Skip to main content

Draft document

This policy proposal has been withdrawn

Contents

1.0  Introduction

2.0 Resource Hijacking is a Policy Violation

3.0 Scope: Accidental vs. Deliberate

4.0 Lines of Action

5.0 Expert: Definition

6.0 Pool of Experts

7.0 Procedure

8.0 Retroactivity

9.0 Report and Evidence Eligibility

10.0 Sources of Information for Experts: Examples

11.0 Guidelines for Experts

12.0 Possible Objections

13.0 Appeals

14.0 Ratification

15.0 Transition Period

16.0 Holders of Legacy or Provider Independent Resources

17.0 Continued violations regarding Hijacking of Resources from the same party

1.0 Introduction

BGP hijacks happen on an almost daily basis. Hijacks have different visibility characteristics. They can be on a global scale (propagated to all networks) or restricted (only one or some networks). Their impacts can also vary, and it is not only resource holders who are affected, but also networks (and end users) who receive illegitimate/hijacked routes and suffer the indirect consequences of this.

There are already initiatives and technologies such as MANRS and RPKI, which unfortunately are not enough to significantly reduce hijacks. While MANRS and RPKI are strongly encouraged, policy should address the lack of community rules about hijacking.

Through this document, the RIPE community clarifies that hijacking is not an acceptable practice.

The RIPE NCC is not a mere “virtual land registry,” due to the fact it also has a role in the distribution of resources and is a membership-based organisation with a charter to support a larger community of users. Any persistent hijack can be understood as undermining the RIPE NCC’s credibility as a registry, thus policy is needed as a form of industry self-regulation.

This policy does not try to address problems caused by operational errors or occasional hijacks, but instead tries to create a way for victims to report persistent intentional hijacks. By making more of these cases public and searchable, each Autonomous System will have additional information to inform its decisions about interconnection.

2.0 Resource Hijacking is a Policy Violation

A hijack is understood to be the announcement of routes through BGP to third parties without the consent of the resource holder. This is considered to be a violation of RIPE policy.

A hijack of numbering resources or the announcement of unallocated or unassigned IP addressing space or Autonomous System Numbers to third parties are also considered a policy violation.

Only reports in which the suspected hijacker is subject to RIPE policies can be investigated.

3.0 Scope: Accidental vs. Deliberate

A distinction can be made between accidental or deliberate hijacks from available routing datasets, looking at parameters such as duration, recurrence, possible goals, and the size of hijacked blocks. Other parameters may also be considered in the future.

Accidental events usually emerge from situations where a hijacked prefix or ASN is very similar to other resources held by the source of the hijack.

4.0 Lines of Action

The RIPE NCC is not able to monitor the occurrence of resource hijacks or assess whether they are policy violations. It must therefore rely on external parties, both to report hijacks and to determine whether they are deliberate.

Reports sent to the RIPE NCC need to include a minimum set of details, such as: “Networks Affected”, “Offender ASN”, “Why am I reporting this Hijack? (Holder or Receiving Party)”, “Hijacked Prefixes/ASNs” and “Timespan”. This is not a definitive list and other details may also be required.

The RIPE NCC will provide a web-based form (or equivalent alternatives) to submit reports. Information regarding the hijacked routes/ASNs reported will be made publicly available to limit the risk of duplicate reports being submitted.

The involved parties will be notified as soon as they are identified. This will allow them to provide any relevant information and mitigate the hijack, avoiding further damages and possibly false claims.

The RIPE NCC will define a pool of worldwide experts who can assess whether reported hijacks constitute policy violations. Experts from this pool will provide a judgement regarding each reported case, no later than six weeks from the moment the report was received. If this judgement report is not completed within six weeks, the case will be dismissed.

Direct upstream or transit providers of a suspected hijacker that facilitate a hijack through their networks should be notified about the publication of a judgement report. This is not to be considered a formal warning and a response is not required. However, the notification will ask if they can provide further information or identify anything odd. Nevertheless, if intentional cases are identified over successive occasions, they could be seen by the experts as an involved party.

The expert investigation could suggest other related organisations (such as multiple LIRs from a single business group), which may be considered by the RIPE NCC in the event of a future closure process. This possibility aims to prevent hijackers from continuing their activities from a simulated customer's network. The expert investigation could also identify relationships between LIRs/End Users within the same business groups.

If an alleged hijacker can demonstrate that their infrastructure was improperly manipulated by third parties (for example, compromised routers), then the hijack cannot be considered intentional.

5.0 Expert: Definition

An expert is an external party to the RIPE NCC, ideally with at least five years’ experience with (external) BGP from dealing with configurations related to peering and transit providers. Experts should be familiar with the common forms of interconnection agreements, both within and outside of the RIPE NCC service region.

6.0 Pool of Experts

The selection procedure for the pool of experts should be open and managed by the RIPE NCC, possibly in collaboration with other RIRs:

  1. Every two years, a call for applications to the expert panel will be made to the global community, noting the experience and knowledge required. Additional calls will be made the pool needs to be expanded.
  2. To join the pool of experts, a candidate will need a statement support from three different networks (ASes) from three different economies within the RIPE NCC service region, which are within different LIR sponsorships.
  3. The authors of this proposal and active RIPE WG Chairs are not eligible to become experts. If an expert is selected as RIPE WG Chair, they will need to step down from expert duties, after completing their participation in any ongoing cases.
  4. To avoid discrimination between cases, the same number of experts must participate in each case, for both the initial phase and the appeal phase (if applicable). This number is intentionally undefined and should be decided when the process is implemented.
  5. The minimum number of experts per case and phase will be three. If a larger number is necessary, it must be odd, and the community will be informed of the reasons for the change.
  6. The experts for each case/phase will be chosen at random, to ensure a balanced sharing of cases.
  7. The identity of the experts chosen for a particular case will be kept confidential to avoid bribery attempts or reprisal actions against them.
  8. Before accepting a case, experts must sign a document that confirms their impartiality and states that they have no direct or indirect relationship with the involved parties.
  9. Experts must sign a non-disclosure agreement with the RIPE NCC that covers any information provided by an accused party as part of their appeal.
  10. Cases must be completed by the experts that were initially assigned to them, even if they are replaced in a selection process while a case is ongoing. If there is a justified cause, one expert (only) may be replaced by another; this must be communicated to the RIPE community.
  11. Experts will be replaced if they are unresponsive to either their fellow experts on a case or the RIPE NCC. Experts will also be replaced if they fail to comply with the defined time frames in three separate cases.
  12. A person can only serve as an expert for four consecutive years (two terms). They must then stand down for at least two years before they are eligible to apply for selection again.
  13. RIPE NCC will need to provide legal insurance for all experts, exclusively covering investigations/cases where they were involved.
  14. The assignment of cases to experts will follow a programmed process (a draw from a minimum number of experts currently handling no cases, or a minimum of cases).
  15. New cases cannot be investigated until the pool of available experts is at least twice the minimum number that can be assigned to a single case.

7.0 Procedure

The procedure must incorporate at least the following elements:

  1. The RIPE NCC will verify that a report contains sufficient information before assigning it to a group of experts. If this is not the case, the report will be dismissed.
  2. If a report is accepted, the suspected hijacker will be notified and given an opportunity to respond, providing evidence as they see fit.
  3. Experts assigned to a case will verify the reported information regarding historical BGP data and will review any evidence provided by the suspected hijacker.
  4. The group of experts assigned to a case will publish a joint report with their conclusions.
  5. The experts will dismiss any cases that are clearly accidental, though they must indicate this in their report. The RIPE NCC can share this report with the responsible party to avoid future reoccurrences.
  6. For an event to be identified as an intentional hijack, there must be unanimity between all experts on the case.
  7. Experts cannot add accused parties to a case.
  8. A suspected hijacker must be given the opportunity to appeal a report. In this case, a different group of experts will review the case. Again, there must be unanimity between all experts or the case will be dismissed.
  9. RIPE NCC staff (or staff from other RIRs) cannot be part of an expert group, though they may provide administrative assistance. This does not include contacting the people which originally filed a report to request more information or providing any non-public RIPE NCC membership information.
  10. Neither the RIPE NCC nor the claimant(s) can appeal expert decisions.

8.0 Retroactivity

Only hijacking events that occur after this policy has been implemented may be considered.

9.0 Report and Evidence Eligibility

Only networks directly affected by a hijack may file a report.

A report can only be filed:

  • If the victim is the legitimate holder of a hijacked IP address prefix or Autonomous System;
  • If the victim has received a hijacked IP address prefix through BGP or a route with an AS-PATH that includes a hijacked Autonomous System.

A report is not admissible if the person reporting it was not affected in any way by the hijack.

Evidence older than six months, counted from the time a report is submitted, cannot be considered or included in any expert report.

10.0 Sources of Information for Experts: Examples

The following is only a reference, not an exhaustive list:

  • ripe.net and stat.ripe.net APIs
  • net and bgpstream.com
  • nlnog.net
  • routeviews
  • caida openBMP
  • team-cymru.com/bogon-reference.html
  • cidr report
    • potaroo.net/cgi-bin/as-report?as=<asn>
    • potaroo.net/cgi-bin/per-prefix?prefix=<prefix>
  • he.net
  • euro-ix.net/en/ixpdb/asns/
  • ripe.net
  • org

11.0 Guidelines for Experts

Cases involving Internet Exchange Points or transit providers with significant customer bases accused of hijacking should require a broader set of experts.

All non-private information disclosed by accused parties when objecting to a specific report should be included in the expert report (at least in an appendix).

Company registries (www.ebr.org and similar) can be useful in determining if different companies can be associated with the same actor. 

Special care must be given to situations where a hijacked prefix is very similar to a prefix legitimately held by an accused party. In these cases, checking to see if the legitimate prefix was announced within the same time frame may shed some light on the case. However, if it was announced in parallel, it must not be proof of an intentional hijack.

BGP leaks are outside the scope of this policy. Any case strictly related to BGP leaks should be dismissed.

12.0 Possible Objections

A report containing an expert judgement on the case will be sent to the suspected hijacker. This party will then have a maximum of four weeks to object to any conclusions included in the report. Any objections are then assessed and ruled as admissible/non-admissible by the experts, during a maximum two-week review period. Following this, the report is finalised and published.

13.0 Appeals

Following publication of the final expert report, the suspected hijacker has a maximum of two weeks in which they can file an appeal. If an appeal is filed, an alternative set of experts (a minimum of three) will review the report for a maximum of four weeks. In order to maintain a ruling of “intentional hijack”, all experts involved in the review need to agree that this has occurred. The results of this review are final and cannot be further appealed.

14.0 Ratification

Once the report has been published, any policy violation will need to be ratified by all experts involved in the case, following a two-week public consultation on the report. If ratification is not declared unanimously, the report will be archived. Ratification will be delayed in case of an appeal, until the second set of experts has published its review. Experts can refuse to ratify a report based on undisclosed information sources or input from the public consultation.

15.0 Transition Period

As soon as the policy implementation is completed, a transition period of six months will be established. This will allow organisations that announce unassigned address space or Autonomous System Numbers (due to operational errors or other non-malicious reasons) to receive only a warning.

Existing “Bogons” at the time of policy implementation should be treated as exclusions and cases where they are referenced should be dismissed before awarding a case to experts.

16.0 Holders of Legacy or Provider Independent Resources

If an accused party is a Legacy Resource Holder (either with a direct or indirect relation to the RIPE NCC), the registration of their legacy resources will not be affected, as RIPE policies are not applicable to these resources. However, if a policy violation is ratified, what is described in section 17.0 will apply, in which case other RIPE NCC services such as reverse DNS or Resource Certification (RPKI) could be denied to the accused party.

Holders of Provider Independent resources that are sponsored by an LIR that is found have committed a deliberate hijack will not have their resources de-registered and will be able to find a new sponsoring LIR (provided they were not involved). In the same way, a sponsoring LIR is not responsible if its customer is found to have committed a hijack.

17.0 Continued violations regarding Hijacking of Resources from the same party

In instances where a resource holder has regularly and repeatedly hijacked network resources, not allocated or authorised for their use, procedures defined in “Closure of Members, Deregistration of Internet Resources and Legacy Internet Resources” (currently RIPE-716) may apply. This policy does not endorse the initiation of an LIR closure procedure on the basis of a single policy violation.