Filter on IXP

Jay Ashworth jra at
Fri Feb 28 16:00:51 UTC 2014

----- Original Message -----
> From: "Jérôme Nicolle" <jerome at>

> Le 23/02/2014 01:43, Chris Laffin a écrit :
> > It would be really cool if peering exchanges could police ntp on
> > their connected members.
> Well, THIS looks like the worst idea ever. Wasting ASIC ressources on
> IXP's dataplanes is a wet-dream for anyone willing to kill the network.
> IXP's neutrality is a key factor to maintain reasonable interconnexion
> density.
> Instead, IXPs _could_ enforce BCP38 too. Mapping the route-server's
> received routes to ingress _and_ egress ACLs on IXP ports would mitigate
> the role of BCP38 offenders within member ports. It's almost like uRPF
> in an intelligent and useable form.

Interesting.  Are you doing this?  Planning it?  Or at least researching
how well it would work?

> A noticeable side-effect is that members would be encouraged to announce
> their entire customer-cones to ensure egress trafic from a non-exchanged
> prefix would not be dropped on the IX's port.

Don't they do this already?

If you get something practical implemented on this topic, we'd be more
than pleased to see it show up on; exchange points are the
one major construct I hadn't included there, cause I didn't think it was
actually practical to do it there.  But then, I don't run one.

-- jra
Jay R. Ashworth                  Baylink                       jra at
Designer                     The Things I Think                       RFC 2100
Ashworth & Associates          2000 Land Rover DII
St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727 647 1274

More information about the NANOG mailing list