{"id":120114,"date":"2020-07-24T14:59:24","date_gmt":"2020-07-24T14:59:24","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2020\/07\/un-guide-non-technique-ou-presque-sur-les-bases-de-la-securite-des-routages\/"},"modified":"2025-11-25T13:04:20","modified_gmt":"2025-11-25T13:04:20","slug":"un-guide-non-technique-ou-presque-sur-les-bases-de-la-securite-des-routages","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/07\/un-guide-non-technique-ou-presque-sur-les-bases-de-la-securite-des-routages\/","title":{"rendered":"Un guide non technique (ou presque) sur les bases de la s\u00e9curit\u00e9 des routages"},"content":{"rendered":"\n<p>Sur le <a href=\"https:\/\/www.manrs.org\/\">site des MANRS<\/a>, nous abordons la question de la s\u00e9curit\u00e9 du routage. Nous approfondissons la probl\u00e9matique technique, recherchons les origines des fuites et des d\u00e9tournements de routes, analysons les tendances et les statistiques relatives aux r\u00e9seaux du monde entier via l&rsquo;observatoire des MANRS et, de mani\u00e8re g\u00e9n\u00e9rale, nous nous int\u00e9ressons aux moyens d&rsquo;am\u00e9liorer le syst\u00e8me de routage qui sous-tend l&rsquo;Internet. La semaine derni\u00e8re, nous avons pris un peu de recul et publi\u00e9 une s\u00e9rie d&rsquo;articles concernant les <a href=\"https:\/\/www.manrs.org\/tag\/basics\/\">bases de la s\u00e9curit\u00e9 du routage<\/a>.<\/p>\n\n<p>Cette s\u00e9rie en 5 parties couvre les sujets suivants :<\/p>\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.manrs.org\/2020\/07\/what-is-routing\/\">Qu&rsquo;est-ce que le routage ?<\/a><\/li><li><a href=\"https:\/\/www.manrs.org\/2020\/07\/how-does-routing-work\/\">Comment fonctionne le routage ?<\/a><\/li><li><a href=\"https:\/\/www.manrs.org\/2020\/07\/whats-wrong-with-routing\/\">Quels sont les probl\u00e8mes li\u00e9s au routage ?<\/a><\/li><li><a href=\"https:\/\/www.manrs.org\/2020\/07\/what-are-routing-incidents\">Que sont les incidents de routage ?<\/a><\/li><li><a href=\"https:\/\/www.manrs.org\/2020\/07\/what-are-the-manrs-actions\">En quoi consistent les actions des MANRS ?<\/a><\/li><\/ul>\n<p>Bien qu&rsquo;il soit difficile d&rsquo;expliquer la s\u00e9curit\u00e9 du routage sans pr\u00e9sumer de certaines connaissances de base, notre intention est que ces articles soient aussi peu techniques que possible pour aider les non-experts \u00e0 comprendre ce sujet parfois compliqu\u00e9.<\/p>\n\n<p>Tout a commenc\u00e9 par un <a href=\"https:\/\/twitter.com\/RoutingMANRS\/status\/1281583056051150848\">fil de discussion sur Twitter<\/a> un vendredi apr\u00e8s-midi, qui \u00e9tablissait une comparaison entre la s\u00e9curit\u00e9 du routage et les rencontres en ligne Nous avons ensuite d\u00e9velopp\u00e9 cette analogie amusante dans une s\u00e9rie d&rsquo;articles de blog. Suivez Juan, Maria et le m\u00e9chant Chad qui nous expliquent les types d&rsquo;incidents de routage qui se produisent et comment des actions simples et concr\u00e8tes des MANRS peuvent aider.<\/p>\n\n<p>Nous esp\u00e9rons que vous lirez les articles sur les bases de la s\u00e9curit\u00e9 du routage. Si vous exploitez un r\u00e9seau chez un fournisseur d&rsquo;acc\u00e8s Internet, un fournisseur de services IXP ou un fournisseur CDN\/Cloud, nous vous invitons \u00e0 mettre en \u0153uvre les actions des MANRS et \u00e0 <a href=\"https:\/\/www.manrs.org\/join\/\">rejoindre la communaut\u00e9 MANRS<\/a>.<\/p>\n\n<hr class=\"wp-block-separator\"\/>\n\n<p><em>Image d&rsquo;Alexander Sinn <a href=\"https:\/\/unsplash.com\/photos\/KgLtFCgfC28\">via Unsplash<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sur le site des MANRS, nous abordons la question de la s\u00e9curit\u00e9 du routage. Nous approfondissons la probl\u00e9matique technique, recherchons les origines des fuites et des d\u00e9tournements de routes, analysons les tendances et les statistiques relatives aux r\u00e9seaux du monde entier via l&rsquo;observatoire des MANRS et, de mani\u00e8re g\u00e9n\u00e9rale, nous nous int\u00e9ressons aux moyens d&rsquo;am\u00e9liorer [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":118827,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6187,2545,4909,4775,146],"tags":[6250,6283],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4040,4083],"class_list":["post-120114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comment-fonctionne-internet","category-manrs-fr","category-renforcer-internet","category-securite-fr","category-deploy360-fr","tag-les-normes-pour-la-securisation-du-routage-mutuellement-agreees-manrs","tag-securite-du-routage","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",1280,660,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-450x232.jpg",450,232,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-768x396.jpg",768,396,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-1024x528.jpg",1024,528,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",1280,660,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",1280,660,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-250x129.jpg",250,129,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",300,155,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",400,206,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/manrs-basics-online-dating.jpg",600,309,false]},"uagb_author_info":{"display_name":"April Froncek","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/froncek\/"},"uagb_comment_info":0,"uagb_excerpt":"Sur le site des MANRS, nous abordons la question de la s\u00e9curit\u00e9 du routage. Nous approfondissons la probl\u00e9matique technique, recherchons les origines des fuites et des d\u00e9tournements de routes, analysons les tendances et les statistiques relatives aux r\u00e9seaux du monde entier via l&rsquo;observatoire des MANRS et, de mani\u00e8re g\u00e9n\u00e9rale, nous nous int\u00e9ressons aux moyens d&rsquo;am\u00e9liorer\u2026","authors":[{"term_id":4040,"user_id":15,"is_guest":0,"slug":"froncek","display_name":"April Froncek","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/120114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=120114"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/120114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/118827"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=120114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=120114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=120114"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=120114"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=120114"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=120114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}