logoalt Hacker News

A closer look at a BGP anomaly in Venezuela

385 pointsby ChrisArchitectyesterday at 6:46 AM209 commentsview on HN

Comments

_heimdallyesterday at 11:18 AM

The comments here surprise me a bit. The common thread so far seems to be a general fear of US based companies, but how is that relates to the article?

Cloudflare's post is pretty boring here in that regard. They dig into how BGP works and propose that similar leaks seem common for the Venezuelan ISP in question.

Sure they could be wrong or even actively hiding the truth of what happened here, but the article mentions nothing of Cloudflare being involved in the action and they're describing a networking standard by pointing to publicly available BGP log data.

What am I missing here that everyone else seemed to zero in on?

show 7 replies
Fiveplusyesterday at 7:07 AM

I'm half sleepy but I liked the post. The analysis regarding path prepending really drives the accident theory home. If a state actor were trying to intercept traffic (MITM), the last thing they would do is pad the AS path multiple times because that tells the global routing table, "Don't come this way, I am the long scenic route" lol

This could be a classic fat finger config error, most likely a route map intended to manipulate traffic engineering for their own upstream links that inadvertently leaked widely because of a missing deny-all clause. Neverthless, a good reminder that BGP is still fundamentally a trust based system where a single typo in a config file can cascade globally. Never attribute to malice that which is adequately explained by a missing export filter.

show 1 reply
azalemethyesterday at 10:32 AM

It might be worth linking this document from the Snowden leaks: https://christopher-parsons.com/wp-content/uploads/2023/01/n...

"NSA Network Shaping 101". Big descriptions of ASINs, and layer 3 shaping. Written in 2007.

show 4 replies
Bengalilolyesterday at 10:00 AM

That’s a very new feeling for me. I read the entire post (with no prior knowledge of BGP at all) and I got chills from thinking how deeply intertwined US companies and the US government are.

I know this has always been the case, of course, but now I have lost trust. Whatever the reasons of this "leak" were, I am not accepting any information written in this message (search for the link to another coverage of the incident in the comments).

It is quite weird and quite logical at the same time: this is the end of an era.

show 7 replies
VanTheBrandtoday at 7:02 AM

This article existing at all is a bit suspicious IMO

tedgghyesterday at 2:42 PM

People are so wanting to believe there was an advanced cyber attack to Venezuela’s grid and ISPs that they forget this is a country that hasn’t updated its infrastructure in more than two decades while also not providing any significant maintenance. Most of the “new” technology deployed at the state and federal level comes from corrupt foreign and domestic “suitcase” companies that charged a lot of money to deliver poorly designed systems often even lacking the as-sold equipment. So Venezuela isn’t precisely the most formidable adversary when it comes to cybersecurity.

show 4 replies
__MatrixMan__yesterday at 1:41 PM

I once was half way through a road trip when google maps routed me off the highway, through a walmart parking lot, and onto another highway.

I assumed it was a badly performing algorithm. But if it had instead routed me through a McDonalds drive through, I'd have assumed it was foul play.

I think the article makes a decent case that this was the former and not the latter, though it would be interesting to see route leaks visualized on a map over time. Too many odd coincidences could sway me the other way.

show 1 reply
mbix77yesterday at 10:44 AM

Scary that so much of the basic internet infrastructure is being managed by US companies. Maybe now the rest of the world will change and become more independent. We should have learnt our lesson long ago though.

show 3 replies
anticristiyesterday at 8:29 PM

Whether the claims are true or not, this was a very entertaining BGP refresher. It made me wonder: 15+ years ago, I was network engineer and we used quite a bit of "BGP community magic" to get the routing outcomes we wanted.

If BGP only really needed to represent three types of peers (provider, customer, actual peer), wouldn't BGP configuration and perhaps even BGP be massively simplified?

show 1 reply
MORPHOICESyesterday at 11:05 AM

I have been looking into BGP incidents for a while, and one of the things that continues to puzzle me is figuring out the difference between legitimate outages and noisy but expected behavior. ~

The mental model I’ve been using is: Intentional change (maintenance, policy update) Accidental leak (misconfig, partial rollout) Structural failure (dependency or upstream issue) I like to ask three questions first: Did the blast radius grow over time, or did it appear instantly? Did paths change symmetrically or only in one direction? Did things revert cleanly or drift back slowly? Some concrete tricks that helped: Look for AS-path prepending changes first. Compare visibility across regions rather than just globally.

Track “who benefits” from the new paths, even if only for a short time. I’m interested in how others approach this: What is your first indicator that things are indeed wrong? Do you prefer automated alerts or manual recognition of a pattern?

DinakarSyesterday at 7:05 AM

The depth and coverage that cloudflare has is crazy

show 5 replies
lucideeryesterday at 7:55 AM

The post mentions a number of times that leaks happen "all the time", but the only comparative data shown related to this is for historical leaks from AS8048.

Does anyone have data on what the general frequency of these leaks is likely to be across the network?

show 3 replies
8organicbitsyesterday at 2:17 PM

This is a good opportunity to assess what parts of your own online activity could be impacted by an attacker in the middle (assisted by a BGP leak or otherwise) and, if you're a service provider, how you can protect your customers.

At first pass you probably use HTTPS/TLS for the web, and you know that you shouldn't click through invalid certificate warnings. So the web, tentatively, looks pretty safe.

Email jumps out as vulnerable to eavesdropping, as we largely use opportunistic encryption when transferring messages between mail servers and an on-network-path attacker can use STARTTLS stripping or similar techniques. Most mail servers happily send using cleartext or without validating the TLS certificate. Check that you and your counter-parties are using DNSSEC+DANE, or MTA-STS to ensure that authenticated encryption is always used. Adoption is still quite low, but it's a great time to get started. Watch out for transactional email, like password reset messages, which virtually never validate encryption in transit (https://alexsci.com/blog/is-email-confidential-in-transit-ye... ; instead use multi-factor encryption).

TLS certificates themselves are at risk, unfortunately. An attacker who controls the network in-and-out of your DNS servers can issue domain-verified certificates for your domain; even removing protections like CAA records. DNSSEC is the classic solution here, although using a geographically distributed DNS provider should also work (see multi-perspective validation). Certificate transparency log monitoring should detect any attacker-issued certificates (a review of certificates issued for .ve domains would be interesting).

Ideally, we should build an internet where we don't need to trust the network layer. A BGP route leak would be a performance/availability concern only. We're not there yet, but now is a great time to take the next step in that direction.

googlehateryesterday at 10:54 PM

As someone who knows nothing about networking, this felt really easy to follow. Thanks for sharing!

potato-peeleryesterday at 10:35 AM

Slightly off topic, but if I want to understand the concepts discussed in this article, what all topics should I learn? Is this a good starting place or enough to understand everything in this article - https://beej.us/guide/bgnet/

show 1 reply
moktonaryesterday at 9:29 AM

The real question tho is: how would you become the mitm reserving for yourself the benefit of the doubt?

ChrisArchitectyesterday at 6:48 AM

Related initial aftermath:

There were BGP anomalies during the Venezuela blackout

https://news.ycombinator.com/item?id=46504963

hk1337yesterday at 1:17 PM

I probably glossed over it in all the posts but…

What is a BGP?

show 2 replies
2OEH8eoCRo0yesterday at 4:20 PM

There have been BGP shenanigans before.

https://arstechnica.com/information-technology/2018/11/major...

> Google goes down after major BGP mishap routes traffic through China

hotenyesterday at 10:16 PM

> 8 min read

hah.

keyboredyesterday at 12:21 PM

> As news unfolds surrounding the U.S. capture and arrest of Venezuelan leader Nicolás Maduro, ... It is also noteworthy that these leak events begin over twelve hours prior to the U.S. military strikes in Venezuela. ...

This is how I imagine Russian companies in Russia write about the Russian war on Ukraine.

show 1 reply
Fokamulyesterday at 10:00 AM

[flagged]