route ingress

Vadim Antonov avg at
Wed Jan 7 11:33:27 UTC 1998

The issue here is people deliberately injecting bogus routing information.
Any "chain of trust" systems break down if there's somebody abusing the
trust.  This means that tier-1 ISPs shouldn't trust routing information
coming from tier-2 ISPs, etc.  That leaves the only workable option -
cryptographical authentication of routes, by the presense of signature
by a trusted address space registry.


Date: Wed, 7 Jan 1998 12:39:26 +0300 (MSK)
From: "Alex P. Rudnev" <alex at>
To: Vadim Antonov <avg at>

I am sorry, but what for do you want it? Why is not efficient to use AS 
identification in conjuction to IP prefix filtering at the 1't level ISPs 
(and may be 2'nd level too), based on the NIC data base.

On Tue, 6 Jan 1998, Vadim Antonov wrote:

> Date: Tue, 06 Jan 1998 13:23:47 -0800
> From: Vadim Antonov <avg at>
> To: "Sean M. Doran" <smd at>, nanog at
> Subject: Re: route ingress
> Sean M. Doran wrote:
> > Vadim Antonov ?avg at writes:
> >
> > ? The only real solution is strong cryptographical authentication of
> > ? the ownership of routing prefixes.   For some reason i do not see
> > ? any serious work in that direction being done.
> >
> > This would be much easier if we had a bottom-up
> > hierarchical addressing structure rather than the
> > current top-down one.
> I quite agree with that (though i'm not convinced that "bottom->top"
> allocation combined with recursive NATting is the best architecture).
> However, this does not preclude doing authentication with the current
> routing system.
> --vadim

More information about the NANOG mailing list