On 2018/11/06 15:54, Gregory Edigarov wrote:
> Hello, just noticed that.
>
> in pf.conf:
>
> table bgp-spamd-block persists
>
>
> in bgpd.conf
>
> spamdAS="65066"
> AS 65077
> fib-update no # Mandatory, to not update the local routing table
> #log updates
>
> group "spamd-bgp" {
> remote-as $spamdAS
> multihop 64
> export none # Do not send Route Server any information
>
> # us.bgp-spamd.net
> neighbor 64.142.121.62
>
> # eu.bgp-spamd.net
> neighbor 217.31.80.170
>
> # IPv6 eu.bgp-spamd.net
> # neighbor 2a00:15a8:0:100:0:d91f:50aa:1
> }
>
> match from group spamd-bgp community $spamdAS:666 set pftable
> "bgp-spamd-block"
>
> bgpd is running
>
> some time later:
>
> lbld12# bgpctl sh
> Neighbor AS MsgRcvd MsgSent OutQ Up/Down
> State/PrfRcvd
> 217.31.80.170 65066 78 20 0 00:08:53 38256
> 64.142.121.62 65066 76 20 0 00:08:53 38256
>
> i.e. it receives the prefixes ok, but:
>
> lbld12# pfctl -Tsh -t bgp-spamd-block | wc -l
> 0
>
You have no "pass" line. See
http://www.openbsd.org/faq/upgrade64.html#ConfigChanges
I think you will also need "nexthop qualify via default".