> So far the only scalable mitigation mechanism seems to be for IX operators to 
> issue ROAs and IX participants to apply ROV filtering.

> Leveraging the RPKI for this particular case is helpful because it leaves the 
> IX operator in full control whether the peering LAN prefix should be globally 
> visible or not (e.g. the IX operator can set the ROA’s origin AS to 0, or 
> originate the prefix in BGP from a designated ASN).

This should be recommended as the default (this is also the practice we follow, 
by the way). In addition, there should be a discussion of the risks of making a 
peering LAN prefix globally visible. Any IXP wishing to deviate from the 
recommendation can still do so.

The “do not accept more specifics” part is at least not harmful, but I consider 
it highly unlikely that a sufficiently large share of the member base of any 
larger IXP will implement this correctly. It’s simply not their top priority.

Kind regards,
Matthias

On 07.01.25, 18:07, "Job Snijders" <j...@sobornost.net> wrote:
On Tue, 7 Jan 2025 at 17:39, Gert Doering 
<g...@space.net<mailto:g...@space.net> 
<mailto:g...@space.net<mailto:g...@space.net>>> wrote:
On Tue, Jan 07, 2025 at 03:55:00PM +0000, Nick Hilliard wrote:
> I'd prefer the section to be dropped completely, and to leave it to
> individual IXPs to make their own minds up about what their routing policy
> should be for their address space.

I think the section "do not (never ever) accept more specifics for any
IXP lan you're connected to" is a good one, and should be kept.

We've seen accidents where peers did... whatever, and announced
more-specifics out of the DECIX FRA peering LAN, leading to interesting
outages at those ISPs who accepted the prefix. Needless waste of time
to debug that.



The existence of a Peering LAN prefix more-specific is one the worst things 
that can happen to an IX community.


So far the only scalable mitigation mechanism seems to be for IX operators to 
issue ROAs and IX participants to apply ROV filtering.


Leveraging the RPKI for this particular case is helpful because it leaves the 
IX operator in full control whether the peering LAN prefix should be globally 
visible or not (e.g. the IX operator can set the ROA’s origin AS to 0, or 
originate the prefix in BGP from a designated ASN).


The NIST recommendation seems to somewhat tip-toe around how to actually get 
things properly done.


Kind regards,


Job



_______________________________________________
GROW mailing list -- grow@ietf.org
To unsubscribe send an email to grow-le...@ietf.org

Reply via email to