2014-04-17 13:20 GMT+02:00 Tristan PILAT <tristan.pi...@gmail.com>:

> 2014-04-17 12:25 GMT+02:00 Gregory Edigarov <ediga...@qarea.com>:
>
>> On 04/17/2014 12:24 PM, Tristan PILAT wrote:
>>
>>  2014-04-15 18:42 GMT+02:00 Laurent Caron (Mobile) <
>>> lca...@unix-scripts.info>
>>> :
>>>
>>>  On 14 avril 2014 17:57:53 CEST, Tristan PILAT <tristan.pi...@gmail.com>
>>>> wrote:
>>>>
>>>>> match from any community 64514:888 set nexthop blackhole
>>>>>
>>>>>  Hi,
>>>>
>>>> Make sure you dont accept from any but eg from group customers, make
>>>> sure
>>>> the address *does* belong to your customers space (to avoid a customer
>>>> installing a blackhole route on a route you advertise).
>>>> Make sure you do strip 64514:888 from other peers.
>>>> ...
>>>>
>>>>  And what about the client side ? Which command should he enter if he
>>>>> wishes
>>>>> to blackhole ip 1.2.3.4 eg
>>>>>
>>>>> Is it something like that ? bgpctl network add 1.2.3.4/32 community
>>>>> 64514:888
>>>>>
>>>> Exactly.
>>>>
>>>> Hi,
>>>>
>>> Thanks for your reply ! I just tested this in my lab and it's working
>>> like
>>> a charm but only if I set "allow from any inet prefixlen 8 - 32" and this
>>> is annoying.
>>>
>>> Is there a way to make this work with "allow from any inet prefixlen 8 -
>>> 24" to accept /32 only for the blackhole ?
>>>
>>> --
>>> Tristan
>>>
>> like this:
>>
>>
>> allow from any inet prefixlen 8 - 24
>> allow from any inet prefixlen 32 community 64514:888
>>
>>
> That goes without saying after all :-) Thanks !
>
> --
> Tristan
>

Another question... Anyone knows if there is a way to do Source
Base Remotely-Triggered Black Hole with OpenBGPd ? eg If I am attacked by a
single IP and i want to blackhole it.

Reply via email to