BGP security and confirmation biases
On February 1, 2022, a configuration error on one of Cloudflare's routers caused a route leak of up to 2,000 Internet prefixes to an Internet transit provider. The leak lasted for 32 seconds and later 7 seconds but did not impact Cloudflare's network or customers. The company apologized for the mistake. The error occurred during a scheduled migration of one of their existing Internet transit links in Newark to a link with more capacity. Due to an oversight, no BGP filters were added to only export prefixes of Cloudflare and its customers. As a result, all known prefixes were sent to the ISP router, which shut down the session as the number of prefixes exceeded the maximum limit configured. The company has since introduced an implicit reject policy for BGP sessions to prevent such incidents in the future. They also emphasized the importance of protocols like RPKI and network automation to reduce the impact of route leaks, whether intentional or accidental.
Company
Cloudflare
Date published
Feb. 23, 2022
Author(s)
Maximilian Wilhelm
Word count
1579
Hacker News points
6
Language
English