[81127] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: soBGP deployment

daemon@ATHENA.MIT.EDU (Jeroen Massar)
Thu May 26 06:10:36 2005

From: Jeroen Massar <jeroen@unfix.org>
To: Tony Li <tony.li@tony.li>
Cc: Daniel Karrenberg <daniel.karrenberg@ripe.net>, nanog@nanog.org
In-Reply-To: <42950917.3070609@tony.li>
Date: Thu, 26 May 2005 12:09:43 +0200
Errors-To: owner-nanog@merit.edu



--=-BF/yCwsrBN03mcY01UXu
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Wed, 2005-05-25 at 16:24 -0700, Tony Li wrote:

> For example, an operator can begin by enabling authentication on a BGP
> speaker that is wholly outside of the traffic path.  Instability of this
> one speaker would have no effect on production traffic.  Authentication
> alarms generated by this speaker could be set up to do nothing more than
> send a syslog message to operations personnel who would need to
> intervene manually to actually change production BGP path selection.
> For testing authentication, a host behind this speaker could monitor
> reachability.

In short, you mean setting up, eg a Quagga box behind the existing core
infra that one has, feeding it a full feed, which matches the current
best paths one has in it's RIB and verifying the paths.

This is somewhat similar how the detection of GRH (*1) works already for
IPv6 tables, that is it nightly fetches the route6 objects from various
registries(*1) and checks if a AS is registered to be allowed to
announce a certain prefix, if not it marks it in the looking glass as
being a bad route which is supposed to be routed from the registered AS.

Now, if BGP would have some signature over the the path, one could
verify this in the same method and have the exact thing happening above.
GRH sends out mailings every day, though one could of course implement
the above in realtime. If one would mirror the full table, one could
even analyze the alternative paths to see if those are valid.

What you mention, does indeed not break current operations and would be
quite transparent.

Greets,
 Jeroen

*1 =3D http://www.sixxs.net/tools/grh/
*2 =3D http://www.sixxs.net/tools/grh/how/


--=-BF/yCwsrBN03mcY01UXu
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Jeroen Massar / http://unfix.org/~jeroen/

iD8DBQBClaBnKaooUjM+fCMRAjNxAJ4wVz590lPo4kta8Y/tmK8LBY9fvwCaAjfy
Y21yPNVwSP5lTWjResRrH6Q=
=lsJg
-----END PGP SIGNATURE-----

--=-BF/yCwsrBN03mcY01UXu--


home help back first fref pref prev next nref lref last post