Configuration of Poema IX Route Server at AS210979
BGP sessions default configuration
- Passive sessions are configured toward neighbors.
- GTSM (Generalized TTL Security Mechanism - RFC5082) is disabled on sessions toward the neighbors.
- ADD-PATH capability (RFC7911) is negotiaded by default; the route server is configured as "able to send multiple paths to its peer".
Route server general behaviours
- Route server ASN is not prepended to the AS_PATH of routes announced to clients (RFC7947 section 22.214.171.124).
- Route server does implement path-hiding mitigation techniques (RFC7947 section 2.3.1).
Default filtering policy
- The route server verifies that the NEXT_HOP attribute of routes received from a client matches the IP address of the client itself.
- Routes whose AS_PATH is longer than 32 ASNs are rejected.
- The left-most ASN in the AS_PATH of any route announced to the route server must be the ASN of the announcing client.
- Routes whose AS_PATH contains private or invalid ASNs are rejected.
- Routes with an AS_PATH containing one or more of the following "transit-free" networks' ASNs are rejected.
List of "transit-free" networks' ASNs: 701, 1239, 1299, 2914, 3257, 3320, 3356, 3491, 5511, 6453, 6461, 6762, 6830, 7018, 12956, 174, 1273, 2828, 4134, 4809, 4637, 6939, 7473, 7922, 9002 * Routes with an AS_PATH containing one or more "never via route-servers" networks' ASNs are rejected.
IRRDBs prefix/origin ASN enforcement
- Origin ASN validity is enforced. Routes whose origin ASN is not authorized by the client's AS-SET are rejected.
- Announced prefixes validity is enforced. Routes whose prefix is not part of the client's AS-SET are rejected. Longer prefixes that are covered by one entry of the resulting route set are accepted.
- Route validity state is signalled to route server clients using the following BGP communities:
|Origin ASN is NOT included in client's AS-SET||65530:0||None||210979:65530:0|
|Origin ASN is included in client's AS-SET||65530:1||None||210979:65530:1|
|Prefix matched by a RPKI ROA for the authorized origin ASN||65530:2||None||210979:65530:2|
|Route authorized soley because of a client white list entry||65530:3||None||210979:65530:3|
|Prefix matched by an entry of the ARIN Whois DB dump||65530:4||None||210979:65530:4|
|Prefix is included in client's AS-SET||65530:5||None||210979:65530:5|
|Prefix is NOT included in client's AS-SET||65530:6||None||210979:65530:6|
|AS-PATH contains transit providers||65530:7||None||210979:65530:7|
RPKI BGP Prefix Origin Validation
- RPKI BGP Origin Validation of routes received by the route server is enabled.
- When an INVALID route is received by the route server, it is rejected.
- RPKI ROAs are fetched from the RIPE RPKI Validator format cache files at https://console.rpki-client.org/vrps.json, https://rpki.gin.ntt.net/api/export.json, https://rpki-validator.ripe.net/api/export.json. The following Trust Anchors are used: APNIC RPKI Root, AfriNIC RPKI Root, LACNIC RPKI Root, RIPE NCC RPKI Root, apnic, afrinic, lacnic, ripe
- A max-prefix limit is enforced; when it triggers, new routes from the announcing client are discarded.
- If no more specific limits exist for the client, the general limit of 170000 IPv4 routes and 12000 IPv6 routes is enforced.
Min/max prefix length
- Only prefixes whose length is in the following range are accepted by the route server:
- IPv4: 8-24
- IPv6: 12-48
- The following prefixes are unconditionally rejected:
|fd00::/8||any more specific prefix||DN42 Network|
- Bogon prefixes are rejected too.
|0.0.0.0/0||only the exact prefix||Default route|
|0.0.0.0/8||any more specific prefix||IANA - Local Identification|
|10.0.0.0/8||any more specific prefix||RFC 1918 - Private Use|
|127.0.0.0/8||any more specific prefix||IANA - Loopback|
|169.254.0.0/16||any more specific prefix||RFC 3927 - Link Local|
|172.16.0.0/12||any more specific prefix||RFC 1918 - Private Use|
|192.0.2.0/24||any more specific prefix||RFC 5737 - TEST-NET-1|
|126.96.36.199/24||any more specific prefix||RFC 3068 - 6to4 prefix|
|192.168.0.0/16||any more specific prefix||RFC 1918 - Private Use|
|198.18.0.0/15||any more specific prefix||RFC 2544 - Network Interconnect Device Benchmark Testing|
|198.51.100.0/24||any more specific prefix||RFC 5737 - TEST-NET-2|
|203.0.113.0/24||any more specific prefix||RFC 5737 - TEST-NET-3|
|188.8.131.52/3||any more specific prefix||RFC 5771 - Multcast (formerly Class D)|
|100.64.0.0/10||any more specific prefix||RFC 6598 - Shared Address Space|
|::/0||only the exact prefix||Default route|
|::/8||any more specific prefix||loopback, unspecified, v4-mapped|
|64:ff9b::/96||any more specific prefix||RFC 6052 - IPv4-IPv6 Translation|
|100::/8||any more specific prefix||RFC 6666 - reserved for Discard-Only Address Block|
|200::/7||any more specific prefix||RFC 4048 - Reserved by IETF|
|400::/6||any more specific prefix||RFC 4291 - Reserved by IETF|
|800::/5||any more specific prefix||RFC 4291 - Reserved by IETF|
|1000::/4||any more specific prefix||RFC 4291 - Reserved by IETF|
|2001::/33||any more specific prefix||RFC 4380 - Teredo prefix|
|2001:0:8000::/33||any more specific prefix||RFC 4380 - Teredo prefix|
|2001:2::/48||any more specific prefix||RFC 5180 - Benchmarking|
|2001:3::/32||any more specific prefix||RFC 7450 - Automatic Multicast Tunneling|
|2001:10::/28||any more specific prefix||RFC 4843 - Deprecated ORCHID|
|2001:20::/28||any more specific prefix||RFC 7343 - ORCHIDv2|
|2001:db8::/32||any more specific prefix||RFC 3849 - NON-ROUTABLE range to be used for documentation purpose|
|2002::/16||any more specific prefix||RFC 3068 - 6to4 prefix|
|3ffe::/16||any more specific prefix||RFC 5156 - used for the 6bone but was returned|
|4000::/3||any more specific prefix||RFC 4291 - Reserved by IETF|
|5f00::/8||any more specific prefix||RFC 5156 - used for the 6bone but was returned|
|6000::/3||any more specific prefix||RFC 4291 - Reserved by IETF|
|8000::/3||any more specific prefix||RFC 4291 - Reserved by IETF|
|a000::/3||any more specific prefix||RFC 4291 - Reserved by IETF|
|c000::/3||any more specific prefix||RFC 4291 - Reserved by IETF|
|e000::/4||any more specific prefix||RFC 4291 - Reserved by IETF|
|f000::/5||any more specific prefix||RFC 4291 - Reserved by IETF|
|f800::/6||any more specific prefix||RFC 4291 - Reserved by IETF|
|fc00::/7||any more specific prefix||RFC 4193 - Unique Local Unicast|
|fe80::/10||any more specific prefix||RFC 4291 - Link Local Unicast|
|fec0::/10||any more specific prefix||RFC 4291 - Reserved by IETF|
|ff00::/8||any more specific prefix||RFC 4291 - Multicast|
- IPv6 prefixes are accepted only if part of the IPv6 Global Unicast space 2000::/3.
Blackhole filtering of more specific IP prefixes can be requested by tagging them with the following BGP communities: 65534:0, 210979:666:0, 65535:666 (BLACKHOLE well-known community)
By default, routes are propagated to all the clients unless they have been explicitly configured to not receive them.
- IPv4 routes are propagated unchanged to clients.
- IPv6 routes are propagated unchanged to clients.
- Before being announced to clients, all the routes are tagged with the BLACKHOLE well-known community. The NO_EXPORT well-known community is also added.
- Blackhole filtering requests bypass any RPKI validation check and min/max length check.
Graceful BGP session shutdown
- Routes tagged with the GRACEFUL_SHUTDOWN BGP community (65535:0) have their LOCAL_PREF attribute lowered to 0.
Announcement control via BGP communities
- Routes tagged with the NO_EXPORT or NO_ADVERTISE communities received by the route server are propagated to other clients with those communities unaltered.
|Do not announce to any client||None||rt:0:210979||210979:0:210979|
|Announce to peer, even if tagged with the previous community||None||None||210979:210979:peer_as|
|Do not announce to peer||0:peer_as||rt:0:peer_as||210979:0:peer_as|
|Prepend the announcing ASN once to peer||65504:peer_as||rt:65504:peer_as||210979:65504:peer_as|
|Prepend the announcing ASN twice to peer||65505:peer_as||rt:65505:peer_as||210979:65505:peer_as|
|Prepend the announcing ASN thrice to peer||65506:peer_as||rt:65506:peer_as||210979:65506:peer_as|
|Prepend the announcing ASN once to any||None||rt:65501:210979||210979:65501:210979|
|Prepend the announcing ASN twice to any||None||rt:65502:210979||210979:65502:210979|
|Prepend the announcing ASN thrice to any||None||rt:65503:210979||210979:65503:210979|
|Add NO_EXPORT to any||None||rt:65507:210979||210979:65507:210979|
|Add NO_ADVERTISE to any||None||rt:65508:210979||210979:65508:210979|
|Add NO_EXPORT to peer||65509:peer_as||rt:65509:peer_as||210979:65509:peer_as|
|Add NO_ADVERTISE to peer||65510:peer_as||rt:65510:peer_as||210979:65510:peer_as|
The following values are used to identify the reason for which routes are rejected. This is mostly used for troubleshooting, internal reporting purposes, looking glasses or in the route server log files.
Routes which are rejected are tagged with the BGP community that represents the reason for which they were discarded.
|0||Generic code: the route must be treated as rejected||65531:0||None||210979:65531:0|
|1||Invalid AS_PATH length||65531:1||None||210979:65531:1|
|2||Prefix is bogon||65531:2||None||210979:65531:2|
|3||Prefix is in global blacklist||65531:3||None||210979:65531:3|
|6||Invalid left-most ASN||65531:6||None||210979:65531:6|
|7||Invalid ASN in AS_PATH||65531:7||None||210979:65531:7|
|8||Transit-free ASN in AS_PATH||65531:8||None||210979:65531:8|
|9||Origin ASN not in IRRDB AS-SETs||65531:9||None||210979:65531:9|
|10||IPv6 prefix not in global unicast space||65531:10||None||210979:65531:10|
|11||Prefix is in client blacklist||65531:11||None||210979:65531:11|
|12||Prefix not in IRRDB AS-SETs||65531:12||None||210979:65531:12|
|13||Invalid prefix length||65531:13||None||210979:65531:13|
|14||RPKI INVALID route||65531:14||None||210979:65531:14|
|15||Never via route-servers ASN in AS_PATH||65531:15||None||210979:65531:15|