Hi Brian,

The desired outcome is that sender/receiver _negotiate_ what is or is not to be 
sent,
and the protocol merely enforces what has been agreed upon. The automatic 
enforcement
of this high-level policy, is what stops route leaks from being initiated or 
propagated.
The policy is still determined by the operators at both ends of a peering 
session.
Just like the IP addresses and ASNs, the policies have to match for BGP session 
establishment.
Unilateral misconfiguration (whether by accident or deliberate act), which 
could have introduced
or propagated route leaks, are prevented.

I have read your drafts reg route leaks however I would like to clarify one very basic question.

When any provider creates a BGP peering relation to his customer it is a common best practice among most if not all ISPs that there is a strict BGP policy applied over the session to make sure only legitimate customer blocks are advertised.

If such policy would be required to be share one could use prefix ORF.

With this in mind I am really not clear what practical vs theoretical problems you are attempting to solve ?

Best regards,
R.

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to