The Indosat BGP Route Leak (2014)

On April 2, 2014, the Indonesian telecommunications provider Indosat (AS4761) leaked approximately 417,000 BGP routes to its external peers. For roughly two hours, Indosat's network advertised more-specific prefixes for a vast swath of the internet's address space, causing routers worldwide to redirect traffic through its infrastructure in Jakarta. It was one of the largest route leaks in history by raw prefix count, and it laid bare a category of risk that the routing community had been warning about for years: the uncontrolled use of BGP route optimizers.

What Happened

Indosat used a commercial product called Noction Intelligent Routing Platform (IRP), a BGP optimizer designed to improve outbound traffic engineering. BGP optimizers work by taking the routes a network learns from its upstream transit providers, splitting them into more-specific prefixes (e.g., breaking a /16 into two /17s), and re-injecting those more-specific routes into the network's internal BGP (iBGP) to steer traffic toward the best-performing upstream link.

This is a legitimate technique when used correctly. The critical requirement is that these optimized, more-specific routes must never leak to external peers. They are internal traffic engineering artifacts, not routes that should be announced to the rest of the internet. Indosat's configuration failed to enforce this boundary.

On April 2, the internal routes generated by the Noction optimizer were exported to Indosat's external eBGP sessions. In an instant, Indosat began announcing approximately 417,000 prefixes to its upstream providers and peers. These were more-specific versions of routes from across the global routing table, covering networks on every continent.

Normal Operation vs. The Leak Normal: Optimizer routes stay internal Indosat (AS4761) Noction Optimizer routes stay in iBGP Upstream A Upstream B Customers Leak: Optimizer routes sent externally Indosat (AS4761) Noction Optimizer routes leak to eBGP! Upstream A Upstream B 417k 417k Global Internet Global Internet Customers Routes learned (normal) 417,000 leaked routes Propagation to global internet

Why More-Specific Routes Are So Dangerous

The internet's routing system follows a simple rule: the most specific prefix always wins. This is the longest prefix match rule, and it is fundamental to how BGP forwarding decisions work.

Suppose a legitimate network announces 203.0.113.0/16 via BGP. If another network announces 203.0.113.0/17 and 203.0.113.128/17, those two /17 routes are more specific than the /16. Every router on the internet will prefer the /17s over the /16, because they are a more precise match for the destination address. The original /16 announcement becomes effectively invisible for all traffic covered by the more-specific routes.

This is exactly what Indosat's optimizer did. It took large prefixes learned from transit providers and split them into smaller, more-specific chunks for internal traffic engineering. When those more-specific routes leaked externally, they overrode the original, legitimate announcements. Routers worldwide began forwarding traffic toward Indosat as if it were the best path to those destinations.

The Scale of the Leak

To appreciate the magnitude: in April 2014, the global BGP routing table contained approximately 500,000 IPv4 prefixes. Indosat leaked roughly 417,000 additional more-specific routes. This means the leak generated an announcement volume equivalent to about 83% of the entire global routing table.

The leaked prefixes covered networks belonging to organizations across the world. Traffic destined for major providers in North America, Europe, and Asia was suddenly being pulled toward a single Indonesian ISP's infrastructure. Indosat's network was not designed to handle this volume of global transit traffic, so the result was severe congestion, packet loss, and unreachability for affected destinations.

Scale of the Leak vs. Global Routing Table Global routing table: ~500,000 prefixes Before Indosat leak: ~417,000 prefixes Leak 83% of table ~2 hours Duration of leak 417,000 prefixes More-specific routes leaked Global impact All continents affected

The Role of Noction IRP

Noction Intelligent Routing Platform is a commercially available BGP optimizer used by ISPs and enterprises worldwide. Its purpose is straightforward: monitor the performance of routes learned from multiple upstream providers and shift outbound traffic to the best-performing path. It does this by injecting more-specific routes into the network's iBGP, causing the router to prefer the optimized path over the default.

The Noction product itself was not inherently flawed. The problem was operational: Indosat's configuration failed to prevent these internally generated routes from being redistributed to eBGP sessions. Proper deployment of a BGP optimizer requires strict route filtering: all routes tagged or generated by the optimizer must be blocked from export to any external peer. This is typically enforced through a combination of:

Indosat either lacked these safeguards or had a misconfiguration that bypassed them. The result was that the optimizer's internal routes were treated as valid external announcements.

How the Leak Propagated

When Indosat's routers began sending 417,000 more-specific routes to their upstream transit providers and peers, those providers had to decide whether to accept or reject them. In an ideal world, every upstream provider would have had strict prefix limits configured on their BGP sessions with Indosat. A prefix limit is a safeguard that automatically tears down a BGP session if a peer sends more routes than expected. If Indosat normally announced a few hundred prefixes and suddenly sent 417,000, a properly configured prefix limit would have shut the session down within seconds.

But in 2014 (and to a lesser extent, still today), many transit providers did not enforce strict prefix limits on their customer sessions. Indosat's upstream providers accepted the flood of routes and propagated them further. From there, the routes spread through the global routing mesh like a chain reaction. Each transit provider that accepted the routes forwarded them to its own peers and customers, and within minutes the leaked routes were visible across much of the internet.

Propagation of the Leaked Routes T+0 T+1 min T+5 min T+2 hours Indosat AS4761 Transit Provider 1 Transit Provider 2 Tier 1 peers IXP peers Regional ISPs Mitigated Routes withdrawn Traffic from worldwide networks funneled through AS4761 North America Europe Asia-Pacific Other regions

The Impact

The effects were felt across multiple dimensions:

Traffic Black-Holing

Indosat's infrastructure was designed to serve its Indonesian customer base, not to transit traffic for the entire internet. When routers worldwide began forwarding traffic through AS4761, the network's international links became saturated almost immediately. Packets arrived at Indosat's border routers but could not be forwarded to their actual destinations quickly enough, resulting in massive packet loss. For many affected prefixes, the practical effect was a black hole: traffic entered but never emerged.

Latency and Path Inflation

Even for traffic that did successfully transit through Indosat, the paths were absurdly suboptimal. Traffic between two networks in Europe might be routed from Europe to Indonesia and back again. The added latency of these circuitous paths broke time-sensitive applications and degraded user experience for anything that did manage to get through.

Cascading Congestion

The sudden redirection of massive traffic volumes did not just affect Indosat's network. The transit providers carrying traffic to and from Indosat also experienced elevated load on their links to Indonesia. Submarine cables and international interconnection points serving Southeast Asia saw unexpected traffic spikes, causing collateral congestion for uninvolved networks sharing those links.

Detection and Response

The leak was detected by BGP monitoring systems operated by organizations like RIPE RIS and BGPStream, as well as by network operators who noticed sudden route changes for their prefixes. The pattern was unmistakable: hundreds of thousands of new more-specific routes all appearing simultaneously from a single origin, AS4761.

Once identified, the response followed the standard incident procedure for route leaks:

  1. Identification — Monitoring systems flagged the anomalous route announcements from AS4761
  2. Contact — Network operators and the routing community reached out to Indosat's NOC (Network Operations Center) through operational mailing lists and direct communication channels
  3. Mitigation at the source — Indosat corrected the misconfiguration and withdrew the leaked routes
  4. BGP convergence — After the withdrawals were issued, routers worldwide gradually reconverged on the legitimate routes. Full convergence took additional time as withdrawals propagated across the global mesh

The total duration of the incident was approximately two hours from the initial leak to full withdrawal. However, due to BGP convergence delays, some networks continued to see the leaked routes for some time after Indosat issued the withdrawals.

Why Upstream Providers Did Not Stop It

A recurring question in the aftermath was: why did Indosat's upstream providers accept 417,000 routes from a customer that normally announced a few hundred? The answer reveals a systemic weakness in how BGP sessions are configured in practice.

The tools to prevent this existed in 2014 and exist today:

The fundamental problem was that the internet's routing system operated largely on trust. Transit providers accepted whatever their customers announced, and the assumption was that customers would not send garbage. Indosat did not send garbage intentionally, but the effect was the same.

The BGP Optimizer Problem

The Indosat incident brought renewed attention to the risks of BGP optimizers. These tools are widely used in the industry. Their value proposition is real: for a multi-homed network buying transit from several providers, a BGP optimizer can measurably improve outbound performance by shifting traffic to the best-performing path in real time.

But the architectural pattern they rely on, injecting more-specific routes into the routing table, creates an inherent risk. If those routes leak, the consequences are catastrophic precisely because more-specific routes override everything else. The optimizer is, in effect, manufacturing a loaded weapon that must never be pointed outside the network.

The Indosat leak was not the first optimizer-related incident, nor would it be the last. The pattern recurs because:

Lessons and Defenses

The Indosat leak reinforced several critical lessons for the internet routing community:

1. Prefix Limits Are Essential

Every eBGP session should have a maximum prefix limit configured. If a customer normally announces 200 prefixes, a limit of 300 or 500 would catch a leak of 417,000 routes instantly. This is the single most effective defense against route leaks and is trivial to implement on any router platform. Transit providers that do not enforce prefix limits are implicitly accepting the risk that their customers will one day flood them with garbage routes.

2. Defense in Depth for Route Filtering

No single filtering mechanism is sufficient. Best practice is to layer multiple defenses:

3. BGP Optimizers Need Strict Containment

Any network using a BGP optimizer must ensure that optimizer-generated routes are tagged with a well-known community and that all eBGP export policies explicitly deny routes carrying that community. This filtering must be tested, audited, and verified regularly. A configuration drift or a software upgrade that resets policies can release the routes.

4. RPKI Adoption Is Critical

In 2014, RPKI was too nascent to help. Today, with over 40% of global prefixes covered by ROAs and major networks performing Route Origin Validation, a similar leak would have a somewhat reduced impact. Networks performing ROV would reject leaked routes where the origin AS (AS4761) does not match the ROA for the prefix. However, RPKI alone is not a complete solution. It validates the origin AS but does not prevent route leaks where the AS path is plausible. Emerging standards like ASPA (Autonomous System Provider Authorization) aim to close this gap by allowing ASes to declare their authorized upstream providers, enabling detection of unauthorized route propagation.

5. Monitoring and Rapid Response

BGP monitoring services like RIPE RIS, BGPStream, and commercial platforms provide near-real-time visibility into routing changes. Networks should monitor their own prefixes for unauthorized announcements and have runbooks for responding to hijacks and leaks. The two-hour duration of the Indosat leak, while disruptive, was relatively short because monitoring systems detected it quickly and the community mobilized a response.

Defense Layers Against Route Leaks Layer 1: Prefix Limits Auto-teardown session if limit exceeded Layer 2: IRR-based Prefix Filters Only accept registered prefixes Layer 3: RPKI ROV Cryptographic origin validation Layer 4: AS Path Filters Reject unexpected origins Layer 5: Community Tagging Block internal routes

The Indosat Leak in Context

The Indosat incident is one of several major BGP routing incidents that have shaped how the internet community thinks about routing security. While BGP hijacks like the 2008 Pakistan-YouTube incident involve announcing prefixes owned by someone else, route leaks like Indosat's involve propagating legitimate routes in unauthorized directions. The distinction matters technically, but the impact is similar: traffic ends up where it should not be.

Other notable route leak incidents include:

The recurrence of these events demonstrates that route leaks are not edge cases but a structural vulnerability in the internet's routing architecture. As long as BGP operates on trust and filtering is optional, leaks will continue to happen. The trend toward mandatory RPKI validation, tighter prefix limits, and emerging standards like ASPA offers hope, but the transition is slow and adoption remains uneven.

Indosat Today

Indosat (now Indosat Ooredoo Hutchison after a 2022 merger) continues to operate as one of Indonesia's largest telecommunications providers under AS4761. The company tightened its BGP export policies following the 2014 incident and, like most major carriers, has improved its routing hygiene over the past decade. You can look up Indosat's current BGP presence and see its announced prefixes, upstream providers, and peers.

Explore the Routing Data

Use the looking glass to examine the networks involved in this incident and see real-time BGP routing data:

Understanding how route leaks happen is essential for anyone operating a network. Explore the BGP fundamentals, learn about RPKI and how it helps prevent these incidents, and look up any autonomous system to see its routing posture today.

See BGP routing data in real time

Open Looking Glass
More Articles
The Pakistan YouTube BGP Hijack (2008)
The Facebook DNS Outage (October 2021)
The Cloudflare-Verizon BGP Leak (2019)
The AWS S3 Outage (February 2017)
The Dyn DNS DDoS Attack and Mirai Botnet (2016)
The CenturyLink/Level3 Flowspec Outage (2020)