> > not properly prepending communities on synthetic routes
Let's not normalize 'synthetic route' as a term. It's not a thing that exists. On Fri, Dec 6, 2024 at 12:32 PM Ryan Hamel <[email protected]> wrote: > Nick, > > I understand there are rules and unspoken guidelines/rules for the DFZ, > but when it comes to each individual AS, that org/operator can run their AS > internally however they please, and maybe they have considered the risks > you have mentioned. > > That said, I can argue that upstreams not filtering their customers > properly removes a safety guard, upstreams not implementing RPKI removes a > safety guard, not properly prepending communities on synthetic routes to > drop them on export again removes a safety guard. I can go on... > > - As an industry, we should be well beyond the point of having to tell > people that this is a poor idea, in the same way that we don't need to tell > people that bypassing electrical fuse boxes is a poor idea, or removing > railings on stair-cases, or not wearing motorbike helmets, or anything else > designed to mitigate the unfortunate consequences of entirely predictable > accidents. > > Where this statement falls short is, those are all regulated by building > codes, laws, etc. No laws exist dictating how BGP, routing protocols in > general, and topologies must be implemented, nor what safety guidelines > must be adhered to. > > Ryan Hamel > > > ------------------------------ > *From:* Nick Hilliard <[email protected]> > *Sent:* Friday, December 6, 2024 8:34 AM > *To:* Ryan Hamel <[email protected]> > *Cc:* Tom Beecher <[email protected]>; [email protected] <[email protected]> > *Subject:* Re: Route optimization using GPUs? > > Caution: This is an external email and may be malicious. Please take care > when clicking links or opening attachments. > > > Ryan Hamel wrote on 05/12/2024 23:45: > > What does "these devices don't follow standard BGP behaviors" have to do > > with adding a NO_EXPORT or specific community on the import policy when > > a route is accepted, and being belt & suspenders with matching those > > communities to drop those routes on export to carriers/IX/PNI sessions? > > Ryan, > > BGP ensures loop-free interdomain path computation by inspecting the AS > path of each NLRI. If a routing optimiser rewrites all the AS paths for > all the NLRIs it receives, then it's just pooped all over the primary > component of BGP that's designed to ensure that interdomain BGP actually > works in the way that it's supposed to do in the first place, which also > acts as an intrinsic safety guard against dfz hijacking. > > Removing an intrinsic safety guard like this is an inherently risky > thing to do. When you elevate the inherent risk of a system, you > necessarily elevate either the likelihood of failure or the consequences > of a failure, or both. > > As an industry, we should be well beyond the point of having to tell > people that this is a poor idea, in the same way that we don't need to > tell people that bypassing electrical fuse boxes is a poor idea, or > removing railings on stair-cases, or not wearing motorbike helmets, or > anything else designed to mitigate the unfortunate consequences of > entirely predictable accidents. > > Nick > >

