[175030] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Unwanted Traffic Removal Service (UTRS)

daemon@ATHENA.MIT.EDU (Alexandre Snarskii)
Wed Oct 8 12:44:35 2014

X-Original-To: nanog@nanog.org
Date: Wed, 8 Oct 2014 20:44:19 +0400
From: Alexandre Snarskii <snar@snar.spb.ru>
To: Job Snijders <job@instituut.net>
In-Reply-To: <20141008144238.GE10316@Vurt.local>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

On Wed, Oct 08, 2014 at 04:42:38PM +0200, Job Snijders wrote:
> 
> There are various flavors at the moment in terms of validation (please
> correct me if I am wrong): The Polish blackholing project only allows
> blackholes which fall within the set of prefixes which an ASN
> originates, the DE-CIX BS service accepts anything that is a subset of
> your AS-SET. 

There is also "dynamic validation" approach: blackhole route is considered
valid for injection if and only if there is a covering less-specific route 
with the best-path pointing to the same exit point as blackhole route.
(definition of "exit point" can vary from "next ASn is the same
we received blackhole from" to "both as-path and next-hops must be the
same and aggregate route must be marked as customer's one").

This approach has its downside too: it requires you to run task-specific 
bgp speaker. Worse yet, usually you have to write that speaker :) 

-- 
In theory, there is no difference between theory and practice. 
But, in practice, there is. 


home help back first fref pref prev next nref lref last post