LOL at dumbass Ocasio-Cortez picking a fight with Jeff Bezos before she even gets sworn in
All "muh collective bargaining"
She'll be at Amazon HQ wearing a Che Guevara shirt in no time
Good luck with that, Bezos
LOL at dumbass Ocasio-Cortez picking a fight with Jeff Bezos before she even gets sworn in
All "muh collective bargaining"
She'll be at Amazon HQ wearing a Che Guevara shirt in no time
Good luck with that, Bezos
So nothing came of this, I suppose.
Another anon tracked down the locations of the coordinates in some of the posts:
3rd down is Washington, DC
(38.9072 n, 77.0369 W)
4th down is Portland, Oregon
(45.5122 N, 122.6587)
5th down is Albany, NY
(42.6526 N, 73.7562)
Press F for Google's growing gigantic butthurt today
The more I see, the more fucked they look
Mah sides, Nigeria is involved, baaahaha
(long-ass article, can't copypasta it all)
https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/
Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users and also caused problems for Spotify and other Google cloud customers. While Google said it had no reason to believe the mishap was a malicious hijacking attempt, the leak appeared suspicious to many, in part because it misdirected traffic to China Telecom, the Chinese government-owned provider that was recently caught improperly routing traffic belonging to a raft of Western carriers though mainland China.
Further Reading
Strange snafu misroutes domestic US Internet traffic through China Telecom
The leak started at 21:13 UTC when MainOne Cable Company, a small ISP in Lagos, Nigeria, suddenly updated tables in the Internet’s global routing system to improperly declare that its autonomous system 37282 was the proper path to reach 212 IP prefixes belonging to Google. Within minutes, China Telecom improperly accepted the route and announced it worldwide. The move by China Telecom, aka aka AS4809, in turn caused Russia-based Transtelecom, aka AS20485, and other large service providers to also follow the route.
The redirections, BGPmon said on Twitter came in five distinct waves over a 74-minute period. The redirected IP ranges transmitted some of Google's most sensitive communications, including the company's corporate WAN infrastructure and the Google VPN. This graphic from regional Internet registry RIPE NCC shows how the domino effect played out over a two-hour span. The image below shows an abbreviated version of those events.
BGPmon said MainOne made a second announcement on Monday that caused traffic sent to Cloudflare-owned IP addresses to follow an almost identical roundabout path. As was the case with the Google IP addresses, China Telecom improperly accepted the Cloudflare route and announced it to its peers. Transtelecom accepted the route and other large service providers soon followed, causing the route to propagate worldwide. This BGPlay graphic shows it playing out. Below is a snapshot:
The misdirection of the Cloudflare-owned IP addresses added to the suspicions of foul play, even as company CEO Matthew Prince told Ars that Monday’s routing event “was almost certainly an error,” rather than a deliberate move intended to hijack potentially sensitive Internet traffic. In an email, Prince explained:
Some circumstantial background to back that up: there was a large network meeting in Nigeria a couple weeks ago (NgNOG). Those meetings always spur more peering—interconnecting networks that previously weren’t directly connected. While setting up a new interconnection, the Nigerian ISP almost certainly inadvertently leaked the routing information to China Telecom who then leaked it out to the rest of the world. If there was something nefarious afoot there would have been a lot more direct, and potentially less disruptive/detectable, ways to reroute traffic. This was a big, ugly screw up. Intentional route leaks we’ve seen to do things like steal cryptocurrency are typically far more targeted.
The impact on us was minimal. Cloudflare’s systems automatically noticed the leak and changed our routing to mitigate the effects.
Why Google and Cloudflare? Because we’re both present in Nigeria’s Internet Exchange and, I believe, peered with this ISP. Most other large providers aren’t yet in Nigeria. We only turned up our presence there a few weeks ago. I believe Google has been there for a while. Martin Levy, from our team and cc:ed here, was at NgNOG and can add more color and correct anything I’ve gotten wrong.
Long term, the solution is for us to make BGP more robust. We’ve started this with our efforts around RPKI:
https://blog.cloudflare.com/rpki/
If we, as a community, can drive more routes to be cryptographically signed and verified we can then begin to reject routes that are improperly announced. The merely trust-based BGP routing infrastructure remains one of the last remaining core bugs of the Internet and today we saw it rear its ugly head. High time we fix it.
Chatter from couple of plebbitors:
"Google goes down after major BGP mishap routes traffic through China // Google Is F*cked. All of their Traffic went thru China For a Long Enough Period of Time for China to Acquire Very Sensitive Administrative Data. Tick Tock, Better Change Your Passwords!"
"They are cyberfucked
it seems someone figured out how its all tied together and hacked cloudflare somehow
now they are PR-ing it so they don't start an international incident….but china has all the keys now
we think this is white hats, but it's probably hillary, schmidt and bezos
this timeline's legion of doom"
(end of previously sauced article from Arstechnica)
Readers are reminded that the border gateway protocol that routes Internet traffic from autonomous system to autonomous system around the globe is as fragile as it is intricate. While its foundation of trust was never designed to withstand the hostile actors that so often populate today’s Internet, the intricacies of BGP are enough to make major blunders a fact of life. While it’s too early to declare this routing mishap an accident, indications at this point aren’t supporting the suspicions this was a deliberate hijacking.
Either way, the event and its ability to go undetected until end users began to report dropped traffic underscores the continued inability of major providers to address the performance and security limitations of BGP.
"Through a small Nigerian ISP, Google's prefixes were leaked to worldwide Tier 1 carriers, bringing traffic to a halt," Kris Slevens, a technical account engineer specializing in network security at Continuous Networks, told Ars. "This still shows that China Telecom hasn't reined in their infrastructure for any type of filtering, and how inherently fragile BGP is being based on trust. Also with a paper coming out last week about [China Telecom's] past with traffic rerouting, this isn't new. And more important, peering exchanges need stricter prefix limits or filtering. That is highly overlooked."
Quick review of news re Matthew Whitaker
Top ranking Democrats and MSM all want him to recuse
They also want every Republican in office, all the way down through every level of the ranks to poor Hilda, a dishwasher in the White House kitchen, to recuse from everything in the universe
No point trying to appease Democrats because they are all sociopaths
Nothing is ever going to make them happy
If we had an entirely Democrat tyranny, with not one other party representative in office, they would still find things to bitch about
Liberalism is a mental illness.