The cloud farms

Got farmed.

Traffic sent to and from Google, Facebook, Apple, and Microsoft was briefly routed through a previously unknown Russian Internet provider Wednesday under circumstances researchers said was suspicious and intentional.

Ironic that one of the protocols that allows the Internet to route around outages was used.

5 Replies to “The cloud farms”

  1. Like everything the leftist Dem’s. do … the entire “Russian collusion investigation” … is investigating the WRONG thing. While EVERY American is being scanned by Russia … The FBI is buying ham radio scanners to evade detection of their own illegal conspiratorial communications. De rigor.

  2. Uhm yes
    What would stop ISPs routing your traffic simply because someone else paid for that info? There’s not much difference here.

  3. This is way higher on the food-chain than routing to twitter.com.
    The Autonomous System (AS) publishes to other ASes the routing that it knows how to get to.
    From rfc1930:

    Routing policy here is defined as how routing decisions are made in
    the Internet today. It is the exchange of routing information
    between ASes that is subject to routing policies. Consider the case
    of two ASes, X and Y exchanging routing information:
    NET1 …… ASX ASY ……. NET2
    ASX knows how to reach a prefix called NET1. It does not matter
    whether NET1 belongs to ASX or to some other AS which exchanges
    routing information with ASX, either directly or indirectly; we just
    assume that ASX knows how to direct packets towards NET1. Likewise
    ASY knows how to reach NET2.
    In order for traffic from NET2 to NET1 to flow between ASX and ASY,
    ASX has to announce NET1 to ASY using an exterior routing protocol;
    this means that ASX is willing to accept traffic directed to NET1
    from ASY. Policy comes into play when ASX decides to announce NET1 to
    ASY.
    For traffic to flow, ASY has to accept this routing information and
    use it. It is ASY’s privilege to either use or disregard the
    information that it receives from ASX about NET1’s reachability. ASY
    might decide not to use this information if it does not want to send
    traffic to NET1 at all or if it considers another route more
    appropriate to reach NET1.

    This crack took advantage of the BGP protocol, which is used for inter-AS communication.
    This has nothing to do with the fable called net-neutrality.

Navigation