In the internet, information is sent across intervening ASs as small data ‘packets’ with their destination IP addresses attached. Each router in the transited networks looks at the destination IP address in the packet and forwards it to the next and closest AS according to a ‘forwarding table’. The ‘glue’ holding the Internet together uses two forms of software ‘protocols’ – the Internet Protocol (IP) [RFC971] and the Border Gateway Protocol (BGP) [RFC 4271]…
While the paths built for any set of messages across ASNs are based on multiple economic and engineering criteria, a key requirement is to select the shortest route to its destination IP address. Critical to moving traffic across the sea of tier 1 and other ASNs are the ‘forwarding tables’ which show the next – and closest – AS router for a given packet to cross. The servers hosting the ‘Border Gateway Protocol’ (BGP) – the key Internet routing protocol – build these forwarding tables which are shared across each contributing AS. Within the BGP forwarding tables, administrators of each AS announce to their AS neighbors the IP address blocks that their AS owns, whether to be used as a destination or a convenient transit node.
Errors can occur given the complexity of configuring BGP, and these possible errors offer covert actors a number of hijack opportunities. If network AS1 mistakenly announces through its BGP that it owns an IP block that actually is owned by network AS2, traffic from a portion of the Internet destined for AS2 will actually be routed to – and through – AS1. If the erroneous announcement was
maliciously arranged, then a BGP hijack has occurred.
China Telecom diverted internet traffic in U.S. and Canada, report finds
China Telecom accused of exploiting points-of-presence to conduct internet espionage
2018 Nov 13 Google goes down after major BGP mishap routes traffic through China
2018 Nov 13 China and Russia suspected of hijacking Google internet traffic in ‘war game experiment’