[169511] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Filter on IXP

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Fri Feb 28 11:54:34 2014

X-Envelope-To: nanog@nanog.org
Date: Fri, 28 Feb 2014 16:52:58 +0000
From: Nick Hilliard <nick@foobar.org>
To: =?ISO-8859-1?Q?J=E9r=F4me_Nicolle?= <jerome@ceriz.fr>, nanog@nanog.org
In-Reply-To: <5310AE83.7010300@ceriz.fr>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 28/02/2014 15:42, Jérôme Nicolle wrote:
> Instead, IXPs _could_ enforce BCP38 too. Mapping the route-server's
> received routes to ingress _and_ egress ACLs on IXP ports would mitigate
> the role of BCP38 offenders within member ports. It's almost like uRPF
> in an intelligent and useable form.

this will break horribly as soon as you have an IXP member which provides
transit to other multihomed networks.

Nick



home help back first fref pref prev next nref lref last post