routes deemed invalid by ROV.</t>

<t>However, ROV adoption across the Internet is incomplete and expected to remain so for the foreseeable future. In such a state, invalid announcements may still propagate through non-ROV ASes to a certain extent, before being dropped by ROV-enabled ASes. This limited propagation creates a situation where some ASes never receive the invalid routes and are therefore unware of the ongoing incident (e.g., potential BGP hijacking). Yet they are not fully protected either, as the traffic they originate, along the data forwarding path,  may traverse a non-ROV AS that has accepted the invalid route. This non-ROV AS will forward traffic towards the incorrect origin AS. As a result, the traffic originating ASes unknowingly fall victim to BGP hijacking, unless they conduct active measurements (e.g., traceroute) or receive alerts from other network operators who spot the incident. In effect, BGP hijacking becomes stealthier in this case, due to incomplete adoption of ROV across global ASes.</t>

<t>The objective of this document is to highlight the side effect of incomplete ROV adoption on BGP hijacking, which results in highly stealthy BGP hijacking that is invisible to victims on the control plane. This document defines this form of BGP hijacking, explains its underlying mechanisms, analyzes a real-world incident, and discusses possible detection and mitigation approaches.</t>

<t>The rest of this document is structured as follows: Section 2 details the side effect of ROV in incomplete adoption. Section 3 defines the resulting stealthy BGP hijacking. Section 4 analyzes a representative real-world incident. Section 5 discusses potential detection and mitigation strategies. Finally, Section 6 concludes the document.</t>

</section>
<section anchor="problem"><name>Side Effect of Incomplete ROV Adoption</name>

<t>This section explains how BGP hijacking can still succeed and even become stealthier under incomplete ROV adoption. <xref target="control-plane"/> illustrates the control-plane behavior when a malicious AS initiates a BGP hijacking attempt. In this scenario, AS G (the hijacker) announces a (sub-)prefix legitimately owned by AS E (the target). ROV-enabled ASes B and D filter out the invalid announcement, so only AS C and F may accept the hijacker&#39;s route into their routing tables, depending on their routing policies.</t>

<figure title="BGP hijacking under incomplete ROV adoption" anchor="control-plane"><artwork><![CDATA[
          <==           <==           <==           <==           
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                        <~~       |     ~~>                       
                                  |                               
                                  |                               
                                  |                               
                                  |     <~~         <~~           
    ==>  E's announcement         |         +------+      +------+
    ~~>  G's announcement         +---------| AS F |------| AS G |
                                            +------+      +-Hijker
                                         ==>           ==>        
]]></artwork></figure>

<t>Consider AS A as an example. AS A only receives a route to the legitimate origin (AS E), since its upstream provider AS B rejects the invalid route. As a result, from AS A&#39;s control-plane perspective, the only available route is valid, and one can expect traffic destined for the target to be correctly delivered. However, as shown in <xref target="data-plane"/>, from a global perspective, AS A&#39;s traffic is forwarded through AS C, which accpets the hijacker&#39;s route. In this case, the traffic is silently redirected to the hijacker.</t>

<figure title="Discrepancy between control plane and data plane" anchor="data-plane"><artwork><![CDATA[
   (Route in A's table)                                           
   ---------------------------------------------------------->    
                                                                  
  +------+      +------+      +------+      +------+      +------+
  | AS A |------| AS B |------| AS C |------| AS D |------| AS E |
  +------+      +----ROV      +------+      +----ROV      +-Target
                                  |                               
   --------------------------+    |                               
   (Actual forwarding path)  |    |                               
                             |    |                               
                             |    |                               
                             |    |         +------+      +------+
                             |    +---------| AS F |------| AS G |
                             |              +------+      +-Hijker
                             |                                    
                             +-------------------------------->   
]]></artwork></figure>

<t>Because AS A lacks a route to the hijacker, it remains unaware of the attack unless it conducts active measurements (e.g., traceroute) or receives external notifications. Its local control-plane protections are ineffective in detecting or responding to the hijack in this case. This highlights an unexpected side effect of incomplete ROV adoption: it prevents certain ASes from observing invalid routes, making ongoing hijacking more difficult to detect. We refer to such BGP hijacking, which compromises traffic forwarding while remaining invisible to affected ASes on the control plane, as stealthy BGP hijacking. An AS is susceptible to stealthy BGP hijacking if:</t>

<t><list style="symbols">
  <t>It has no route to the hijacker due to ROV filtering, and</t>
  <t>At least one non-ROV AS along the legitimate path accepts the hijacker&#39;s route.</t>
</list></t>

<t>This vulnerability applies to both BGP hijacking that targets a prefix and a sub-prefix.</t>

</section>
<section anchor="definition"><name>Definition of Stealthy BGP Hijacking</name>

<t>From a control-plane-only standpoint, this section defines stealthy BGP hijacking under incomplete ROV adoption.</t>

<section anchor="notation"><name>Notation and Terminology</name>

<t>In this document, we use the following notation to describe BGP routes:</t>

<t><spanx style="verb">
p: V ... (M) ... O
</spanx></t>

<t>This notation represents a BGP route to prefix <spanx style="verb">p</spanx> as observed from a vantage point <spanx style="verb">V</spanx>. The sequence of ASes from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx> may include one or more intermediate ASes <spanx style="verb">M</spanx>.</t>

<t>The symbols used are defined as:</t>

<dl>
  <dt><spanx style="verb">p</spanx>:</dt>
  <dd>
    <t>The IP prefix being routed.</t>
  </dd>
  <dt><spanx style="verb">V</spanx>:</dt>
  <dd>
    <t>The vantage point, i.e., the AS from which the route is observed (typically via a BGP route collector).</t>
  </dd>
  <dt><spanx style="verb">M</spanx>:</dt>
  <dd>
    <t>An intermediate AS, representing any AS that appears on the path from <spanx style="verb">V</spanx> to the origin <spanx style="verb">O</spanx>. There may be multiple such ASes, or may be none.</t>
  </dd>
  <dt><spanx style="verb">O</spanx>:</dt>
  <dd>
    <t>The origin AS, which originates the route and claims to originate the prefix <spanx style="verb">p</spanx>.</t>
  </dd>
</dl>

<t>We also define the following terminology for clarity in later discussions:</t>

<dl>
  <dt>Conflict:</dt>
  <dd>
    <t>Two routes are said to be in conflict if they refer to the same prefix or to overlapping prefixes (e.g., one is a more specific sub-prefix of the other), but their origin ASes differ. This indicates a potential inconsistency in prefix ownership or announcement.</t>
  </dd>
  <dt>RPKI-invalid:</dt>
  <dd>
    <t>A route is considered RPKI-invalid if its prefix matches an ROA, but the origin AS does not match the AS specified, or the prefix exceeds the max length specified allowable for origination. This typically signals an unauthorized or misconfigured route announcement, which may lead to BGP hijacking.</t>
  </dd>
  <dt>RPKI-valid:</dt>
  <dd>
    <t>A route is considered RPKI-valid if its origin AS matches an ROA for the prefix under RPKI, and the route is not RPKI-invalid.</t>
  </dd>
  <dt>Risk-critical:</dt>
  <dd>
    <t>An AS is said to be risk-critical if it chooses to forward traffic towards an invalid route to the hijacker, while it also has route to the legitimate origin in its routing table.</t>
  </dd>
</dl>

</section>
<section anchor="stealthy-bgp-hijacking"><name>Stealthy BGP Hijacking Definition</name>

<t>Given a pair of observed routes:</t>

<t><spanx style="verb">
p1: V1 ... (M1) ... O1
p2: V2 ... (M2) ... O2
</spanx></t>

<t>A stealthy BGP hijacking is said to occur when the following conditions hold:</t>

<t><list style="numbers" type="1">
  <t>The two routes conflict, i.e., <spanx style="verb">p2</spanx> is equal to or a more specific sub-prefix of <spanx style="verb">p1</spanx>, and <spanx style="verb">O2</spanx> does not equal to <spanx style="verb">O1</spanx>.</t>
  <t>Their authorization states disagree, i.e., the prefix-origin <spanx style="verb">p2-O2</spanx> is RPKI-invalid, while <spanx style="verb">p1-O1</spanx> is RPKI-valid.</t>
  <t>The invalid route is invisible to the victim, i.e., vantage point <spanx style="verb">V1</spanx> has no observable route to prefix <spanx style="verb">p2</spanx> that is originated by <spanx style="verb">O2</spanx>.</t>
  <t>A risk-critical AS redirects traffic to the hijacker, i.e., there exists <spanx style="verb">M1</spanx> such that <spanx style="verb">M1</spanx> equals <spanx style="verb">V2</spanx>.</t>
</list></t>

<t>Under these conditions, <spanx style="verb">O2</spanx> is a potential hijacker that announces the prefix <spanx style="verb">p2</spanx>, which is owned by <spanx style="verb">O1</spanx>. The invalid route does not propagate to vantage point <spanx style="verb">V1</spanx>. As a result, <spanx style="verb">V1</spanx> observes only the legitimate route to <spanx style="verb">p1</spanx> and remains unaware of the conflicting route to <spanx style="verb">p2</spanx> originated by <spanx style="verb">O1</spanx>. However, due to the presence of a risk-critical AS <spanx style="verb">M1</spanx>, which appears in the legitimate path and also has a route to <spanx style="verb">p2</spanx>, traffic destined for <spanx style="verb">p2</spanx> is silently diverted to the hijacker.</t>

</section>
</section>
<section anchor="example"><name>Real-World Incident Example</name>

<t>This section presents an real-world incident consistent with the definition of stealthy BGP hijacking in <xref target="stealthy-bgp-hijacking"/>. The incident was last observed on April 24, 2025. As illustrated in <xref target="incident"/>, both AS37100 (SEACOM) and AS6762 (TISparkle) observe the prefix 203.127.0.0/16 announced by its legitimate origin, AS3758 (SingNet). Meanwhile, the sub-prefix 203.127.225.0/24 is announced by an unauthorized origin, AS17894 (Innove Communications). The two origins are located in different countries and have no link between them ever observed during the most recent month. According to the APNIC&#39;s ROV filtering measurement <xref target="APNIC"/>, AS37100 adopts ROV with a 100% filtering rate. Therefore, it discards the RPKI-invalid /24 route. However, traffic from AS37100 (or its downstream customers) to the /24 prefix is still hijacked when it transits through non-ROV AS6762, which accepts the /24 route.</t>

<figure title="A real-world stealthy BGP hijacking incident" anchor="incident"><artwork><![CDATA[
  Route to 203.127.0.0/16                                           
@------------------@------------------------------------------>     
                                                                    
+---------+        +---------+        +---------+        +---------+
| AS37100 |--------| AS6762  |--------| AS7473  |--------| AS3758  |
| SEACOM  |        |TISparkle|        | SingTel |        | SingNet |
+---------+        +---------+        +---------+        +---------+
ROV-enabled        @    |                                           
                   |    |                                           
                   |    | +----------+   +---------+   +-----------+
                   |    +-| AS15412  |---| AS4775  |---|  AS17894  |
@: vantage point   |      | FLAG Tel |   |Globe Tel|   |Innove Comm|
                   |      +----------+   +---------+   +-----------+
                   |                                                
                   +------------------------------------------>     
                    Route to 203.127.225.0/24                       
]]></artwork></figure>

<t>An examination using AS37100&#39;s looking glass &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> corroborates the hijack. The command &quot;show ip bgp 203.127.0.0/16&quot; shows a valid route via the path 37100 6762 6461 7473 3758. Meanwhile, &quot;show ip bgp 203.127.225.0/24&quot; returns no matching routes, confirming that AS37100 does not have visibility of the route from the unauthorized origin AS17894. However, a traceroute from AS37100 to an address within 203.127.225.0/24 shows that the final hops traverse AS17894, indicating that traffic is indeed diverted to the illegitimate origin, demonstrating a successful hijack at the data plane, even though control-plane filtering is in place.</t>

<t>We emphasize that the incident, while in the form of stealthy BGP hijacking, is likely caused by benign misconfigurations, given that AS17894 and AS3758 have business connections through their parent companies <xref target="SingTel"/> <xref target="GlobeTel"/>, We reported the incident to AS4775 (Globe Telecoms) on February 10, 2025, and received confirmationa that it would investigate. The original looking glass output is provided in <xref target="looking-glass-output"/>.</t>

</section>
<section anchor="measure"><name>Detection and Mitigation</name>

<t>The definition of stealthy BGP hijacking naturally enables a practical detection method based on inconsistencies across routing tables. By comparing routing data from multiple vantage points, one can identify route pairs that satisfy the conditions outlined in <xref target="stealthy-bgp-hijacking"/>. Such data can be collected from self-operated ASes or public platforms, such as RouteViews <xref target="RouteViews"/> and RIPE RIS <xref target="RIPE_RIS"/>. The incident discussed in <xref target="incident"/> was discovered using this approach. In fact, an existing public monitoring service already applies this method to track stealthy BGP hijacking events in real time <xref target="Chen"/>.</t>

<t>We emphasize that increasing ROV adoption across global ASes remains essential for improving BGP security. As the adoption rate increases, the feasibility and impact of stealthy BGP hijacking are expected to diminish significantly.</t>

<t>Meanwhile, immediate countermeasures are available. One promising approach is ROV++ <xref target="Morillo"/>, an extension to standard ROV that enables collaboration among ROV-enabled ASes. Upon detecting RPKI-invalid routes, participating ASes can share threat intelligence, allowing for more responsive mitigation even with limited visibility. Beyond simply discarding invalid routes, ROV++ enables ROV-enabled ASes to enforce data-plane filtering or access control policies, thus effectively preventing traffic redirection to unauthorized origins.</t>

</section>
<section anchor="conclusion"><name>Conclusion</name>

<t>This document formalizes stealthy BGP hijacking, a threat enabled by incomplete ROV adoption that evades control-plane detection while still diverting traffic. We define its conditions, present a real-world case, and demonstrate how it can be detected via routing table comparisons across vantage points. While broader ROV adoption remains essential, mechanisms like ROV++ offer practical mitigation by enabling coordination among ROV-enabled ASes. Addressing this risk is critical for improving the security of interdomain routing.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>This document includes no request to IANA.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>The stealthy BGP hijacking behavior described in this document can be actively exploited by malicious ASes to divert traffic with less likelihood of being detected. While the success of such attacks depends on factors like accurate knowledge of ROV deployment, their impact can be significant, particularly in scenarios involving non-ROV transit. Detection and mitigation strategies are discussed in <xref target="measure"/>. Network operators are advised to adopt ROV where possible, explore collaborative defenses such as ROV++, and monitor both control- and data-plane behavior to identify and respond to suspicious routing activity.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC6480">
  <front>
    <title>An Infrastructure to Support Secure Internet Routing</title>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6480"/>
  <seriesInfo name="DOI" value="10.17487/RFC6480"/>
</reference>

<reference anchor="RFC9582">
  <front>
    <title>A Profile for Route Origin Authorizations (ROAs)</title>
    <author fullname="J. Snijders" initials="J." surname="Snijders"/>
    <author fullname="B. Maddison" initials="B." surname="Maddison"/>
    <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
    <author fullname="D. Kong" initials="D." surname="Kong"/>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <date month="May" year="2024"/>
    <abstract>
      <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9582"/>
  <seriesInfo name="DOI" value="10.17487/RFC9582"/>
</reference>

<reference anchor="RFC6811">
  <front>
    <title>BGP Prefix Origin Validation</title>
    <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6811"/>
  <seriesInfo name="DOI" value="10.17487/RFC6811"/>
</reference>

<reference anchor="RFC7115">
  <front>
    <title>Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)</title>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <date month="January" year="2014"/>
    <abstract>
      <t>Deployment of BGP origin validation that is based on the Resource Public Key Infrastructure (RPKI) has many operational considerations. This document attempts to collect and present those that are most critical. It is expected to evolve as RPKI-based origin validation continues to be deployed and the dynamics are better understood.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="185"/>
  <seriesInfo name="RFC" value="7115"/>
  <seriesInfo name="DOI" value="10.17487/RFC7115"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="APNIC" target="https://stats.labs.apnic.net/rpki">
  <front>
    <title>Measuring ROAs and ROV.</title>
    <author initials="G." surname="Huston" fullname="Geoff Huston">
      <organization>APNIC</organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SingTel" target="https://en.wikipedia.org/wiki/Singtel">
  <front>
    <title>Wikipedia - SingTel.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="GlobeTel" target="https://en.wikipedia.org/wiki/Globe_Telecom">
  <front>
    <title>Wikipedia - Globe Telecom.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="March"/>
  </front>
</reference>
<reference anchor="SEACOM" target="https://lg.seacomnet.com">
  <front>
    <title>Looking Glass lg-01-ams.nl.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025" month="February"/>
  </front>
</reference>
<reference anchor="RouteViews" target="http://routeviews.org/">
  <front>
    <title>MRT format RIBs and UPDATEs.</title>
    <author >
      <organization>University of Oregon Route Views Project</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="RIPE_RIS" target="https://ris.ripe.net/docs/">
  <front>
    <title>Routing Information Service (RIS).</title>
    <author >
      <organization>RIPE NCC</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="Morillo" >
  <front>
    <title>Routing Information Service (RIS).</title>
    <author initials="R." surname="Morillo" fullname="Reynaldo Morillo">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Furuness" fullname="Justin Furuness">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="C." surname="Morris" fullname="Cameron Morris">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="J." surname="Breslin" fullname="James Breslin">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
      <organization>University of Connecticut</organization>
    </author>
    <author initials="B." surname="Wang" fullname="Bing Wang">
      <organization>University of Connecticut</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
</reference>
<reference anchor="Chen" target="https://yhchen.cn/stealthy-bgp-hijacking/">
  <front>
    <title>Stealthy BGP Hijakcing Incidents.</title>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>


    </references>

</references>


<?line 338?>

<section anchor="looking-glass-output"><name>Looking Glass Output</name>

<t>All commands were executed on &quot;lg-01-ams.nl&quot; <xref target="SEACOM"/> on February 10, 2025.</t>

<t><xref target="output-1"/> shows the output for executing &quot;show ip bgp 203.127.0.0/16&quot;.</t>

<t><xref target="output-2"/> shows the output for executing &quot;show ip bgp 203.127.225.0/24&quot;.</t>

<t><xref target="output-3"/> shows the output for executing &quot;traceroute ip 203.127.225.1&quot;.</t>

<figure title="Output for &quot;show ip bgp 203.127.0.0/16&quot;" anchor="output-1"><artwork><![CDATA[
#################################################################
BGP routing table entry for 203.127.0.0/16, version 3804070796
Paths: (2 available, best #2, table default)
  Not advertised to any peer
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.17 from 105.26.64.17 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external
      Commnuity: 37100:1 37100:13
      path 108E73DC RPKI State valid
      rx pathid: 0, tx pathid: 0
  Refresh Epoch 1
  37100 6762 6461 7473 3758
    105.26.64.1 from 105.26.64.1 (105.16.0.131)
      Origin IGP, metric 0, localpref 100, valid, external, best
      Commnuity: 37100:1 37100:13
      path 0AB3654C RPKI State valid
      rx pathid: 0, tx pathid: 0x0
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;show ip bgp 203.127.225.0/24&quot;" anchor="output-2"><artwork><![CDATA[
#################################################################
% Network not in table
#################################################################
]]></artwork></figure>

<figure title="Output for &quot;traceroute ip 203.127.225.1&quot;" anchor="output-3"><artwork><![CDATA[
#################################################################
Tracing the route to 203.127.225.1
VRF info: (vrf in name/id, vrf out name/id)
  1 ae-2-21.er-01-ams.nl.seacomnet.com (105.26.64.1) [AS 37100]
      0 msec 200 msec 0 msec
  2 ce-0-0-11.er-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 200 msec
    ce-0-0-11.cr-01-mrs.fr.seacomnet.com (105.16.8.201) [AS 37100]
      [MPLS: Label 4474 Exp 0] 204 msec
    ce-0-0-11.cr-02-mrs.fr.seacomnet.com (105.16.8.209) [AS 37100]
      [MPLS: Label 2242 Exp 0] 20 msec
  3 ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
    ce-0-0-2.br-02-mrs.fr.seacomnet.com (105.16.32.253) [AS 37100]
      24 msec
    ce-0-0-1.br-02-mrs.fr.seacomnet.com (105.16.33.253) [AS 37100]
      20 msec
  4 213.144.184.130 [AS 6762] 24 msec 20 msec 24 msec
  5 213.144.170.125 [AS 6762] 40 msec 44 msec 40 msec
  6 ae10.0.cjr01.mrs005.flagtel.com (62.216.131.154) [AS 15412]
      [MPLS: Label 7391 Exp 0] 172 msec 172 msec 168 msec
  7 ae1.0.cjr02.sin001.flagtel.com (62.216.129.181) [AS 15412]
      [MPLS: Label 3621 Exp 0] 168 msec 156 msec 156 msec
  8 ae18.0.cjr01.sin001.flagtel.com (62.216.137.165) [AS 15412]
      160 msec 160 msec 172 msec
  9 80.81.75.186 [AS 15412] 164 msec 164 msec 160 msec
 10 112.198.1.185 [AS 4775] 204 msec 216 msec 204 msec
 11  *  *  *
 12 120.28.4.38 [AS 4775] 220 msec 220 msec 216 msec
 13 202.126.45.138 [AS 17894] 224 msec
    202.126.45.134 [AS 17894] 220 msec 232 msec
 14 202.126.45.180 [AS 17894] 208 msec 216 msec 224 msec
 15  *  *  *
 16  *  *  *
#################################################################
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

