[74535] in North American Network Operators' Group
Re: Blackhole Routes
daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Thu Sep 30 18:34:16 2004
Date: Thu, 30 Sep 2004 22:32:58 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <16732.30788.588449.299839@ran.psg.com>
To: Randy Bush <randy@psg.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, 30 Sep 2004, Randy Bush wrote:
> >> If every BGP session in your network is protected by a max-prefix
> >> limit, no matter who leaks, the damage will be limited and contained.
> > true, also not univeral,
>
> the problem with max-prefix is it does not say *which* prefixes.
> so even if the drop-bgp stoopidity is corrected, you could end
> up holding the bogus prefixes, not the good ones.
true, however, my point was that not even the basics are being done :(