Due to China Telecom's mistakes, Russia's local network traffic is constantly being routed outside Russia, which may affect Russia's communication security. Network monitoring service center Dyn wrote in a blog on Thursday that the incident was caused by a bug in the Border Gateway Protocol (BGP). The problem has arisen several times since China Telecom signed a BGP peering agreement with Vimpelcom, Russia's largest mobile operator, last year. We know that some local communications need to pay high communication fees to intermediate carriers to transmit information on other networks, and signing BGP neighbor agreements can save this expense, but we never expected that danger would follow. Under this protocol, network traffic in Russia will be continuously routed to China Telecom's routers. Safety implications Doug Madory, head of network analytics at Dyn, said The impact of this incident is not as significant as previous leaks. Prior to this, the Indonesian satellite (Indosat) leak affected the global routing table; VolumeDrive leaks almost the entire BGP routing table. But in fact, because the parties involved in this route breach were unaware that there was an error in their communication, these seemingly low-impact security incidents tend to last longer than catastrophic events. Because law enforcement agencies and hackers have the ability to monitor routing communications, Madory advises network operators to keep an eye on and filter the routing information they receive. Otherwise, network traffic can be easily redirected and pose a potential threat to network security communication and routing performance.
|