Rabbit Hole
ExploreSurprise MeSubscribe
Rabbit Hole

Curated knowledge journeys through the most fascinating topics on the internet.

Navigate

ExploreSurprise MeSubscribe

Topics

HistorySciencePsychology

© 2026 Rabbit Hole

The Internet Almost Died in 1997

Technology4 Mar 2026/8 min read

The Internet Almost Died in 1997

AsinglemisconfiguredrouteratasmallISPinFloridasentabadroutingtablethatcascadedacrosstheentireinternet,takingdownmostofitforhours.ARPANETwasdesignedtosurvivenuclearwar—itcouldn'tsurvivehumanerror.

Choose your depth

The Internet Runs on Trust

To understand how the internet almost died in 1997, you need to understand one thing: the internet has no central authority deciding where data goes. There is no master switchboard operator. Instead, tens of thousands of independent networks — called Autonomous Systems — cooperate by telling each other what they can reach.

The protocol they use for this conversation is called BGP, the Border Gateway Protocol. Created in 1989, BGP is sometimes described as the "postal service of the internet." Each network announces: "I can deliver mail to these addresses." Neighbouring networks note this and pass it along: "Our neighbour says they can reach those addresses, so we can too."

BGP was designed in an era when every network operator knew every other network operator by name. It was built on handshake trust between a small community of engineers. Then the internet grew to billions of users, and nobody changed the locks.

There is no verification. No authentication. No cryptographic proof that a network actually can reach the destinations it claims. If a router announces that it's the best path to Google, other routers will believe it and start sending Google-bound traffic that way.

April 25, 1997: The Day the Internet Believed a Lie

MAI Network Services operated as AS7007 — just one of thousands of Autonomous Systems on the internet. On that April morning, a technician made a configuration error that caused their router to do something catastrophic: it absorbed the entire global routing table — every known route on the internet — and re-announced all of them as if MAI was the origin.

In BGP terms, MAI's router told the world: "I am the shortest path to every single destination on the internet."

The internet believed it.

PROPAGATION

The bad routes spread across the global internet in under ten minutes. By the time anyone realised what was happening, routing tables worldwide had been corrupted.

Traffic from across North America and Europe began funnelling toward MAI's network in Florida. Their routers, designed to handle the traffic of a mid-tier ISP, were suddenly expected to process a significant fraction of all internet traffic. They collapsed almost instantly.

But the cascading failure was worse than a simple overload. Because routers everywhere had updated their tables to point through MAI, even after MAI's network went dark, the corrupted routes persisted. Traffic aimed at legitimate destinations was being sent into a black hole. Routers began "flapping" — rapidly switching between the bad routes and attempts to find alternatives — which consumed processing power and caused even more routers to fail.

The Fix (And Why It Took So Long)

The engineers who noticed the problem couldn't simply "undo" the bad routes from a central location. There is no central location. Each of the thousands of affected networks had to independently recognise the bad routes and filter them out.

In practice, this meant humans at ISPs around the world had to manually intervene — identifying MAI's bogus announcements, filtering them, and waiting for the corrected routing tables to propagate. The process took roughly two hours for most of the internet to recover, though some networks experienced disruptions for much longer.

The 1997 outage exposed a truth the internet's designers had never fully confronted: the network built to survive nuclear war was vulnerable to a single point of human error because its routing protocol had no concept of lying.

It Keeps Happening

The AS7007 incident was a wake-up call. But decades later, BGP remains largely trust-based. Notable repeat incidents include:

  • 2008: Pakistan Telecom tried to block YouTube domestically by announcing a more specific route for YouTube's IP space. The announcement leaked to the global internet, redirecting YouTube traffic worldwide into a black hole. YouTube was down globally for about two hours.
  • 2017: A Russian AS accidentally hijacked routes for Google, Apple, Facebook, and Microsoft, rerouting their traffic through Russia for several minutes.
  • 2018: A Nigerian ISP's misconfiguration caused Google traffic to be routed through China and Russia for over an hour.

Solutions exist — a framework called RPKI (Resource Public Key Infrastructure) allows networks to cryptographically verify route announcements. But adoption has been slow. As of the mid-2020s, a substantial portion of the internet's routes remain unprotected by RPKI.

The internet's greatest vulnerability isn't sophisticated hackers. It's a technician having a bad morning.

Stops along the way
1
Stop 1 of 4

BGP and the internet's trust problem

BGP and the internet's trust problem

cloudflare.com

Cloudflare's deep dive into how BGP works, why it's dangerously trusting, and what happens when that trust is abused.

Now watch what happened when the trust broke in real time.

2
Stop 2 of 4

The AS7007 incident

The AS7007 incident

en.wikipedia.org

The technical postmortem of the 1997 outage — how one router's bad announcement propagated across the entire global routing system in under ten minutes.

Pakistan tried the same thing — on purpose — eleven years later.

3
Stop 3 of 4

Pakistan accidentally deletes YouTube

In 2008, Pakistan tried to block YouTube domestically. Instead, they accidentally took it down worldwide. The exact same BGP vulnerability, exploited by censorship.

And the fix? It's been available for years. Almost nobody uses it.

4
Stop 4 of 4

RPKI — the fix nobody deploys

RPKI — the fix nobody deploys

en.wikipedia.org

The cryptographic solution to BGP hijacking exists and works. But getting tens of thousands of independent networks to adopt it is a coordination problem that may never be fully solved.

Deep complete

You explored the Deep path across 4 stops

Go to the Core

What you now know

  • BGP — the protocol that routes all internet traffic — was designed in 1989 for a small community of trusted operators and has no built-in verification
  • The AS7007 incident in 1997 caused a small ISP to accidentally claim ownership of every route on the internet, creating a cascading failure that lasted hours
  • The same vulnerability has been triggered repeatedly — Pakistan took down YouTube globally in 2008, and Russian networks have hijacked major tech company traffic
  • A cryptographic fix called RPKI exists but adoption remains incomplete, leaving the internet structurally vulnerable to the same type of failure
Share
Keep exploring
Science

The Experiment That Broke Reality

Fire particles at a wall with two slits. They create a wave pattern. But watch them, and the pattern disappears. Nobody fully knows why.

2 Mar 2026/3 depths
Technology

2b2t: The Worst Server on Earth

The oldest anarchy Minecraft server. No rules, no resets since 2010. Players have waged wars lasting years, built and destroyed civilizations, and created the most hostile digital environment ever. Real-world harassment, doxxing, and a player economy emerged.

3 Mar 2026/3 depths