[102160] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Blackholing traffic by ASN

daemon@ATHENA.MIT.EDU (Justin Shore)
Wed Jan 30 18:35:55 2008

Date: Wed, 30 Jan 2008 17:33:20 -0600
From: Justin Shore <justin@justinshore.com>
To: nanog@merit.edu
Errors-To: owner-nanog@merit.edu


I'm sure all of us have parts of the Internet that we block for one 
reason or another.  I have existing methods for null routing traffic 
from annoying hosts and subnets on our border routers today (I'm still 
working on a network blackhole).  However I've never tackled the problem 
by targeting a bad guy's ASN.  What's the best option for null routing 
traffic by ASN?  I could always add another deny statement in my inbound 
eBGP route-maps to match a new as-path ACL for _BAD-ASN_ to keep from 
accepting their routes to begin with.  Are there any other good tricks 
that I can employ?

I have another question along those same lines.  Once I do have my 
blackhole up and running I can easily funnel hosts or subnets into the 
blackhole.  What about funneling all routes to a particular ASN into the 
blackhole?  Are there any useful tricks here?

The ASN I'm referring to is that of the Russian Business Network.  A 
Google search should turn up plenty of info for those that haven't heard 
of them.

Thanks
  Justin


home help back first fref pref prev next nref lref last post