On 01/08/2020 00:50, Mark Tinka wrote:

On 31/Jul/20 23:38, Sabri Berisha wrote:

Kudos to Telia for admitting their mistakes, and fixing their processes.
Considering Telia's scope and "experience", that is one thing. But for
the general good of the Internet, the number of intended or
unintentional route hijacks in recent years, and all the noise that
rises on this and other lists each time we have such incidents (this
won't be the last), Telia should not have waited to be called out in
order to get this fixed.

Do we know if they are fixing this on just this customer of theirs, or
all their customers? I know this has been their filtering policy with us
(SEACOM) since 2014, as I pointed out earlier today. There has not been
a shortage of similar incidents between now and then, where the
community has consistently called for more deliberate and effective
route filtering across inter-AS arrangements.


AS  level filtering is easy.  IP prefix level filtering is hard.  Especially when you are in the top 200:

https://asrank.caida.org/


That being said, and due to these BGP "polluters" constantly doing the same thing, wouldn't an easy fix be to use the max-prefix/prefix-limit option:

https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/25160-bgp-maximum-prefix.html

https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/prefix-limit-edit-protocols-bgp.html


For every BGP peer,  the ISP determines what the current max-prefix currently is.  Then add in 2% and set the max-prefix. 

An errant BGP polluter would then only have limited damage to the Internet routing table.

Not the greatest solution, but easy to implement via a one line change on every BGP peer.


Smaller ISPs can easily do it on their 10 BGP peers so as to limit damage as to what they will hear from their neighbors.


-Hank


Caveat: The views expressed above are solely my own and do not express the views or opinions of my employer


Reply via email to