Re: "Tactical" /24 announcements

2021-08-19 Thread Ben Maddison via NANOG
Hi David, On 08/19, David Bass wrote: > Ben, > > Yes, sorry. > > Pulling/pushing the config data to a server, and then managing it there in > addition to on the box. Like, if I want to run some reports to see how > many PL are defined on each box, it’s easier to do that with the data >

Re: "Tactical" /24 announcements

2021-08-19 Thread David Bass
Ben, Yes, sorry. Pulling/pushing the config data to a server, and then managing it there in addition to on the box. Like, if I want to run some reports to see how many PL are defined on each box, it’s easier to do that with the data centralized and managed. David On Thu, Aug 19, 2021 at 6:35

Re: "Tactical" /24 announcements

2021-08-19 Thread Ben Maddison via NANOG
Hi Randy, On 08/17, Randy Bush wrote: > for junos, i build the prefix list externally and push config. sad to > say, the code is so old ('90s) that it's pearl and uses `peval`. i > should fix but (copious spare time) == 0. > Spare time must be > 0 if you're willing to wait for peval to finish

Re: "Tactical" /24 announcements

2021-08-19 Thread Ben Maddison via NANOG
Hi David, On 08/18, David Bass wrote: > I'm also in the externally managed space...very cool tool though. I love > the idea of distributing some of this functionality. > > Are you also exporting and managing this data outside? > [assuming that was directed to me...] I'm not sure what you mean

Re: "Tactical" /24 announcements

2021-08-18 Thread David Bass
I'm also in the externally managed space...very cool tool though. I love the idea of distributing some of this functionality. Are you also exporting and managing this data outside? On Tue, Aug 17, 2021 at 12:23 PM Ben Maddison via NANOG wrote: > Hi Saku, > > On 08/17, Saku Ytti wrote: > > I

Re: "Tactical" /24 announcements

2021-08-17 Thread Tim Raphael
We do something similar - build the prefix lists externally (based on PeeringDB, IRR, RPKI data) and push them with config management on regular intervals. This sort of automated policy architecture is clearly becoming more common, and the drive (see: MANRS) is ever-increasing. I'd really like

RE: "Tactical" /24 announcements

2021-08-17 Thread Jakob Heitz (jheitz) via NANOG
) Sent: Tuesday, August 17, 2021 9:59 AM To: nanog@nanog.org Subject: RE: "Tactical" /24 announcements > RPKI validity cover is incomplete. One way: add your own RTR records. They don't all have to come from the RPKI. Another way: Add route-policy to validate the origin-as. That requires

RE: "Tactical" /24 announcements

2021-08-17 Thread Jakob Heitz (jheitz) via NANOG
> RPKI validity cover is incomplete. One way: add your own RTR records. They don't all have to come from the RPKI. Another way: Add route-policy to validate the origin-as. That requires a prefix-set. However, these prefix-sets are much smaller and the sum of them is smaller than the sum of

Re: "Tactical" /24 announcements

2021-08-17 Thread Randy Bush
for junos, i build the prefix list externally and push config. sad to say, the code is so old ('90s) that it's pearl and uses `peval`. i should fix but (copious spare time) == 0. originally i tried to also build and push for cisco ios classic, but it died in the push. breathe on the router and

Re: "Tactical" /24 announcements

2021-08-17 Thread Ben Maddison via NANOG
Hi Saku, On 08/17, Saku Ytti wrote: > I share your confusion Randy. It seems like perhaps Jakob answered a > slightly different question and his answer is roughly. > > a) Use this as-set feature to ensure valid set of ASNs from given peer > b) Validate prefix using RPKI (I'm assuming with

Re: "Tactical" /24 announcements

2021-08-17 Thread Randy Bush
> Somewhat related, when JNPR implemented RTR the architecture was > planned so that the RTR implementation itself isn't tightly coupled to > RPKI validity. It was planned day1 that customers could have multiple > RTR setups feeding prefixes and the NOS side could use these for other > purposes

Re: "Tactical" /24 announcements

2021-08-17 Thread Tim Raphael
I quite like this approach as well - for those that would like to do more complicated policy logic off-box, the RTR architecture very much lends itself to that. JNPR already has accessible APIs (JET-based / RPC) you can leverage to push configuration into the ephemeral database or be called on

Re: "Tactical" /24 announcements

2021-08-17 Thread Saku Ytti
I share your confusion Randy. It seems like perhaps Jakob answered a slightly different question and his answer is roughly. a) Use this as-set feature to ensure valid set of ASNs from given peer b) Validate prefix using RPKI (I'm assuming with rejecting unknowns and invalids) c) Don't punch in

Re: "Tactical" /24 announcements

2021-08-16 Thread Randy Bush
hi jakob, i am confused between > There is no expansion to prefix-set. and your earlier >> We have introduced the scalable as-set into the XR route policy language. >> as-path-set does not scale well with 1000's of ASNs. >> Now, you don't need to expand AS-SET into prefix-set, just enter it

Re: "Tactical" /24 announcements

2021-08-16 Thread Tom Beecher
Broadly speaking, I would say if you announce a prefix to the DFZ, then you are saying "I can deliver anything in this range where it is supposed to go." That being said, there are moments like Bill said that an outage or other issue prevents that from happening, and also circumstances that a

Re: "Tactical" /24 announcements

2021-08-16 Thread William Herrin
On Mon, Aug 16, 2021 at 7:10 AM Jason Pope wrote: > > >On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher wrote: > >> How does this break the Internet? > > > >A originates 10.0.0.0/16 to paid transit C > >B originates 10.0.1.0/24 also to paid transit C > >C offers both routes to D. D discards

Re: "Tactical" /24 announcements

2021-08-16 Thread Jason Pope
>On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher wrote: >> On 12/08/2021 17:59, William Herrin wrote: >> > If you prune the routes from the Routing Information Base instead, for >> > any widely accepted size (i.e. /24 or shorter netmask) you break the >> > Internet. >> >> How does this break the

Re: "Tactical" /24 announcements

2021-08-16 Thread Tim Weippert
Hi Jakob, but the as-set only checks the origin AS in the announcement, it doesn't lookup the prefix <-> as relation from RADB/RIPE/Whatever, as i understand it correctly! Or is there some lookup mechanism as Ytti/Mark mentioned? regards, tim On Sun, Aug 15, 2021 at 01:46:40AM +, Jakob

RE: "Tactical" /24 announcements

2021-08-16 Thread Jakob Heitz (jheitz) via NANOG
route-policy configuration will be much smaller. I'm happy to answer more questions or requests for improvement on or off list. Regards, Jakob. -Original Message- From: Saku Ytti Sent: Saturday, August 14, 2021 11:11 PM To: Jakob Heitz (jheitz) Cc: nanog@nanog.org Subject: Re: "Tac

Re: "Tactical" /24 announcements

2021-08-15 Thread Mark Tinka
On 8/15/21 08:11, Saku Ytti wrote: Hey Jakob, Is there documentation for this somewhere? Are you saying that the IOS-XR host will connect to some (configured?) server to expand the as-set, and at what time? Commit time? Once every N? Yes, same question for me. We've dumped all of our IOS

Re: "Tactical" /24 announcements

2021-08-15 Thread Masataka Ohta
Jeff Tantsura wrote: > where the routes computed would still be a > subject to best route selection and hence > reasonably safe wrt loops. As Baldur said: > For all the stub networks out there we should be able to > aggressively filter routes without much harm. thanks to IRRs and RPKI,

Re: "Tactical" /24 announcements

2021-08-15 Thread Saku Ytti
Hey Jakob, Is there documentation for this somewhere? Are you saying that the IOS-XR host will connect to some (configured?) server to expand the as-set, and at what time? Commit time? Once every N? On Sun, 15 Aug 2021 at 04:50, Jakob Heitz (jheitz) via NANOG wrote: > > Ytti, > > We have

RE:"Tactical" /24 announcements

2021-08-14 Thread Jakob Heitz (jheitz) via NANOG
Ytti, We have introduced the scalable as-set into the XR route policy language. as-path-set does not scale well with 1000's of ASNs. Now, you don't need to expand AS-SET into prefix-set, just enter it directly. Example: as-set test 2914, 3356, end-set ! route-policy sample if as-path

Re: "Tactical" /24 announcements

2021-08-14 Thread Jeff Tantsura
Every major vendor at some point in time has implemented RIB->FIB(really BGP->RIB->FIB) filtering, on Redback/Ericsson routers we did around 2013/2014(@Jakob Heitz;-)) Route compression is a more complex topic, it is not difficult to aggregate, it is to effectively disaggregate on changes. MS

Re: "Tactical" /24 announcements

2021-08-14 Thread Masataka Ohta
Baldur Norddahl wrote: For all the stub networks out there we should be able to aggressively filter routes without much harm. Stub networks, which, by definition, do not have transit traffic over them, can not filter routes for transit traffic at all. But, if both of two stub networks with

Re: "Tactical" /24 announcements

2021-08-14 Thread Masataka Ohta
Tom Beecher wrote: 6.1.3 . at the time of writing of this document, IPv4 prefixes longer than /24 and IPv6 prefixes longer than /48 are generally neither announced nor accepted in the Internet That's why, unlike IPv4, IPv6 is

Re: "Tactical" /24 announcements

2021-08-14 Thread Mark Tinka
On 8/12/21 19:57, Jon Lewis wrote: Yeah...changes to the network could suddenly run such a box out of FIB resources, and you could easily be wrong when predicting how much longer a box has for it's "full routes" days...but the alternatives are "don't do full routes" or replace the box

Re: "Tactical" /24 announcements

2021-08-14 Thread Mark Tinka
On 8/12/21 19:30, Nick Hilliard wrote: it also causes non-deterministic fib resource consumption. On most edge deployments this won't matter, but it wouldn't be hard to cook up a topology that could fail in interesting ways.  Overall fib compression is a net win, but you need to be

Re: "Tactical" /24 announcements

2021-08-13 Thread Mark Tinka
On 8/12/21 19:19, William Herrin wrote: A originates 10.0.0.0/16 to paid transit C B originates 10.0.1.0/24 also to paid transit C C offers both routes to D. D discards 10.0.1.0/24 from the RIB based on same-next-hop Yeah, discarding from RIB is not the idea. It's discarding from FIB. RIB

Re: "Tactical" /24 announcements

2021-08-13 Thread Mark Tinka
On 8/12/21 19:17, Amir Herzberg wrote: Hi Hank, I think you're right, it could result in sub-optimal routing and in particular, in your AS not being used for these subprefixes (the traffic will go instead to a competing provider who sent the subprefix), hence, as you said, sub-optimal

Re: "Tactical" /24 announcements

2021-08-13 Thread Mark Tinka
On 8/12/21 16:42, Tom Hill wrote: I'm glad to hear a vendor has implemented a useful knob. Which vendor? BGP-SD (Selective Download) from Cisco since about 2013. I know both Juniper and Nokia have their versions as well. It's nothing new. Mark.

Re: "Tactical" /24 announcements

2021-08-13 Thread Baldur Norddahl
On Fri, Aug 13, 2021 at 10:53 PM Amir Herzberg wrote: > > I think it isn't the same. > I am still not sure but maybe I misunderstood what you originally said. It is probably not important. > I think that the NANOG (or in general, operators) community may do well to > state the `/24 rule'

Re: "Tactical" /24 announcements

2021-08-13 Thread Amir Herzberg
Tom, I also referred to the same text from 7454! But Baldur is right: the text does NOT clearly state that announcement more specific than /24 should be filtered. If you allow different operators to filter at different lengths, you can get disconnections. We never like to standards to be fixed to

Re: "Tactical" /24 announcements

2021-08-13 Thread Tom Beecher
> > I think that the NANOG (or in general, operators) community may do well to > state the `/24 rule' clearly in a BCP, preferably an RFC. > https://datatracker.ietf.org/doc/html/rfc7454 6.1.3 . > Prefixes That Are Too Specific > Most

Re: "Tactical" /24 announcements

2021-08-13 Thread Amir Herzberg
On Fri, Aug 13, 2021 at 12:50 PM Baldur Norddahl wrote: > > On Fri, Aug 13, 2021 at 3:54 AM Amir Herzberg > wrote: > >> On Thu, Aug 12, 2021 at 4:32 PM Baldur Norddahl < >> baldur.nordd...@gmail.com> wrote: >> >>> >>> >>> On Thu, Aug 12, 2021 at 7:39 PM Amir Herzberg >>> wrote: >>> Bill,

Re: "Tactical" /24 announcements

2021-08-13 Thread William Herrin
On Fri, Aug 13, 2021 at 9:49 AM Baldur Norddahl wrote: > Our peer is advertising a prefix for which they will not route > all addresses covered. Is that route not then a lie? Should > they not have exploded the prefix so they could avoid covering > the part of the prefix they will not accept

Re: "Tactical" /24 announcements

2021-08-13 Thread Baldur Norddahl
On Fri, Aug 13, 2021 at 3:54 AM Amir Herzberg wrote: > On Thu, Aug 12, 2021 at 4:32 PM Baldur Norddahl > wrote: > >> >> >> On Thu, Aug 12, 2021 at 7:39 PM Amir Herzberg >> wrote: >> >>> Bill, I beg to respectfully differ, knowing that I'm just a researcher >>> and working `for real' like you

Re: "Tactical" /24 announcements

2021-08-13 Thread Sabri Berisha
- On Aug 12, 2021, at 10:38 AM, Amir Herzberg amir.li...@gmail.com wrote: Hi, > I don't think A would be right to filter these packets to 10.0.1.0/24; A has > announced > 10.0.0.0/16 so should route to that (entire) prefix, or A is misleading its > peers. This is what it boils down to. If

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 4:32 PM Baldur Norddahl wrote: > > > On Thu, Aug 12, 2021 at 7:39 PM Amir Herzberg > wrote: > >> Bill, I beg to respectfully differ, knowing that I'm just a researcher >> and working `for real' like you guys, so pls take no offence. >> >> I don't think A would be right

Re: "Tactical" /24 announcements

2021-08-12 Thread Baldur Norddahl
On Thu, Aug 12, 2021 at 7:39 PM Amir Herzberg wrote: > Bill, I beg to respectfully differ, knowing that I'm just a researcher and > working `for real' like you guys, so pls take no offence. > > I don't think A would be right to filter these packets to 10.0.1.0/24; A > has announced 10.0.0.0/16

Re: "Tactical" /24 announcements

2021-08-12 Thread Jon Lewis
On Thu, 12 Aug 2021, William Herrin wrote: On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher wrote: On 12/08/2021 17:59, William Herrin wrote: If you prune the routes from the Routing Information Base instead, for any widely accepted size (i.e. /24 or shorter netmask) you break the Internet.

Re: "Tactical" /24 announcements

2021-08-12 Thread William Herrin
On Thu, Aug 12, 2021 at 10:39 AM Amir Herzberg wrote: > On Thu, Aug 12, 2021 at 1:22 PM William Herrin wrote: >> A originates 10.0.0.0/16 to paid transit C >> B originates 10.0.1.0/24 also to paid transit C > Bill, I beg to respectfully differ, knowing that I'm just a researcher and > working

Re: "Tactical" /24 announcements

2021-08-12 Thread Jon Lewis
On Thu, 12 Aug 2021, Nick Hilliard wrote: Jon Lewis wrote on 12/08/2021 18:09: Arista.  They call it FIB compression.  They mention it's a trade-off, more memory and CPU utilization (keeping track of things) in exchange for being able to keep hardware that might otherwise be out of FIB

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 1:22 PM William Herrin wrote: > On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher > wrote: > > On 12/08/2021 17:59, William Herrin wrote: > > > If you prune the routes from the Routing Information Base instead, for > > > any widely accepted size (i.e. /24 or shorter

Re: "Tactical" /24 announcements

2021-08-12 Thread Nick Hilliard
Jon Lewis wrote on 12/08/2021 18:09: Arista.  They call it FIB compression.  They mention it's a trade-off, more memory and CPU utilization (keeping track of things) in exchange for being able to keep hardware that might otherwise be out of FIB space able to cope with full tables. it also

Re: "Tactical" /24 announcements

2021-08-12 Thread William Herrin
On Thu, Aug 12, 2021 at 10:19 AM William Herrin wrote: > On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher wrote: > > On 12/08/2021 17:59, William Herrin wrote: > > > If you prune the routes from the Routing Information Base instead, for > > > any widely accepted size (i.e. /24 or shorter netmask)

Re: "Tactical" /24 announcements

2021-08-12 Thread Tom Hill
On 12/08/2021 18:09, Jon Lewis wrote: >> >> Having an upstream provider that did it, in a very aggressive >> fashion. > > Odds are, they did it wrong, and you had no control and limited, if > any, visibility into what they did. Obviously, if you're going to > blindly filter routes based on

Re: "Tactical" /24 announcements

2021-08-12 Thread William Herrin
On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher wrote: > On 12/08/2021 17:59, William Herrin wrote: > > If you prune the routes from the Routing Information Base instead, for > > any widely accepted size (i.e. /24 or shorter netmask) you break the > > Internet. > > How does this break the

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 12:43 PM Hank Nussbacher wrote: > On 12/08/2021 17:59, William Herrin wrote: > > > If you prune the routes from the Routing Information Base instead, for > > any widely accepted size (i.e. /24 or shorter netmask) you break the > > Internet. > > How does this break the

Re: "Tactical" /24 announcements

2021-08-12 Thread Jon Lewis
On Thu, 12 Aug 2021, Tom Hill wrote: On 11/08/2021 14:09, Jon Lewis wrote: What sort of hands-on experience is this opinion based on? Having an upstream provider that did it, in a very aggressive fashion. Odds are, they did it wrong, and you had no control and limited, if any, visibility

Re: "Tactical" /24 announcements

2021-08-12 Thread Hank Nussbacher
On 12/08/2021 17:59, William Herrin wrote: If you prune the routes from the Routing Information Base instead, for any widely accepted size (i.e. /24 or shorter netmask) you break the Internet. How does this break the Internet? I would think it would just result in sub-optimal routing

Re: "Tactical" /24 announcements

2021-08-12 Thread William Herrin
On Thu, Aug 12, 2021 at 7:44 AM Tom Hill wrote: > On 11/08/2021 14:09, Jon Lewis wrote: > > At least one major network hardware vendor has implemented it as a > > feature. Turn it on, and the "deaggregates" with same next-hop as an > > aggregate are not programmed into the FIB. The savings will

Re: "Tactical" /24 announcements

2021-08-12 Thread Tom Hill
On 11/08/2021 14:09, Jon Lewis wrote: > What sort of hands-on experience is this opinion based on? Having an upstream provider that did it, in a very aggressive fashion. > I've done this manually in the past (quite some time ago), and done > properly, it works fine. > > At least one major

Re: "Tactical" /24 announcements

2021-08-11 Thread Mark Tinka
On 8/11/21 12:24, Tom Hill wrote: Such anti-disaggregation/save-my-TCAM efforts really do not work, and will spawn all manner of support tickets. I'm saying this in the hope that it may prevent someone from reading this thread and concluding that it may be a good idea to try. It is not.

Re: "Tactical" /24 announcements

2021-08-11 Thread Jon Lewis
On Wed, 11 Aug 2021, Tom Hill wrote: On 10/08/2021 07:15, Lukas Tribus wrote: Are there any big networks that drop or penalize announcements like this? It's possible you could get your peering request denied for this. I have put *reasonable* prefix aggregation into peering requirements for

Re: "Tactical" /24 announcements

2021-08-11 Thread Lukas Tribus
On Wed, 11 Aug 2021 at 12:24, Tom Hill wrote: > > On 10/08/2021 07:15, Lukas Tribus wrote: > >> Are there any big networks that drop or penalize announcements like this? > > It's possible you could get your peering request denied for this. I > > have put *reasonable* prefix aggregation into

Re: "Tactical" /24 announcements

2021-08-11 Thread Mark Tinka
On 8/11/21 12:07, Tom Hill wrote: 2914 permit you to leak prefixes as specific as a /28 between your own ports with them. Someone once referred to it as a 'sneaky backhaul', believe. Given that there's no default in 2914, I guess that counts? :D I suppose some arrangement between you and

Re: "Tactical" /24 announcements

2021-08-11 Thread Tom Hill
On 10/08/2021 07:15, Lukas Tribus wrote: >> Are there any big networks that drop or penalize announcements like this? > It's possible you could get your peering request denied for this. I > have put *reasonable* prefix aggregation into peering requirements for > some years now. If you are a small

Re: "Tactical" /24 announcements

2021-08-11 Thread Tom Hill
On 10/08/2021 12:31, Mark Tinka wrote: > Been waiting for the day when /27's, /28's and /29's are going to make > it into the DFZ, as was promised 5 or more years ago :-). 2914 permit you to leak prefixes as specific as a /28 between your own ports with them. Someone once referred to it as a

Re: "Tactical" /24 announcements

2021-08-10 Thread Mark Tinka
On 8/9/21 19:38, Tom Beecher wrote: Folks can announce longer than 24 masks all day. They're unlikely to propagate very far though, since most won't accept longer than 24 from the world at large. Been waiting for the day when /27's, /28's and /29's are going to make it into the DFZ, as

Re: "Tactical" /24 announcements

2021-08-10 Thread Masataka Ohta
Sabri Berisha wrote: Just for fun, I did the math. A total of 16,777,216 /24s fit in 32 bits. Take away all the reserved space as per IANA (this is 1,266,696 /24s, see below), > 240.0.0.0/41048576 I think we should also take away multicast addresses of > 224.0.0.0/41048576

Re: "Tactical" /24 announcements

2021-08-10 Thread Lukas Tribus
On Mon, 9 Aug 2021 at 17:47, Billy Croan wrote: > Are there any big networks that drop or penalize announcements like this? It's possible you could get your peering request denied for this. I have put *reasonable* prefix aggregation into peering requirements for some years now. If you are a

Re: "Tactical" /24 announcements

2021-08-09 Thread Lady Benjamin Cannon of Glencoe, ASCE
This will break the internet at scale. No. Ms. Lady Benjamin PD Cannon of Glencoe, ASCE 6x7 Networks & 6x7 Telecom, LLC CEO l...@6by7.net "The only fully end-to-end encrypted global telecommunications company in the world.” FCC License KJ6FJJ Sent from my iPhone via RFC1149. > On Aug 9,

Re: "Tactical" /24 announcements

2021-08-09 Thread Robert McKay
On 2021-08-09 22:39, Baldur Norddahl wrote: man. 9. aug. 2021 22.13 skrev Grzegorz Janoszka : On 2021-08-09 17:47, Billy Croan wrote: How does the community feel about using /24 originations in BGP as a tactical advantage against potential bgp hijackers? RPKI is more effective than a

Re: "Tactical" /24 announcements

2021-08-09 Thread Baldur Norddahl
man. 9. aug. 2021 22.13 skrev Grzegorz Janoszka : > On 2021-08-09 17:47, Billy Croan wrote: > > How does the community feel about using /24 originations in BGP as a > > tactical advantage against potential bgp hijackers? > > RPKI is more effective than a competing /24. Unless they hijack you ASn

Re: "Tactical" /24 announcements

2021-08-09 Thread Grzegorz Janoszka
On 2021-08-09 17:47, Billy Croan wrote: How does the community feel about using /24 originations in BGP as a tactical advantage against potential bgp hijackers? RPKI is more effective than a competing /24. Unless they hijack you ASn as well. -- Grzegorz Janoszka

Re: "Tactical" /24 announcements

2021-08-09 Thread Amir Herzberg
Bill said, > > Is this seen as route table pollution, or a necessary evil in today's > world? > > Pollution. And it won't save you from a hijack either, since your > adversary's /24 routes will compete and win for at least part of the > Internet. > I agree, of course, that moving to announce

Re: "Tactical" /24 announcements

2021-08-09 Thread William Herrin
On Mon, Aug 9, 2021 at 10:31 AM Sabri Berisha wrote: > Just for fun, I did the math. A total of 16,777,216 /24s fit in 32 bits. Take > away all the reserved space as per IANA (this is 1,266,696 /24s, see below), > and we end up with 16,777,216 - 1,266,696 = 15,510,520 potential /24 >

Re: "Tactical" /24 announcements

2021-08-09 Thread Rabbi Rob Thomas
Dear team, I have resorted to more specific announcements during hijacks, though with only one purpose in mind: To buy us a bit of time while the upstreams and peers put blocks in place to thwart the hijack as close to the source as possible. The more specifics are an imperfect solution, since

Re: "Tactical" /24 announcements

2021-08-09 Thread Chris Cummings
I prefer the approach of disaggregating only when needed, not as a preventative measure. There are tools that can help with automating this disaggregation (ARTEMIS can do this, for example). — Chris On Mon, Aug 9, 2021 at 10:50 AM Billy Croan wrote: > How does the community feel about using

Re: "Tactical" /24 announcements

2021-08-09 Thread Tom Beecher
Folks can announce longer than 24 masks all day. They're unlikely to propagate very far though, since most won't accept longer than 24 from the world at large. To the OP, there are some valid reasons to strategically deaggregate here and there, but a blanket "yolo my entire allocation into /24s"

Re: "Tactical" /24 announcements

2021-08-09 Thread Hank Nussbacher
On 09/08/2021 18:47, Billy Croan wrote: How does the community feel about using /24 originations in BGP as a tactical advantage against potential bgp hijackers? All of our allocations are larger and those prefixes we announce for clients as well usually are. But we had a request recently to

Re: "Tactical" /24 announcements

2021-08-09 Thread Sabri Berisha
- On Aug 9, 2021, at 9:22 AM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote: Hi, > It should be 14M. Just for fun, I did the math. A total of 16,777,216 /24s fit in 32 bits. Take away all the reserved space as per IANA (this is 1,266,696 /24s, see below), and we end up with

Re: "Tactical" /24 announcements

2021-08-09 Thread William Herrin
On Mon, Aug 9, 2021 at 9:24 AM Masataka Ohta wrote: > William Herrin wrote: > > I did some math on this years ago and it worked out to about 8.5 > > million IPv4 routes. > > It should be 14M. Doubtful. Like I said, I did the math. The question I asked at the time was: If: IPv6 fails to overtake

Re: "Tactical" /24 announcements

2021-08-09 Thread Masataka Ohta
William Herrin wrote: I did some math on this years ago and it worked out to about 8.5 million IPv4 routes. It should be 14M. Worse, it will be reached unless we stop doing multihoming by routing, which is selfish. Masataka Ohta

Re: "Tactical" /24 announcements

2021-08-09 Thread Adam Thompson
Yes, it is bad practice. Yes, it's polluting the route table. If the # of /24s involved is not ridiculously large (say, <64?) them I would go ahead, as long as IRR and/or RPKI are also updated. Obviously if everyone did it (i.e. advertising /24s exclusively) then our FIBs would collectively

Re: "Tactical" /24 announcements

2021-08-09 Thread Saku Ytti
On Mon, 9 Aug 2021 at 19:07, Martijn Schmidt via NANOG wrote: > It's route table pollution if you ask me.. in today's world we have many > IXPs and several tier-1 operators that support RPKI ROV, so when you > have issued ROAs for the supernet of the IP space in question it'll > already

Re: "Tactical" /24 announcements

2021-08-09 Thread William Herrin
On Mon, Aug 9, 2021 at 8:48 AM Billy Croan wrote: > How does the community feel about using /24 originations in BGP as a > tactical advantage against potential bgp hijackers? > How many routers out there today would be affected if everyone did this? Hi Billy, I did some math on this years ago

Re: "Tactical" /24 announcements

2021-08-09 Thread Martijn Schmidt via NANOG
It's route table pollution if you ask me.. in today's world we have many IXPs and several tier-1 operators that support RPKI ROV, so when you have issued ROAs for the supernet of the IP space in question it'll already significantly reduce the effects of a BGP hijack. Best regards, Martijn On