-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use RPKI data as if it were route-objects #19
Comments
Here it is... arouteserver/config.d/general.yml Lines 223 to 260 in 566f313
OpenBGPD: arouteserver/examples/rich/openbgpd.conf Lines 147 to 154 in 566f313
And if a route has its origin ASN authorized by an AS-SET, then... arouteserver/examples/rich/openbgpd.conf Lines 254 to 259 in 566f313
BIRD: arouteserver/examples/rich/bird4.conf Lines 21 to 28 in 566f313
arouteserver/examples/rich/bird4.conf Lines 1569 to 1577 in 566f313
arouteserver/examples/rich/bird4.conf Lines 1866 to 1873 in 566f313
Any feedback? |
Guess we'll have to test this to provide you with good feedback! :) |
If you want to test it it's already available in the latest pre-release version on PyPi test:
|
RPKI can be used to do Origin Validation and reject invalid announcements, but RPKI can also be used in context of provisioning & creation of whitelists.
If we take as example http://irrexplorer.nlnog.net/search/23.179.0.0/24 - for this prefix there is no IRR route object, but there is a RPKI ROA which states what the authorised origin AS is and this matches what is observed in the DFZ. I'd prefer to accept such a prefix from AS neighbor 6939.
In other words, we should treat RPKI ROAs as if they are IRR route objects.
Implementation suggestion: we can use
rtrsub
to generate a yml file of all such RPKI ROAs, and ifarouteserver
is expanding ASNs into route objects (after having expanded AS-SETS into ASNs), it also does a lookup in that yml file.The text was updated successfully, but these errors were encountered: