[169511] in North American Network Operators' Group
Re: Filter on IXP
daemon@ATHENA.MIT.EDU (Nick Hilliard)
Fri Feb 28 11:54:34 2014
X-Envelope-To: nanog@nanog.org
Date: Fri, 28 Feb 2014 16:52:58 +0000
From: Nick Hilliard <nick@foobar.org>
To: =?ISO-8859-1?Q?J=E9r=F4me_Nicolle?= <jerome@ceriz.fr>, nanog@nanog.org
In-Reply-To: <5310AE83.7010300@ceriz.fr>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 28/02/2014 15:42, Jérôme Nicolle wrote:
> Instead, IXPs _could_ enforce BCP38 too. Mapping the route-server's
> received routes to ingress _and_ egress ACLs on IXP ports would mitigate
> the role of BCP38 offenders within member ports. It's almost like uRPF
> in an intelligent and useable form.
this will break horribly as soon as you have an IXP member which provides
transit to other multihomed networks.
Nick