> Good use-case for > https://datatracker.ietf.org/doc/draft-ietf-grow-bmp-adj-rib-out and > snapshot auditing before and after changes. Leak didn't last long but > it could have been caught within milliseconds verses minutes via oh > sh** alarms.
[ i happen to like bmp, but ... ] if the sender did not have the automation or the mops to not leak in the first place, how well will they apply post hoc detection and repair? if the receiver did not filter, and an tier-1 as-path filter would have sufficed in this case, how well do you think they will be at applying post hoc detection and repair? this was an easily preventable ops failure. but what we will do is go to idr and grow and invent 42 more hacks, kinda like ipv6 transition mechanisms. </snark> randy