Securing BGP: A Case Study (2)

In part 1 of this series, I pointed out that there are three interesting questions we can ask about BGP security. The third question I outlined there was this: What is it we can actually prove in a packet switched network? This is the first question I want dive in too—this is a deep dive, so be prepared for a long series.
This question feels like it is actually asking three different things, what we might call “subquestions,” or perhaps “supporting points.” These three questions are:
- If I send a packet to the peer I received this update from, will it actually reach the advertised destination?
- If I send this information to this destination, will it actually reach the intended recipient?
- If I send a packet to the peer I received this update from, will it pass through an adversary who is redirecting the traffic so they can observe it?
These are the things I can try to prove, or would like to know, in a packet switched network. Note that I want to intentionally focus on the data plane and then transfer these questions to the control plane (BGP). This is the crucial point to remember: If I Continue reading

VMware, Huawei & EMC make the Top 3.
So to say I was confused back then would be an understatement.