Cameron, People filter in different ways and for different reasons: eg. At a small scale people filter based on prefixes. At a larger scale people will filter based from, say, an AS-MACRO which turns into prefixes. At a very large scale it might be ASPATH only as the number of prefixes from a customer might be too hard to deal with (ie. just sheer size of the configs on a router). At a certain size it's just too hard to filter. Some of our peers we can't successfully filter as their AS-MACRO alone is too large to successfully process and place on a router. (These are peers where we see 40k+ prefixes). Then you're down to max-prefix "filtering" which might allow you to stop really dumb things - ie. full table leak, but doesn't stop the insidious things like leaking other people's prefixes where they may only have to send a few prefixes. Some people make a deal out of having "unfiltered" transit - I guess it's okay if you have no systems in place for updating the filters automagically, but typically you can't get advanced features such as remote triggered blackholes unless you are filtered. There are some hybrid approaches people use - eg. they filter customers/peers from sending "largenets" (eg. Tier1 ASes such as 3356, 3549, 1239 etc as well as things like 15169 (Google) and 22822 (Limelight) etc). At a larger scale you might end up with a mishmash of various things: eg. - We have strict filtering on customers and ask them to tell us their prefixes. - We register all our prefixes with a registry (AS-4739 on rr.ntt.nethttp://rr.ntt.net - historical reasons) so our transit is filtered plus we have a good idea of what prefixes we're meant to carry. - We filter by AS-MACRO as much as we can with peers - We filter outbound our own routes against our own internal registry amongst other techniques. But some places are hard: eg. we're at some MLPA based exchanges where there's no useable filter. Some bilateral peers don't register their routes. There are places where ugliness happens. Every now and again we have issues with peers leaking routes - either ours or someone elses and you need to have an operational technique to fix this. My big issue with going for "unfiltered" transit is you can't have remote triggered blackholes, which are a useful technique for protecting you against DDoS by getting your transit to sink the traffic. It's not to hard to figure out a system that allows your own filtered customers to go and announce prefixes to black hole and then back-to-back it with your transit. MMC On 02/03/2011, at 8:00 AM, Cameron Kerr wrote: Hi everyone, I'm just updating my lecture on exteriour routing for this year, and am wanting to know more about the current state of unfiltered BGP, whereby a customer can advertise a prefix they don't have, their service provider didn't suitably filter the advertisement, and it disrupts other networks in the internet. My previous impression, based on discussions around incidents such as the YouTube/Pakistan incident, lead to me believe "Most people don't filter", and I'm just wanting to see if that is [still] the case now. (Also, thanks to Andy for the NRO nudge) Cheers, Cameron _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nzmailto:NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog -- Matthew Moyle-Croft Peering Manager and Team Lead - Commercial and DSLAMs Internode /Agile Level 5, 150 Grenfell Street, Adelaide, SA 5000 Australia Email: mmc(a)internode.com.aumailto:mmc(a)internode.com.au Web: http://www.on.nethttp://www.on.net/ Direct: +61-8-8228-2909 Mobile: +61-419-900-366 Reception: +61-8-8228-2999 Fax: +61-8-8235-6909