Tier 2 ingress filtering

Jay Ashworth jra at baylink.com
Thu Mar 28 19:51:49 UTC 2013


----- Original Message -----
> From: "Paul Ferguson" <fergdawgster at gmail.com>


> > The former is a first-hand transaction: if you're lying to your edge
> > carrier, he can cut you off with no collateral damage.
> 
> Of course, he has to notice it first. :-)

Sure.

> ObOpinion: It's best to *enforce* a policy which disallows a
> downstream network from sourcing spoofed packets -- and the closer to
> the "edge" you are, the better, Hierarchy is great for that. :-)

Sure; that's sort of my point: this is *much* more effectively done at 
the actual edge; I think the systemic complexity of pushing it further
in goes up as a log function -- meaning that the fact that there are 
only maybe 6000 transit networks is a red herring.

> I guess the next best thing is "Trust but verify"?

Always.  

Cheers,
-- jra
-- 
Jay R. Ashworth                  Baylink                       jra at baylink.com
Designer                     The Things I Think                       RFC 2100
Ashworth & Associates     http://baylink.pitas.com         2000 Land Rover DII
St Petersburg FL USA               #natog                      +1 727 647 1274




More information about the NANOG mailing list