[159636] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

How are operators using IRR?

daemon@ATHENA.MIT.EDU (ML)
Wed Jan 16 19:56:07 2013

Date: Wed, 16 Jan 2013 19:55:44 -0500
From: ML <ml@kenweb.org>
To: NANOG <nanog@nanog.org>
Reply-To: ml@kenweb.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

How are operators using the data available in the various IRRs?

Using an example:

AS1 is your customer
AS1 has AS2, AS3 and AS4 described as customers in an IRR
Also assume AS2 has IRR data describing AS1000 and AS2000 as it's customers.

Are operators building AS path regexes such as the following 
automatically from IRR and applying that to your BGP sessions?

----
AS1{1,}
AS1{1,} AS2{1,}
AS1{1,} AS3{1,}
AS1{1,} AS2{1,} AS1000{1,}
AS1{1,} AS2{1,} AS2000{1,}
----


I would imagine most operators that are building policy from IRR are 
building prefix lists to limit what they are accepting.  Is this being 
paired with some AS path filtering?


Are operators just traversing an AS-SET as far as it will go and 
building prefix lists to represent all intended prefixes to be heard on 
a session regardless of who originates them? Is the possibility of 
AS1000 hijacking AS2000 prefixes towards AS2 a problem you as the 
upstream to AS1 need to consider? (Last question assumes AS2 made a 
mistake and wasn't filtering properly on it's own customers and AS1 is 
just accepting all prefixes under the cone of AS2)

Thanks


home help back first fref pref prev next nref lref last post