On Dec 18, 2012, at 3:03 PM, "Sriram, Kotikalapudi" 
<kotikalapudi.sri...@nist.gov> wrote:
> Adding to Oliver's suggestion, it will be even more effective if, in the 
> "origin only" case, 
> the mitigator announces a slightly more specific (e.g., two /17s  for a /16) 
> if the maxlength of the victim's existing ROA permits it (of course, victim’s 
> AS is inserted 
> as the origin AS as suggested). 
> More specific wins, so the downside of one hop longer path length goes away.  

Sound fine in theory, but will not work in practice.  *When* the original 
announcement is a (IPv4) /24 and all providers filter on announcements > /24 
... you're, umm, up a creek without a paddle if you don't have an ability to 
[immediately] originate the same /24 from a "proxy" AS.

Remember, there's a *lot* of "legitimate" more specifics out there already, 
primarily for the purposes of Traffic Engineering (TE).

-shane


> And in the full path validation case, the victim forward signs a more 
> specific 
> (if permissible by existing ROA) to the mitigator. The victim also sets 
> pCount = 0 for this update.
> 
> Sriram
> 
>> From: sidr-boun...@ietf.org [sidr-boun...@ietf.org] On Behalf Of Borchert, 
>> Oliver [oliver.borch...@nist.gov]
>> One solution here is that the mitigator either prepends the victims AS 
>> (works with "origin only") including the downside that the path is one hop 
>> longer. But hey, better than nothing. For origin + path validation the 
>> victim creates a bgpsec peering with the mitigator and signs the path. This 
>> can be done pretty easily I guess.
> 
> _______________________________________________
> sidr mailing list
> sidr@ietf.org
> https://www.ietf.org/mailman/listinfo/sidr
> 


_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to