[46510] in North American Network Operators' Group
Re: de-peering and peering
daemon@ATHENA.MIT.EDU (Stephane Bortzmeyer)
Tue Apr 2 15:08:40 2002
Message-Id: <200204022007.g32K71Ho006329@ludwigV.sources.org>
From: Stephane Bortzmeyer <bortzmeyer@gitoyen.net>
To: "Shashi Kumar" <shashi.kumar@wipro.com>
Cc: nanog <nanog@merit.edu>,
Venkatesh Seshasayee <venkatesh.seshasayee@wipro.com>
In-reply-to: <3CAA0908.4020002@wipro.com>
("Shashi Kumar" <shashi.kumar@wipro.com>'s message of
Wed, 03 Apr 2002 01:09:52 +0530)
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Tue, 02 Apr 2002 22:07:01 +0200
Errors-To: owner-nanog-outgoing@merit.edu
On Wednesday 3 April 2002, at 1 h 9,
"Shashi Kumar" <shashi.kumar@wipro.com> wrote:
> Let us say Network A has a peering Agreement with Network B. Now let us
> say Network X wants to reach Network B. X and B do not have a peering
> agreement. Can Network A use the peering Link between A nd B to route
> the traffic of network X.
In the most common sense of the word "peering", no, it cannot.
> What are the mechanisms in place in B's network to detect that Network A
> is transiting the data( in this case network B looser) from Network X?
Network monitoring, statistics, sometime actual packet filters fed from RADB.
Sometimes pure luck: one day, a traceroute will reveal the trick.
> Basically what I am trying to arrive at is: Suppose the peering
> arrangement between A and B were to be for data originating from A and B
> only(and not transited). Can A or B misuse the peering agreement by
> masquerading transit data as if its originating from its own n/w?
Technically yes (some technical measures can be used against that). But it is a violation of the typical peering agreement and it will raise trouble :-)