[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
BCP38 - Internet Death Penalty
In message <515309EC.4070402 at brightok.net>, Jack Bates writes:
> On 3/27/2013 9:23 AM, Jay Ashworth wrote:
> > Is BCP38 *not* well enough though out even for large and medium sized
> > carriers to adopt as contractual language, much less for FCC or
> > someone to impose upon them? If so, we should work on it further.
>
> BCP38 could definitely use some work. It is correct as a general
> concept. It does not go into depth of the different available
> technologies and how they might be of use. For example, dhcp is nice,
> but it usually requires uRPF (sometimes with exceptions) depending on
> the vendor. If BGP filters are being applied, it is usually not hard to
> apply packet filtering according to the same route filters. Some NSPs
> use traditional ingress filtering, while others have uRPF enabled with
> exception lists. Some require that you send all networks, but set
> communities for networks you don't want routed yet allowed via uRPF
> (which usually means anyone connected to the same router as you will
> still route your way).
Technologies change. Concepts rarely do. BCP38 is technology neutral.
> It's also not a bad idea for an ISP to deploy EGRESS filters if they do
> not offer BGP Transit services. This way they are not depending on their
> transit providers to handle spoof protection and they cover their entire
> network regardless of last mile ingress filtering. This doesn't
> generally work well when doing transit services of any size due to the
> number of egress filter updates you'd have to issue, but it is great for
> the small/medium ISP.
EGRESS filters are just INGRESS filters applied a couple of hops later.
> Jack
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org