[169512] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Filter on IXP

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Fri Feb 28 11:58:03 2014

From: "Patrick W. Gilmore" <patrick@ianai.net>
In-Reply-To: <5310BEEA.9070403@foobar.org>
Date: Fri, 28 Feb 2014 11:56:47 -0500
To: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Feb 28, 2014, at 11:52 , Nick Hilliard <nick@foobar.org> wrote:
> On 28/02/2014 15:42, J=E9r=F4me Nicolle wrote:

>> Instead, IXPs _could_ enforce BCP38 too. Mapping the route-server's
>> received routes to ingress _and_ egress ACLs on IXP ports would =
mitigate
>> the role of BCP38 offenders within member ports. It's almost like =
uRPF
>> in an intelligent and useable form.
>=20
> this will break horribly as soon as you have an IXP member which =
provides
> transit to other multihomed networks.

Or to anyone who doesn't announce their full downstream table to the =
route servers. Or to people who don't use route servers. Or to someone =
who does traffic engineering. Or ....

--=20
TTFN,
patrick



home help back first fref pref prev next nref lref last post