If alternative paths for this provider goes via transits then it's absolutely 
normal and expected that prepends that you send are ignored because local-pref 
on their side will be decisive tie breaker. I don't see here any reason to 
complain on the provider that they implement perfectly normal traffic 
engineering. In such cases what left for you is to play with de-aggregation of 
prefixes on other links that you want to prefer or have serious discussion with 
your partner if it's not reasonable to implement communities with results which 
you expect to see or play with traffic scrubbing/filtering/BGP flowspec.

Regards,
Grzegorz

From: Xavier Trilla <[email protected]>
Date: Friday 2022-03-25 at 14:38
To: Douglas Fischer <[email protected]>
Cc: BIRD Users <[email protected]>
Subject: RE: Filter based on BGP protocol status ...

>I pretty sure that you already know that, and probably already heard that... 
>But you should not do business with companies like that one.

Well, I wont say who, but I’m referring to a big DIA European provider (Really 
good providers besides this specific issue)… But yeah, I hate when they just 
ignore our prepending. If the attacking IP belongs to the specific provider AS 
number, the traffic will be delivered directly by the DIA we have.

De: Douglas Fischer <[email protected]>
Enviado el: jueves, 24 de marzo de 2022 23:06
Para: Xavier Trilla <[email protected]>
CC: Alarig Le Lay <[email protected]>; BIRD Users <[email protected]>
Asunto: Re: Filter based on BGP protocol status ...

I pretty sure that you already know that, and probably already heard that... 
But you should not do business with companies like that one.



Em qui., 24 de mar. de 2022 11:09, Xavier Trilla 
<[email protected]<mailto:[email protected]>> escreveu:
>More simply, you can add a community on the non-ddos-protected provider to 
>make them lower the localpref to peer routes, and stop the prepend.

We tried, but some providers basically ignore everything if you have a direct 
connection with them. They just forward you the traffic despite prepending or 
localpref.

Thanks!
Xavier.

-----Mensaje original-----
De: Bird-users 
<[email protected]<mailto:[email protected]>> En nombre 
de Alarig Le Lay
Enviado el: jueves, 24 de marzo de 2022 13:43
Para: [email protected]<mailto:[email protected]>
Asunto: Re: Filter based on BGP protocol status ...

On Thu 24 Mar 2022 07:43:03 GMT, Douglas Fischer wrote:
> I know that it is not the focus of your question, and also is not the
> focus on this mail list, but...
>
> To that kind of automation, the best BGP engine you will find is
> ExaBGP. It is not focuses in been in compliance with all the concepts
> of a routing system itself. It's focus is exactly automations using API.
>
> The scenario you described triggered-me something like a Zabbix
> looking to the status of BGP sessions of bird, and based on that doing
> API queries to a ExaBGP that is a iBGP peer of Bird.
>
> This model is used on many tools focused in anomaly detection for
> triggering DDoS mitigation.
>
>
> But, if your intention is a much simpler scenario, the suggestion
> Maria made is the most common!
> You can used also some BGP communities(if your upstream supports it)
> for no-export for some prefixes... Sometimes it helps.

More simply, you can add a community on the non-ddos-protected provider to make 
them lower the localpref to peer routes, and stop the prepend.

> Em qua., 23 de mar. de 2022 12:10, Xavier Trilla
> <[email protected]<mailto:[email protected]>>
> escreveu:
>
> > Hi,
> >
> >
> >
> > I’m quite sure this cannot be done, but I also know there is a lot
> > of BIRD I still don’t know, so here it goes:
> >
> >
> >
> > Is there any way to filter a export route based on another BGP
> > session status?
> >
> >
> >
> > For the sake of simplicity let’s say we have just two providers A
> > and B, and I only want to export some specific routes to B when A is down.
> >
> >
> >
> > I can do it externally with a quite simple script (For example:
> > Check if the provider is down via CLI and if it’s down insert the
> > routes I want to export to a kernel table and export that to
> > provider B) but it would be nice if I could do it directly in Bird.
> >
> >
> >
> > I’ve been scratching my head around this, but unless there is
> > something like if proto.A == down on the filters I don’t really see
> > how to do it (Or maybe some way to raise a global flag based on if
> > I’m receiving routes via provider B, but I don’t think that can’t be
> > done either.)
> >
> >
> >
> > Thanks for your time!
> >
> > Xavier
> >
> >
> >

Reply via email to