A Major BGP Hijack by AS55410-Vodafone Idea Ltd

Received a Saturday morning ping on Twitter from Doug Madory, Director of Internet Analysis at Kentik, highlighting a major Border Gateway Protocol (BGP) hijack event overnight. My weekend is sorted, but let’s dig into this incident and learn from the lesson.

https://twitter.com/DougMadory/status/1383138595112955909

AS55410 belongs to Vodafone Idea Ltd. As per APNIC delegation records, this organization has the following address resources allocated to them:

https://ftp.apnic.net/stats/apnic/delegated-apnic-extended-20210417

AS134927 peers with AS55410, AS55644, and AS6453 (TataCom). It doesn’t have any downstream peers and originates the following routes:

https://www.cidr-report.org/cgi-bin/as-report?as=as134927&view=2.0

AS133666 and AS134071 are not used at all, leaving AS55644 and AS55410 the main origin ASes for Vodafone Idea Ltd.

AS55644 originates 109 routes and has peering relationships with the upstreams below. It also has 18 downstream peers (customers) according to CIDR-Report.

https://www.cidr-report.org/cgi-bin/as-report?as=as55644&view=2.0

AS55410 originates 824 routes and has peering relationships with the upstreams below. It has 155 downstream (232 as per RIPE Stat) peers as well. Out of those downstream peers only 22 peers have ASN registered outside India. Adding all announcements make it 2,265 either originating or transiting from AS55410.

https://www.cidr-report.org/cgi-bin/as-report?as=as55410&view=2.0

Around 13:48 UTC, AS55410 started originating routes which don’t belong to them.

route dump via routeviews.org

Within a few minutes, AS55410 started originating 31,000+ routes (including their own) but all of them were prepended. A list of all affected routes is available here.

The prefixes belong to Google, Microsoft, Akamai, Cloudflare, Fastly, and many others. Even though AS55410 has multiple upstream peers, all these announcements were exiting via AS9498 (BHARTI Airtel Ltd.). For a searchable list of Indian Networks, you can also check Anurag’s blog post.

As mentioned in Doug Madory’s tweet that these mass announcements were stopped within few minutes, but some announcements were still making the rounds globally, e.g. 5.35.230.0/24 (GD MASS Network) announced by AS8972.

route dump via routeviews.org

It’s hard to say that what caused this major incident. AS55410 may be trying some traffic shaping/load balancing or they were testing some BGP Optimizer (I hope not).

Clearly, AS9498 should have blocked these announcements easily through AS filtering, knowing AS55410 should not in any way originate these prefixes. There should also be a prefix limit as well: when they have never originated that many prefixes, then why all of sudden they are originating 31,000+? Other upstream peers didn’t propagate these erroneous announcements to the global routing table.

Looking at the data, the hijacked prefixes were from all across the globe but mostly from US (according to ASN registration data using teamcymru whois).

This was a route hijack, it means if you had a valid ROA for any of these announcements then some of the large network operators must have stopped your announcements.

Around 80% of the hijacked routes had no ROAs (unknown) hence those routes must have propagated globally, whereas little more than 7000 had valid ROAs means anyone else originating those routes made them invalid and must have been filtered out by many network operators. That’s why it’s key to create ROAs as it protects your prefixes from such hijack attempts, even if most are unintentional.

ROA Status

It is extremely important that network operators implement effective route filtering based on verifiable information about which networks are legitimately authorized to originate which number resources (AS numbers and IP prefixes). It is also important that network operators have established and well-advertised communication channels in order to quickly resolve issues when they happen.

MANRS is an industry-supported initiative that builds on well-established best practices by bringing together actions that can address the most common threats in the global routing system.

By being part of MANRS, more than 600 network operators, Internet exchange points, and cloud and content delivery network providers take concrete actions to contribute to the resilience and security of a critical part of the Internet infrastructure. The actions include route filtering, global validation of number resources, coordination, and anti-spoofing.

For more information on how to implement these actions and join the MANRS initiative, visit the MANRS website.

Leave a Comment