Dear all,
I'd like to share an update on RFC 9234 deployment. RFC 9234 titled
"BGP Open Policy" aka the "Only-To-Customer" (OTC) BGP Path Attribute is
an anti-route-leak mechanism which is *NOT* based on RPKI! (yes ...
routing security is more than just RPKI!
The basic idea of 9234 is that BGP routers (based on their role in the
Gao-Rexford inter-domain routing model) attach a special BGP Path
attribute, or take action based on the presence and contents of this BGP
Path attribute - with the intention to constrain a route's propagation
radius to just the downstream customer cone of the neighboring ASN.
Most operators will intuitively understand that any route propagating
through multiple IX route servers operated by different IXPs is a route
leak:
IXP_1 IXP_2
/ \ / \
/ \ / \
ISP_A ISP_B ISP_C
(receives) (leaker) (originates)
``` (figure 1. propagation from right to left; leak scenario)
In the above example, ISP\_A originates a route towards IXP\_1's route
servers, IXP\_1 propagates the route to ISP\_B \(so far so good\); but for
one reason or another ISP\_B subsequently continues propagation of the
route towards IXP\_2's route servers, who in turn propagate it to ISP\_C\.
ISP\_B is forwarding IP traffic between ISP\_A and ISP\_C for zero revenue\.
ISP\_A and ISP\_C are probably not expecting ISP\_B to be in the middle\.
This situation can happen as a result of a misconfiguration in ISP\_B's
equipment, even when all participants use IRR & RPKI ROV to attempt to
mitigate the worst routing incidents\.
What does it matter / impact