CONCEPT Cited by 1 source
Route leak¶
A route leak is a BGP advertisement propagated beyond its intended scope — formally defined in RFC 7908 as "the propagation of routing announcement(s) beyond their intended scope."
What "intended scope" means¶
Intended scope is set by pairwise business relationships between ASes:
- In a customer→ provider relationship, the customer should advertise only its own routes and routes of its own customers.
- In a peer↔peer relationship, each peer should advertise only its own routes and routes of its own customers.
A route leak violates one of these rules. Traffic still typically reaches its destination, but the path is unintended — often longer, slower, and saturating a network that wasn't sized for the carried transit volume.
Wrong-exit-off-highway analogy¶
Per the Cloudflare post: "BGP route leaks cause behavior similar to taking the wrong exit off of a highway. While you may still make it to your destination, the path may be slower and come with delays you wouldn't otherwise have traveling on a more direct route."
Types in RFC 7908¶
RFC 7908 enumerates six types. The canonical example and the one Cloudflare dissects is:
- Type 1 — Hairpin leak between two providers by a customer. An AS takes routes from one of its providers and re-advertises them to its other provider, forming a "valley" in the AS path (customer → provider → ... → provider).
Usually accidental, sometimes attack¶
Most route leaks are the result of loose export policies that over-advertise routes learned from indirect sources. Cloudflare's 01-02 Venezuela event argument names the specific hygiene failure: an IRR-derived prefix list that matches the customer cone by prefix set but does not additionally require a customer BGP community tag — so routes that are in the prefix set but were learned indirectly via a provider slip through.
Leaks can also be malicious (traffic interception, MITM) but several forensic signals typically distinguish the two — see the alternative-explanation forensics pattern.
Mitigation¶
- ROV doesn't help — Route Origin Validation only checks the originator of a prefix; route leaks have a legitimate originator and only the path is wrong.
- ASPA (Autonomous System Provider Authorization) provides path validation — each AS publishes its authorized upstreams, and path validators can reject leak-shape paths.
- RFC 9234 OTC adds BGP roles
- an Only-To-Customer attribute enforced at session setup.
- Peerlock / Peerlock-lite — simpler operator-side filters (e.g. "reject customer-learned routes containing a Tier-1 ASN in the path").
Seen in¶
- sources/2026-01-08-cloudflare-a-closer-look-at-a-bgp-anomaly-in-venezuela — 11 Type-1 hairpin leaks by AS8048 in a month; the 01-02 event leaks AS21980's prefixes from AS6762 to AS52320; RFC 7908 definition and diagrams taught directly.