Re: Route leak in Bangladesh

2015-07-03 Thread Mark Tinka
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 2/Jul/15 19:48, Hugo Slabbert wrote: Jeebuz; you accept /128s? Perhaps le 24 le 48? Yes, that was a typo - /48 :-). Mark. -BEGIN PGP SIGNATURE- iQIcBAEBCAAGBQJVlixgAAoJEGcZuYTeKm+GLRQP/2HjuqFJW+pzhuH9qSbltl1D

Re: Route leak in Bangladesh

2015-07-02 Thread Hugo Slabbert
On Wed 2015-Jul-01 17:02:13 +0200, Mark Tinka mark.ti...@seacom.mu wrote: On 1/Jul/15 16:54, Nick Hilliard wrote: you probably want to ignore more rpsl constructs and depend solely on as-sets, aut-nums and route/route6 objects. RPSL is not going to live up to your expectations. Honestly,

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 1/Jul/15 17:11, Nick Hilliard wrote: The source code is available on github.com/inex. Lots of IXPs use it in production. Thanks, Nick. I'll have a bit of a sniff... Mark.

Re: Route leak in Bangladesh

2015-07-01 Thread Jared Mauch
On Wed, Jul 01, 2015 at 08:25:06AM +0200, Mark Tinka wrote: On 30/Jun/15 17:09, Job Snijders wrote: If you are a network providing transit to the leak originator mentioned in the above paragraph, I believe a prefix based filter could have made a big difference. And therein lies the

Re: Route leak in Bangladesh

2015-07-01 Thread Nick Hilliard
On 01/07/2015 15:57, Mark Tinka wrote: Remember some high-end Cisco routers only have 2MB of NVRAM. This could get tested with a large prefix-list configuration. Junos may not have much of a space issue since the configuration is stored on the compact flash or HDD. Not at all. Even C6500

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 1/Jul/15 17:04, Nick Hilliard wrote: Naah, trie compilation is simple, particularly with a line oriented configuration like IOS (one of the worse offenders). Once the config is syntax-checked, a regexp will split it out trivially and the binary form of the data can be compiled. Even on

Re: Route leak in Bangladesh

2015-07-01 Thread Mike Hammett
Mauch ja...@puck.nether.net Cc: North American Network Operators' Group nanog@nanog.org Sent: Wednesday, July 1, 2015 10:11:13 AM Subject: Re: Route leak in Bangladesh On 01/07/2015 16:02, Mark Tinka wrote: Honestly, I'm ambivalent about using the IRR data for prefix-list generation (even

Re: Route leak in Bangladesh

2015-07-01 Thread Nick Hilliard
On 01/07/2015 16:02, Mark Tinka wrote: Honestly, I'm ambivalent about using the IRR data for prefix-list generation (even without RPSL), also because of how much junk there is in there, and also how redundant some of it really is, e.g., someone creating a /32 (IPv4) route object and yet we

Re: Route leak in Bangladesh

2015-07-01 Thread Nick Hilliard
On 01/07/2015 15:12, Jared Mauch wrote: I would like to see others participate in the dialog with vendors so we don't seem to be quite an outlier with wow, you have really large configs. The vendors haven't quite kept pace with the increase in density proportional to the number of

Re: Route leak in Bangladesh

2015-07-01 Thread Nick Hilliard
On 01/07/2015 15:51, Mark Tinka wrote: I found RPSL complicated a few years ago, and sort of put that on the back-burner. you probably want to ignore more rpsl constructs and depend solely on as-sets, aut-nums and route/route6 objects. RPSL is not going to live up to your expectations. Nick

Re: Route leak in Bangladesh

2015-07-01 Thread Nick Hilliard
On 01/07/2015 17:03, Joe Abley wrote: The idea of configuring this stuff from the IRR is great in terms of distributing the ops cycles in the right places, but it doesn't help with verifying that the end result isn't insane, as I think you and Mike have described on this list over the past

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 1/Jul/15 16:54, Nick Hilliard wrote: you probably want to ignore more rpsl constructs and depend solely on as-sets, aut-nums and route/route6 objects. RPSL is not going to live up to your expectations. Honestly, I'm ambivalent about using the IRR data for prefix-list generation (even

Re: Route leak in Bangladesh

2015-07-01 Thread Jared Mauch
On Wed, Jul 01, 2015 at 03:54:16PM +0100, Nick Hilliard wrote: On 01/07/2015 15:51, Mark Tinka wrote: I found RPSL complicated a few years ago, and sort of put that on the back-burner. you probably want to ignore more rpsl constructs and depend solely on as-sets, aut-nums and route/route6

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 1/Jul/15 16:52, Nick Hilliard wrote: This is a strange sort of thing really. There's no reason that a compiled prefix list of 250k entries should take up much RAM in a trie structure; there's no reason that a competently written parser shouldn't be able to handle 20 megs of prefix lists

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 1/Jul/15 16:12, Jared Mauch wrote: I would like to see others participate in the dialog with vendors so we don't seem to be quite an outlier with wow, you have really large configs. The vendors haven't quite kept pace with the increase in density proportional to the number of

Re: Route leak in Bangladesh

2015-07-01 Thread Joe Abley
On 1 Jul 2015, at 11:03, Jared Mauch wrote: On Wed, Jul 01, 2015 at 03:54:16PM +0100, Nick Hilliard wrote: On 01/07/2015 15:51, Mark Tinka wrote: I found RPSL complicated a few years ago, and sort of put that on the back-burner. you probably want to ignore more rpsl constructs and depend

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 30/Jun/15 17:04, Nick Hilliard wrote: plus: - fully automate ingress prefix management - use maxprefixes with manual reenable on all ebgp sessions Yes, good point - forgot about that one; default max-prefix for all eBGP sessions. Mark.

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
On 30/Jun/15 17:09, Job Snijders wrote: If you are a network providing transit to the leak originator mentioned in the above paragraph, I believe a prefix based filter could have made a big difference. And therein lies the secret sauce. Given that we've had an incident like this twice in

Re: Route leak in Bangladesh

2015-07-01 Thread Mark Tinka
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 30/Jun/15 16:53, Sandra Murphy wrote: That sort of AS_PATH filtering would not have helped in this case. The AS originated the routes, it did not propagate an upstream route. So an AS_PATH filter to just its own AS would have passed

Route leak in Bangladesh

2015-06-30 Thread Grzegorz Janoszka
We have just received alert from bgpmon that AS58587 Fiber @ Home Limited has hijacked most of our (AS43996) prefixes and Hurricane Electric gladly accepted them. Anybody see their prefixes hijacked as well? -- Grzegorz Janoszka

Re: Route leak in Bangladesh

2015-06-30 Thread Randy Bush
be nice if some technical details were included

Re: Route leak in Bangladesh

2015-06-30 Thread Hank Nussbacher
At 10:27 30/06/2015 +0200, Grzegorz Janoszka wrote: We have just received alert from bgpmon that AS58587 Fiber @ Home Limited has hijacked most of our (AS43996) prefixes and Hurricane Electric gladly accepted them. Anybody see their prefixes hijacked as well? Welcome to the party :-) Not

Re: Route leak in Bangladesh

2015-06-30 Thread Matsuzaki Yoshinobu
A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they already fixed that. - Matsuzaki Yoshinobu m...@iij.ad.jp - IIJ/AS2497 INOC-DBA: 2497*629 In message 559252e9.6030...@janoszka.pl Date: Tue, 30 Jun 2015 10:27:21

Re: Route leak in Bangladesh

2015-06-30 Thread Matsuzaki Yoshinobu
Randy Bush ra...@psg.com wrote A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they already fixed that. 7007 all over again. do not redistribute bgp into igp. do not redistribute igp into bgp. I also suggested

Re: Route leak in Bangladesh

2015-06-30 Thread Mark Tinka
On 30/Jun/15 15:22, Matsuzaki Yoshinobu wrote: I also suggested them to implement BGP community based route filtering in their outbound policy. Any other suggestions or thoughts to prevent such incidents in general? - Get your downstreams to create route objects before you turn them up.

Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 10:22:38PM +0900, Matsuzaki Yoshinobu wrote: Randy Bush ra...@psg.com wrote A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they already fixed that. 7007 all over again. do not

Re: Route leak in Bangladesh

2015-06-30 Thread Hank Nussbacher
At 18:03 30/06/2015 +0900, Randy Bush wrote: be nice if some technical details were included Your prefix: xx.104.150.0/24: Prefix Description: Update time: 2015-06-30 07:39 (UTC) Detected by #peers: 8 Detected prefix: xx.104.150.0/24 Announced by: AS58587

Re: Route leak in Bangladesh

2015-06-30 Thread Joe Abley
On 30 Jun 2015, at 9:41, Job Snijders wrote: In addition to the BGP community scheme, outbound as-path filters could help. I agree, but possibly not in the case of a redistribution loop. (We don't know that's what happened, exactly, but I thought it was worth mentioning.) Joe

Re: Route leak in Bangladesh

2015-06-30 Thread Justin M. Streiner
On Tue, 30 Jun 2015, Matsuzaki Yoshinobu wrote: Randy Bush ra...@psg.com wrote A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they already fixed that. 7007 all over again. do not redistribute bgp into igp. do not

Re: Route leak in Bangladesh

2015-06-30 Thread Sandra Murphy
On Jun 30, 2015, at 10:39 AM, Justin M. Streiner strei...@cluebyfour.org wrote: On Tue, 30 Jun 2015, Matsuzaki Yoshinobu wrote: Randy Bush ra...@psg.com wrote A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they

Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 09:44:12AM -0400, Joe Abley wrote: On 30 Jun 2015, at 9:41, Job Snijders wrote: In addition to the BGP community scheme, outbound as-path filters could help. I agree, but possibly not in the case of a redistribution loop. (We don't know that's what happened,

Re: Route leak in Bangladesh

2015-06-30 Thread Nick Hilliard
On 30/06/2015 14:29, Mark Tinka wrote: - Get your downstreams to create route objects before you turn them up. - Get your provisioning teams to validate the prefixes being provided by your downstreams. - Use both prefix- and AS_PATH-based filters for your downstreams. - Use

Re: Route leak in Bangladesh

2015-06-30 Thread Graham Beneke
On 30/06/2015 17:09, Job Snijders wrote: If you were the network causing a leak of this type, prefix filters on inbound facing your customers might not have prevented this. If you are a network providing transit to the leak originator mentioned in the above paragraph, I believe a prefix

Re: Route leak in Bangladesh

2015-06-30 Thread Mark Tinka
On 30/Jun/15 16:24, Job Snijders wrote: In this specific situation, for a small to medium sized network, it might be prudent to apply an outbound prefix-filter on all transit peering sessions and thus only allowing prefixes which actually belong to downstream customers and the network

Re: Route leak in Bangladesh

2015-06-30 Thread Andree Toonk
Some more data from BGPmon.net: This affected close to 28,000 prefixes from 4,477 unique Autonomous systems. The hijacks were originated by AS58587 and propagated via AS45796 (15,002 prefixes) and AS6939 (25,841). The AS45796 paths were only seen via one of our peers, while the AS6939 path had a

Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 04:38:48PM +0200, Mark Tinka wrote: On 30/Jun/15 16:24, Job Snijders wrote: In this specific situation, for a small to medium sized network, it might be prudent to apply an outbound prefix-filter on all transit peering sessions and thus only allowing prefixes which

Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 10:53:45AM -0400, Sandra Murphy wrote: That sort of AS_PATH filtering would not have helped in this case. The AS originated the routes, it did not propagate an upstream route. So an AS_PATH filter to just its own AS would have passed these routes. You would need

Re: Route leak in Bangladesh

2015-06-30 Thread Sandra Murphy
On Jun 30, 2015, at 9:41 AM, Job Snijders j...@instituut.net wrote: In addition to the BGP community scheme, outbound as-path filters could help. Most network's list of transit providers is fairly static, it would be easiy with as-path filters to prevent announcing upstream routes to other

Re: Route leak in Bangladesh

2015-06-30 Thread Justin M. Streiner
On Tue, 30 Jun 2015, Sandra Murphy wrote: On Jun 30, 2015, at 10:39 AM, Justin M. Streiner strei...@cluebyfour.org wrote: At a minimum, AS-PATH filtering of outgoing routes to just your ASN(s) and your downstream customer ASNs. Whether this is done manually, built using AS-SETs from your

Re: Route leak in Bangladesh

2015-06-30 Thread Suresh Ramasubramanian
I have sent this to a contact at another Bangladeshi ISP that should be able to reach the right person for this ASAP. On 30-Jun-2015, at 1:57 pm, Grzegorz Janoszka grzeg...@janoszka.pl wrote: We have just received alert from bgpmon that AS58587 Fiber @ Home Limited has hijacked most of our

Re: Route leak in Bangladesh

2015-06-30 Thread Randy Bush
A friend in AS58587 confirmed that this was caused by a configuration error - it seems like related to redistribution, and they already fixed that. 7007 all over again. do not redistribute bgp into igp. do not redistribute igp into bgp. randy

RE: Route leak in Bangladesh

2015-06-30 Thread Adam Datacenter - NOC
: nanog@nanog.org Asunto: Route leak in Bangladesh We have just received alert from bgpmon that AS58587 Fiber @ Home Limited has hijacked most of our (AS43996) prefixes and Hurricane Electric gladly accepted them. Anybody see their prefixes hijacked as well? -- Grzegorz Janoszka