On Mon, 6 May 2019 16:40:42 +0000
Michel Py <[email protected]> wrote:
Hi Keith,
Besides what you wrote (comments in-line), I think we need a very clear
definition of what is a private network.
If an organization is an operator, ISP, or hosting company, the part of their network that carries public traffic is not
private.
For a router, the management interface (if separate) is private, it's likely on a separate VLAN too. But the interfaces that
carry traffic form / to customers, subscribers, and hosted services are public.
I am afraid I cannot agree to this definition.
First if all, if traffic is either public or private saying public traffic
cannot
be private isn't very helpful.
Beyond that, we have a bit of a problem in that RFC1918 is so used by customers
that you cannot
rely on being able to use it much if you are trying attach to multiple
customers in more than a
trivial way like management interfaces.
There are systems and services that are so sensitive or compromise so costly
that it is imperative
that no contact from outside the local ASN be allowed. It becomes a form of
Russian roulette to put
a world routable address on them. So we have had to come up with an
alternative. Many have resorted
to 30.0.0.0/8 in the voice community since the attacks on voice resources are
so heavy and persistent
that a ddos can result from trying to use packet filters to protect some
systems. I would argue that
if a host and the server that provides service to that host are within the same
ASN then the network
and it's traffic is private.
Michel's definition also has grey areas when it comes to ip-ip tunnels. If
tunnel traffic has what we
all would call public traffic is the tunnel itself public?
Does ARIN or any of the other RIR's really want to get into these kind of
network engineering and
operations debates?
Larry Ash
Mountain West Technologies
Keith W. Hare wrote :
If an organization uses a IPv4 prefix allocated/assigned to some other
organization (the DoD 30.0.0.0/8 for example)
within their internal network and filters out all references at the edges of
their network so that the general public
never sees any references, is that BGP Hijacking? I’m pretty sure we can agree
that this is not BGP hijacking.
If you would add to that that they do not transport any non-organization data over it / be in context with what I wrote above
about private network, I would agree.
I'm not sure there is a name for that, would be a good idea to have one.
Loitering ?
If an organization uses a IPv4 prefix allocated/assigned to some other
organization (the DoD 30.0.0.0/8 for example)
within their publically visible network and filters out all references at the
edges of their network so that the rest
of the internet never sees any references, is that BGP Hijacking? This is an
edge case that we need to consider carefully.
I agree, especially if they transport customer / subscriber data over it. I
think we should call that squatting.
If Organization A has an agreement/letter of authority to announce addresses
that has been allocated/assigned to
Organization B, and Organization B wants to replace Organization A with
Organization C, but there was some onerous
termination clause with Organization A that has not been met so Organization A
continues to announce Organization B’s
address space, is that BGP Hijacking? To me, this sounds like a contract
dispute that depends on the contents of the
private contract between A and B.
Correct. ARIN has allocated addresses to organization B. In that case, org A and org B have to sort out their differences in the
legal system.
However, we have to be careful with similarities with your next point just below. What are the differences between them ? the
lack of a contract or agreement, or the fact that ARIN does not have access to it ? or some other factor ?
If an organization A does not have a an agreement/letter of authority to
announce addresses that has been
allocated/assigned to Organization B but does so anyhow and allows that
announcement to propagate to the
general internet, is that BGP Hijacking? Seems highly likely to be BGP
Hijacking.
I agree. Same as above though, we need a very clear definition of what constitutes not having an agreement or a contract before
ARIN can make the determination that it is indeed hijacking.
From the outside, how do we know that an agreement/letter of authority does not
exist, is invalid, or is forged?
This is where we have to be very complete, very comprehensive, and as much
exhaustive as possible.
If an organization sets up routing so that all connections from the inside of
it’s network to a particular
resource outside of its network go through an particular router/proxy server,
Is that BGP Hijacking?
Can you develop this one a little further ? Are we talking about traffic engineering / traffic shaping / net neutrality / packet
classification / QOS ?
Michel.
_______________________________________________
ARIN-PPML
You are receiving this message because you are subscribed to
the ARIN Public Policy Mailing List ([email protected]).
Unsubscribe or manage your mailing list subscription at:
https://lists.arin.net/mailman/listinfo/arin-ppml
Please contact [email protected] if you experience any issues.
Larry Ash
Mountain West Technologies
123 W 1st St.
Casper, WY 82601
Office 307 233-8387
_______________________________________________
ARIN-PPML
You are receiving this message because you are subscribed to
the ARIN Public Policy Mailing List ([email protected]).
Unsubscribe or manage your mailing list subscription at:
https://lists.arin.net/mailman/listinfo/arin-ppml
Please contact [email protected] if you experience any issues.