[32232] in North American Network Operators' Group
Re: Trusting BGP sessions
daemon@ATHENA.MIT.EDU (David Diaz)
Tue Nov 14 23:34:01 2000
Mime-Version: 1.0
Message-Id: <p04320401b637c0692d86@[10.0.1.6]>
In-Reply-To: <20001114202940.19022.cpmta@c004.sfo.cp.net>
Date: Tue, 14 Nov 2000 23:30:14 -0500
To: Sean Donelan <sean@donelan.com>, nanog@merit.edu
From: David Diaz <davediaz@iwcinc.net>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
Errors-To: owner-nanog-outgoing@merit.edu
Sorry, Yes.
My original answer mentioned in the past. I think we all understand
that the "business" side has entered.
However someone connecting to your peering router can create a create
deal of havoc. Some of the older routers could have a major problem
with floods of tens of thousands or hundreds of thousands of routes
being added or withdrawn quickly. At the same time if the peer is
flapping and rerouting hunderds of megs to different exchange points,
first east coast then west, it could cause a serious problem. I know
you know that Sean.
Most people have some kind of filter for their customers to try and
limit some of the unintentional mistakes that can happen.
At 12:29 PM -0800 11/14/00, Sean Donelan wrote:
>On Mon, 13 November 2000, David Diaz wrote:
>> The cabal makes jokes "Officially there is no cabal."
>> In reality the fact is that peering is a trust event. You are
>
>Peering is a business decision. It is not an engineering decision
>nor a trust event.
>
>Technically, can a peer BGP session do any more or less damage to
>your network than a customer BGP session? The protocol is identical.