DDoS mitigation services, particularly those that dynamically announce more 
specific routes during an attack, add complexity when advising customers on 
creating their RPKI-ROAs. Smaller organizations, often served by networks that 
provide DDoS mitigation on their behalf, might be unaware of these services or 
lack an understanding of how traffic is rerouted.

In some cases, you can identify customers of DDoS mitigation services by 
looking at as-sets published by these providers or by investigating related IRR 
objects for the IP addresses. However, this approach isn’t reliable.

Currently, there’s no established best practice for helping organizations 
determine the correct ROAs to create. This can lead to confusion, especially 
when DDoS mitigation is involved.

ARIN plans to implement a check in their hosted RPKI interface that will help 
validate proposed ROAs against the current global routing table. While this 
feature will be useful, there is a risk that it could give DDoS mitigation 
customers a false sense of security. They might create ROAs that inadvertently 
block their DDoS scrubbing service from functioning properly.

I’d like to engage with stakeholders in this space to explore opportunities for 
improvement. Any suggestions or input on this topic would be greatly 
appreciated.

thanks,


steven


Steven Wallace
Director - Routing Integrity
Internet2
s...@internet2.edu

Reply via email to