Internet eXchange 42
IX42
接入位置
客户中心
IX42 Route Server Policy
BGP sessions default configuration
  • Passive sessions are configured toward neighbors.

  • GTSM (Generalized TTL Security Mechanism - RFC5082) is disabled on sessions toward the neighbors.

  • ADD-PATH capability ( RFC7911) is not negotiated by default.

Route server general behaviours
Default filtering policy
NEXT_HOP attribute
  • The route server verifies that the NEXT_HOP attribute of routes received from a client matches the IP address of the client itself .

AS_PATH attribute
  • Routes whose AS_PATH is longer than 32 ASNs are rejected.

  • The left-most ASN in the AS_PATH of any route announced to the route server must be the ASN of the announcing client.

  • Routes whose AS_PATH contains invalid ASNs are rejected.

  • Routes with an AS_PATH containing one or more of the following "transit-free" networks' ASNs are rejected.

    List of "transit-free" networks' ASNs: 174, 286, 701, 1239, 1299, 2828, 2914, 3257, 3320, 3356, 3549, 5511, 6453, 6461, 6762, 6830, 6939, 7018

IRRDBs prefix/origin ASN enforcement
  • Origin ASN validity is enforced. Routes whose origin ASN is not authorized by the client's AS-SET are rejected.

  • Announced prefixes validity is enforced. Routes whose prefix is not part of the client's AS-SET are rejected. Longer prefixes that are covered by one entry of the resulting route set are accepted.

  • Use RPKI ROAs to validate routes whose origin ASN is authorized by the client's AS-SET but whose prefix is not.

  • Route validity state is signalled to route server clients using the following BGP communities:

    Validity stateStandardExtendedLarge
    Prefix is NOT included in client's AS-SET64512:10rt:64512:10:64512:10
    Origin ASN is NOT included in client's AS-SET64512:20rt:64512:20:64512:20
    Prefix matched by a RPKI ROA for the authorized origin ASN 64512:31rt:64512:31:64512:31
    Route authorized soley because of a client white list entry 64512:41rt:64512:41:64512:41

RPKI BGP Prefix Origin Validation
RPKI ROAs
  • RPKI ROAs are fetched from the RIPE RPKI Validator cache file at ['https://rpki-validator.ripe.net/api/export.json', 'https://rpki.gin.ntt.net/api/export.json']. The following Trust Anchors are used: APNIC RPKI Root, AfriNIC RPKI Root, LACNIC RPKI Root, RIPE NCC RPKI Root, apnic, afrinic, lacnic, ripe

Max-pref limit
  • A max-prefix limit is enforced; when it triggers, the session with the announcing client is restarted after 30 minutes.

  • The limit, if not provided on a client-by-client basis, is learnt from the client's PeeringDB record.

  • If no more specific limits exist for the client, the general limit of 170000 IPv4 routes and 12000 IPv6 routes is enforced.

Min/max prefix length
  • Only prefixes whose length is in the following range are accepted by the route server:

    • IPv4: 8-24
    • IPv6: 12-48
Rejected prefixes
  • The following prefixes are unconditionally rejected:

    PrefixMore specificComment
    2a0e:b107:b7a::/46any more specific prefixNone

  • Bogon prefixes are rejected too. Click to expand the list of these prefixes.

  • IPv6 prefixes are accepted only if part of the IPv6 Global Unicast space 2000::/3.

Graceful BGP session shutdown
  • Routes tagged with the GRACEFUL_SHUTDOWN BGP community (65535:0) have their LOCAL_PREF attribute lowered to 0.

Announcement control via BGP communities
  • Routes tagged with the NO_EXPORT or NO_ADVERTISE communities received by the route server are propagated to other clients with those communities unaltered.

FunctionStandardExtendedLarge
Do not announce to any client0:rt:0::0:0
Announce to peer, even if tagged with the previous community :peer_asrt::peer_as:1:peer_as
Do not announce to peer0:peer_asrt:0:peer_as:0:peer_as
Prepend the announcing ASN once to peer65511:peer_asrt:65511:peer_as:101:peer_as
Prepend the announcing ASN twice to peer65512:peer_asrt:65512:peer_as:102:peer_as
Prepend the announcing ASN thrice to peer65513:peer_asrt:65513:peer_as:103:peer_as
Prepend the announcing ASN once to any65501:rt:65501::101:0
Prepend the announcing ASN twice to any65502:rt:65502::102:0
Prepend the announcing ASN thrice to any65503:rt:65503::103:0
Add NO_EXPORT to peer65281:peer_asrt:65281:peer_as:65281:peer_as
Add NO_ADVERTISE to peer65282:peer_asrt:65282:peer_as:65282:peer_as