Filter on IXP
jra at baylink.com
Fri Feb 28 16:00:51 UTC 2014
----- Original Message -----
> From: "Jérôme Nicolle" <jerome at ceriz.fr>
> Le 23/02/2014 01:43, Chris Laffin a écrit :
> > It would be really cool if peering exchanges could police ntp on
> > their connected members.
> Well, THIS looks like the worst idea ever. Wasting ASIC ressources on
> IXP's dataplanes is a wet-dream for anyone willing to kill the network.
> IXP's neutrality is a key factor to maintain reasonable interconnexion
> Instead, IXPs _could_ enforce BCP38 too. Mapping the route-server's
> received routes to ingress _and_ egress ACLs on IXP ports would mitigate
> the role of BCP38 offenders within member ports. It's almost like uRPF
> in an intelligent and useable form.
Interesting. Are you doing this? Planning it? Or at least researching
how well it would work?
> A noticeable side-effect is that members would be encouraged to announce
> their entire customer-cones to ensure egress trafic from a non-exchanged
> prefix would not be dropped on the IX's port.
Don't they do this already?
If you get something practical implemented on this topic, we'd be more
than pleased to see it show up on bcp38.info; exchange points are the
one major construct I hadn't included there, cause I didn't think it was
actually practical to do it there. But then, I don't run one.
Jay R. Ashworth Baylink jra at baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://www.bcp38.info 2000 Land Rover DII
St Petersburg FL USA BCP38: Ask For It By Name! +1 727 647 1274
More information about the NANOG