Adding to Oliver's suggestion, it will be even more effective if, in the 
"origin only" case, 
the mitigator announces a slightly more specific (e.g., two /17s  for a /16) 
if the maxlength of the victim's existing ROA permits it (of course, victim’s 
AS is inserted 
as the origin AS as suggested). 
More specific wins, so the downside of one hop longer path length goes away.  

And in the full path validation case, the victim forward signs a more specific 
(if permissible by existing ROA) to the mitigator. The victim also sets pCount 
= 0 for this update.

Sriram

> From: [email protected] [[email protected]] On Behalf Of Borchert, 
> Oliver [[email protected]]
> One solution here is that the mitigator either prepends the victims AS (works 
> with "origin only") including the downside that the path is one hop longer. 
> But hey, better than nothing. For origin + path validation the victim creates 
> a bgpsec peering with the mitigator and signs the path. This can be done 
> pretty easily I guess.

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to