[150474] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: do not filter your customers

daemon@ATHENA.MIT.EDU (George Bonser)
Fri Feb 24 17:07:28 2012

From: George Bonser <gbonser@seven.com>
To: Leo Bicknell <bicknell@ufp.org>, North American Network Operators' Group
 <nanog@nanog.org>
Date: Fri, 24 Feb 2012 22:06:31 +0000
In-Reply-To: <20120224205950.GA87433@ussenterprise.ufp.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> -----Original Message-----
> From: Leo Bicknell=20
> Sent: Friday, February 24, 2012 1:00 PM

> There are plenty of cases where someone "leaks" more specifics with
> NO_EXPORT to only one of their BGP peers for the purposes of TE.
>=20
> The challenge of securing BGP isn't crypto, and it isn't enough
> ram/cpu/whatever to process it.  The challenge is getting a crypto
> scheme that operators can use to easily represent the real world.
> It turns out the real world is quite messy though, often full of
> temporary hacks, unusual relationships and other issues.
>=20
> I'm sure it will be solved, one day.

I can think of a way to do it but it would require some trust and it would =
require that people actually *used* it.  What one would do is feed the rout=
es they are proposing to send to a BGP peer to a RIR front-end.  The receiv=
ing peer would "sign off" on the proposal and the routes would be then ente=
red into the RIR.  That is the step that is currently missing.  Anyone can =
enter practically anything into an RIR and the receiving side never gets to=
 "sanity check" the information before it actually gets written to the data=
base.  Once you have this base of information, route filtration generated f=
rom the database becomes more reliable.

In fact, a network might have several "canned" profiles of different route =
packages registered in the front end. A "transit" package, a "customer rout=
es" package and maybe some specialized packages for peering at various priv=
ate/public exchange points.  If you pick up a new peer at a transit point, =
you select the package for that point, it proposes that to the peer, peer a=
pproves it, and they can both generate their route filters from that inform=
ation.

It could even highlight some glaring errors automatically to spot what migh=
t be a typo or even attempted nefarious activity.  The receiver of a propos=
ed change might be alerted to the fact that the new route(s) being offered =
are inconsistent with the database information (routes already being source=
d by an AS that the proposed sender is not peering with) which could be ove=
rridden by the receiver (or just ignored) but having something show up in s=
ome way that highlights a possible inconsistency might generate a closer lo=
ok at that proposal and head off problems later.

But the fundamental problem is that the current system is "open loop".



home help back first fref pref prev next nref lref last post