BCP38 adoption "incentives"?

Joe Klein jsklein at gmail.com
Tue Sep 27 13:52:38 UTC 2016

What would it take to test for BCP38 for a specific AS?

Joe Klein
"Inveniam viam aut faciam"

PGP Fingerprint: 295E 2691 F377 C87D 2841 00C1 4174 FEDF 8ECF 0CC8

On Tue, Sep 27, 2016 at 8:31 AM, Stephen Satchell <list at satchell.net> wrote:

> Does anyone know if any upstream and tiered internet providers include in
> their connection contracts a mandatory requirement that all
> directly-connected routers be in compliance with BCP38?
> Does anyone know if large ISPs like Comcast, Charter, or AT&T have put in
> place internal policies requiring retail/business-customer-aggregating
> routers to be in compliance with BCP38?
> Does any ISP, providing business Internet connectivity along with a block
> of IP addresses, include language in their contracts that any directly
> connected router must be in compliance with BCP38?
> I've seen a lot of moaning and groaning about how BCP38 is pretty much
> being ignored.  Education is one way to help, but that doesn't hit anyone
> in the wallet.  You have to motivate people to go out of their way to
> *learn* about BCP38; most business people are too busy with things that
> make them money to be concerned with "Internet esoterica" that doesn't add
> to the bottom line.  You have to make their ignorance SUBTRACT from the
> bottom line.
> Contracts, properly enforced, can make a huge dent in the problem of BCP38
> adoption.  At a number of levels.
> Equipment manufacturers not usually involved in this sort of thing (home
> and SOHO market) would then have market incentive to provide equipment at
> the low end that would provide BCP38 support.  Especially equipment
> manufacturers that incorporate embedded Linux in their products.  They can
> be creative in how they implement their product; let creativity blossom.
> I know, I know, BCP38 was originally directed at Internet Service
> Providers at their edge to upstreams.  I'm thinking that BCP38 needs to be
> in place at any point -- every point? -- where you have a significant-sized
> collection of systems/devices aggregated to single upstream connections.
> Particular systems/devices where any source address can be generated and
> propagated -- including compromised desktop computers, compromised light
> bulbs, compromised wireless routers, compromised you-name-it.
> (That is one nice thing about NAT -- the bad guys can't build spoofed
> packets.  They *can* build, um, "other" packets...which is a different
> subject entirely.)
> (N.B.:  Now you know why I'm trying to get the simplest possible
> definition of BCP38 into words.  The RFCs don't contain "executive
> summaries".)

More information about the NANOG mailing list