How common is unfiltered BGP?
Hi everyone, I'm just updating my lecture on exteriour routing for this year, and am wanting to know more about the current state of unfiltered BGP, whereby a customer can advertise a prefix they don't have, their service provider didn't suitably filter the advertisement, and it disrupts other networks in the internet. My previous impression, based on discussions around incidents such as the YouTube/Pakistan incident, lead to me believe "Most people don't filter", and I'm just wanting to see if that is [still] the case now. (Also, thanks to Andy for the NRO nudge) Cheers, Cameron
Cameron,
We only have one upstream which does not filter and we have filtered since day zero.
The upstream who does not filter originally did filter us, but removed filtering specifically for our asn as they had an issue with their filter management code that wouldn't accept certain AS paths and due to their size and the time it would take to fix being too long, it was easier to jump through some compliance hoops with them than for them to keep filtering.
I would in my experience, even with Large US Tier 1's not say that filtering is the exception at all.
Kind Regards,
David Hooton
Managing Director
Platform Networks
www.platformnetworks.net
Ethernet Over Copper coverage in over 2000 exchanges nationally - Ask me about it!
----- Original Message -----
From: Cameron Kerr [mailto:ckerr(a)cs.otago.ac.nz]
Sent: Wednesday, March 02, 2011 08:30 AM
To: nznog
On 03/02/2011 10:30 AM, Cameron Kerr wrote: Hi Cameron,
Hi everyone, I'm just updating my lecture on exteriour routing for this year, and am wanting to know more about the current state of unfiltered BGP, whereby a customer can advertise a prefix they don't have, their service provider didn't suitably filter the advertisement, and it disrupts other networks in the internet.
I can't find a proper reference, but I think I saw a paper checking on that, or an ongoing experiment testing for that. You might find useful information from the discussions at NANOG around the following events: - The BGP hijack from China - The RIPE/Duke experiment Also worth to take a look at the BGP Beacon experiment (http://www.psg.com/~zmao/BGPBeacon.html) and the Renesys Blog (www.renesys.com/blog).
From NANOG meetings I found a presentation about BGP filtering, but it's outdated.
http://www.nanog.org/meetings/nanog35/abstracts.php?pt=NDU5Jm5hbm9nMzU=&nm=nanog35
My previous impression, based on discussions around incidents such as the YouTube/Pakistan incident, lead to me believe "Most people don't filter", and I'm just wanting to see if that is [still] the case now.
(Also, thanks to Andy for the NRO nudge)
Cheers, Cameron
_______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
Cheers, -- Sebastian Castro DNS Specialist .nz Registry Services (New Zealand Domain Name Registry Limited) desk: +64 4 495 2337 mobile: +64 21 400535
Cameron, People filter in different ways and for different reasons: eg. At a small scale people filter based on prefixes. At a larger scale people will filter based from, say, an AS-MACRO which turns into prefixes. At a very large scale it might be ASPATH only as the number of prefixes from a customer might be too hard to deal with (ie. just sheer size of the configs on a router). At a certain size it's just too hard to filter. Some of our peers we can't successfully filter as their AS-MACRO alone is too large to successfully process and place on a router. (These are peers where we see 40k+ prefixes). Then you're down to max-prefix "filtering" which might allow you to stop really dumb things - ie. full table leak, but doesn't stop the insidious things like leaking other people's prefixes where they may only have to send a few prefixes. Some people make a deal out of having "unfiltered" transit - I guess it's okay if you have no systems in place for updating the filters automagically, but typically you can't get advanced features such as remote triggered blackholes unless you are filtered. There are some hybrid approaches people use - eg. they filter customers/peers from sending "largenets" (eg. Tier1 ASes such as 3356, 3549, 1239 etc as well as things like 15169 (Google) and 22822 (Limelight) etc). At a larger scale you might end up with a mishmash of various things: eg. - We have strict filtering on customers and ask them to tell us their prefixes. - We register all our prefixes with a registry (AS-4739 on rr.ntt.nethttp://rr.ntt.net - historical reasons) so our transit is filtered plus we have a good idea of what prefixes we're meant to carry. - We filter by AS-MACRO as much as we can with peers - We filter outbound our own routes against our own internal registry amongst other techniques. But some places are hard: eg. we're at some MLPA based exchanges where there's no useable filter. Some bilateral peers don't register their routes. There are places where ugliness happens. Every now and again we have issues with peers leaking routes - either ours or someone elses and you need to have an operational technique to fix this. My big issue with going for "unfiltered" transit is you can't have remote triggered blackholes, which are a useful technique for protecting you against DDoS by getting your transit to sink the traffic. It's not to hard to figure out a system that allows your own filtered customers to go and announce prefixes to black hole and then back-to-back it with your transit. MMC On 02/03/2011, at 8:00 AM, Cameron Kerr wrote: Hi everyone, I'm just updating my lecture on exteriour routing for this year, and am wanting to know more about the current state of unfiltered BGP, whereby a customer can advertise a prefix they don't have, their service provider didn't suitably filter the advertisement, and it disrupts other networks in the internet. My previous impression, based on discussions around incidents such as the YouTube/Pakistan incident, lead to me believe "Most people don't filter", and I'm just wanting to see if that is [still] the case now. (Also, thanks to Andy for the NRO nudge) Cheers, Cameron _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nzmailto:NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog -- Matthew Moyle-Croft Peering Manager and Team Lead - Commercial and DSLAMs Internode /Agile Level 5, 150 Grenfell Street, Adelaide, SA 5000 Australia Email: mmc(a)internode.com.aumailto:mmc(a)internode.com.au Web: http://www.on.nethttp://www.on.net/ Direct: +61-8-8228-2909 Mobile: +61-419-900-366 Reception: +61-8-8228-2999 Fax: +61-8-8235-6909
participants (4)
-
Cameron Kerr
-
David Hooton
-
Matthew Moyle-Croft
-
Sebastian Castro