Comcast BGP Route Leak 2017: How a Filtering Failure Hijacked Traffic

On November 6, 2017, Comcast (AS7922) -- the largest residential internet service provider in the United States -- leaked a large number of BGP routes to its peers, briefly hijacking traffic destined for other networks. The leak lasted approximately 90 minutes and affected routes to major content providers, CDNs, and other networks. While the incident did not cause a total internet outage, it misdirected traffic through Comcast's network for destinations that Comcast had no authority to advertise, demonstrating once again how the internet's routing system remains vulnerable to route leaks from even the largest and most established networks.

The Comcast route leak of 2017 is significant not because of its duration or severity -- it was relatively short-lived compared to incidents like the Cloudflare-Verizon leak of 2019 -- but because it came from a Tier 1-adjacent network with tens of millions of customers, and it illustrated how a single filtering failure at a major ISP can propagate incorrect routing information across the global internet within seconds.

Background: Comcast's Network

Comcast (AS7922) operates one of the largest networks in North America. As of 2017, Comcast served over 25 million broadband subscribers and carried a substantial portion of US internet traffic. Comcast's network is a Tier 1-adjacent or "Tier 2" network, meaning it has extensive peering relationships with other large networks and purchases some transit, but also operates as a transit provider for smaller networks.

Comcast maintains BGP peering sessions with hundreds of networks at major Internet Exchange Points across the US and internationally. These peering sessions are governed by route policies: filters that control which prefixes Comcast announces to each peer and which prefixes it accepts from each peer. When these filters fail or are misconfigured, the results can be dramatic.

What Happened: The Route Leak

On November 6, 2017, Comcast's BGP routers began announcing routes for prefixes that did not belong to Comcast or its downstream customers. These announcements were propagated through Comcast's peering sessions to adjacent networks, which in turn propagated them further. The leaked routes included prefixes belonging to major internet properties and infrastructure providers.

Comcast BGP Route Leak -- November 6, 2017 Origin Networks legitimate prefix holders normal BGP Comcast learns routes via transit/peers Filter Failure Comcast re-announces routes it should not be advertising Peer A accepts leaked routes Peer B accepts leaked routes Peer C accepts leaked routes Global Routing Table traffic misdirected through Comcast Impact of the Leak Traffic misdirection packets routed through AS7922 instead of direct path Performance degradation suboptimal paths add latency and potential packet loss Security concerns traffic through unintended network enables interception

Mechanics of a Route Leak

To understand the Comcast incident, it helps to understand the mechanics of a BGP route leak in the context of a large ISP.

Comcast, like all large networks, learns routes from multiple sources:

A route leak occurs when a network re-announces routes that it should not. In Comcast's case, routes learned from peers or transit providers were re-announced to other peers, effectively telling those peers "send traffic for these destinations through Comcast." The peers, seeing Comcast in the AS path and having no reason to distrust a major ISP, accepted the routes and forwarded them to the global routing table.

How the Leak Was Detected

The Comcast route leak was detected within minutes by multiple monitoring systems and network operators:

The detection was rapid, but the remediation depended on Comcast's internal response. External operators could not fix the leak; they could only observe it and, in some cases, apply defensive filtering to prefer alternative paths that did not transit through Comcast.

Impact Analysis

The impact of the Comcast route leak was moderated by several factors:

Why It Was Not Worse

Why It Still Mattered

Root Cause: Route Policy Configuration Error

While Comcast did not publish a detailed root cause analysis, the pattern of the leak -- routes learned from peers being re-announced to other peers -- points to a failure in Comcast's BGP export policies. These policies are implemented as route maps, prefix lists, and community-based filters on Comcast's border routers.

In a properly configured network, BGP export policies enforce the following rules:

To Customers:     Announce all routes (full table or default + customer routes)
To Peers:         Announce only customer routes and own prefixes
To Transit:       Announce only customer routes and own prefixes

NEVER:            Re-announce peer routes to other peers (route leak)
NEVER:            Re-announce transit routes to peers (free transit)
NEVER:            Re-announce transit routes to other transit providers (loop)

The most common causes of route leaks at large ISPs include:

What Should Have Prevented It

Multiple layers of defense should have prevented this leak from occurring or limited its impact:

At Comcast (the leaker)

At Comcast's Peers (the receivers)

The Broader Problem: BGP Without Authentication

BGP was designed in the 1980s as a protocol between trusted network operators. It has no built-in mechanism for verifying that a network is authorized to announce a given prefix. When AS7922 announces a route to a prefix, the receiving network has no cryptographic proof that Comcast has authorization to originate or transit that prefix. It simply trusts that Comcast's export policy is correct.

This fundamental lack of authentication is what makes route leaks possible. Solutions exist but adoption remains incomplete:

Comcast's Response and Industry Impact

Following the incident, Comcast corrected its route policies and the leaked routes were withdrawn. The relatively fast resolution (approximately 90 minutes from leak to correction) suggests that Comcast's NOC identified the issue quickly, likely through their own monitoring or through reports from affected peers.

The incident contributed to the broader industry push for routing security improvements:

A Pattern That Keeps Repeating

The Comcast route leak of 2017 is one incident in a long history of BGP leaks from major networks. The fundamental problem -- that BGP trusts every announcement from every peer -- remains unsolved despite decades of work on routing security. Until RPKI, ASPA, and other validation mechanisms achieve near-universal deployment, route leaks from large networks will continue to occur and continue to misdirect traffic on the global internet.

Each incident underscores the same lesson: the internet's routing system is only as secure as the weakest link in the chain of networks that propagate routes. A single misconfigured router at a major ISP can inject incorrect routing information that propagates globally within seconds, affecting traffic flows for millions of users.

Explore BGP Routes

You can examine Comcast's AS7922 and its current route announcements, see the AS paths that connect it to the rest of the internet, and explore the peering relationships between major networks. Use the god.ad BGP Looking Glass to look up any autonomous system, IP address, or prefix and trace how traffic is routed across the internet today.

See BGP routing data in real time

Open Looking Glass
More Articles
Azure DNS Outage 2023: How a Misconfigured Deployment Took Down Microsoft Services
Optus BGP Outage 2023: How a Routing Change Took Down an Entire National Carrier
What is BGP? The Internet's Routing Protocol Explained
What is an Autonomous System (AS)?
What is a BGP Looking Glass?
How to Look Up an IP Address's BGP Route