On 9/29/21 17:27, George Tasioulis wrote:

Hi everyone,

We recently setup a new rack at a datacenter in Greece with a BGP transit (a blend of Level3, Cogent & PCCW) from them.

Everything runs smoothly but we entered a conflict when we tried to blackhole an IP using their blackhole community while implementing fastnetmon.

Apparently they suggest that in order for them to accept my /32 announcement (using their blackhole community), it needs to have a ROA in order to be RPKI valid. Otherwise they reject it (which is why ours tests failed).

So I never had this before with other ISPs, and it got me baffled. Obviously having to log into my RPKI dashboard, add a ROA, wait till it propagates in order to be able to blackhole an IP is time consuming and of course counterproductive. To this, they suggested I can contact their support if I need to have an IP blackholed faster…

Why do they offer a blackhole community in the first place then?

Anyway, I provided my objections but obviously it’s their network they can run it however they want. Yesterday they contacted me again, and told me I can create a second ROA for each of my prefixes I announce via them, but with a /32 maxLegth, which would validate my /32 announcements.

Again, I never had to do that in the past with other datacenters, nor have I ever heard of this so I looked it up.

Looks like Job Snijders clearly states that this should be avoided (1^st recommendation): https://mail.lacnic.net/pipermail/lacnog/2019-May/007058.html

So here I am, asking the community for their input on this matter.
- Have you had similar issues with your transit providers in the past?
- Shouldn’t blackholing precede RPKI validation so that the “invalid” /32 announcement doesn’t matter?

- What do you think about their suggestion to add a second ROA with maxLength value of /32 – what are the implication?

Any other info/help will be greatly appreciated.


Well, if we did not imagine how the RPKI could be used to create unnecessary breakage, human being will never cease to surprise.

In short, it's a pity that they are doing this. It's needlessly complex, adds a terrible failure mode, and negates the RTBH service they are offering. I have never believed that RPKI and RTBH should be conflated; each of them is more reliable when operated on its own. I still maintain that belief.

Polluting the RPKI database with additional ROA's to account for complexities that don't add any real value certainly introduces new problems whose consequences we can't immediately foresee.

Find someone with someone at your upstream that has some idea about how networking actually works, and hit them with a clue bat.

Not sure if Job is on this list, but if he isn't, I'll loop him in anyway.

Mark.

Reply via email to