Hello

Did your ddos provider say that their upstreams required exact route6 matches for your announcements?  --- No, but I was wondering what do other AS-s do with my ipv6 prefix, if they are using IRR filtering in bgp. 
I am not talking only about providers and providers providers. I am talking about all the AS-s in that participate in the global table and accept the full bgp table and filter it based on the IRR and/or ROA record. How can I be sure that they won't just drop my prefixes only because of the incorrect route6 object values?
To eliminate the risk of my prefix getting blocked in some third party AS I would like to have correct route(6) objects, not almost correct (which technically are incorrect).

In 99% cases you must have route(6) objects and it is good to also have ROA record to announce prefix to higher tier transit providers. But as far as I know you can't add "max length" to route6 object.
Since route6 object is a must and ROA is a should and they ultimately fill the same purpose, than why isn't there a "max length" in route6 object?

Lugupidamisega / Best regards,

Kaupo Ehtnurm


Network & System administrator
WaveCom AS 
ISO 9001 & 27001 Certified DC and verified VMware Cloud
kaupo@wavecom.ee | +372 5685 0002
Endla 16, Tallinn 10142 Estonia | www.wavecom.ee


From: "Nick Hilliard" <nick@foobar.org>
To: "Kaupo Ehtnurm" <kaupo@wavecom.ee>
Cc: "Kaupo Ehtnurm via db-wg" <db-wg@ripe.net>
Sent: Friday, July 7, 2023 7:25:20 PM
Subject: Re: [db-wg] Route(6) objects

Did your ddos provider say that their upstreams required exact route6 matches for your announcements?  The bgp session between you and your DDOS provider definitely won't require this, and the likelihood is that a covering /32 route6: object will be sufficient in many cases for your provider's providers.  I.e. you won't have serious connectivity problems if there aren't exact matches for your /48s.

In any event, this isn't really catered for in RPSL.  Some organisations implement strict filtering on route objects; others loose.  RPKI might be a better option, as it allows you to specify a prefix length range.  See RFC 9319 for some suggestions.

Nick

Kaupo Ehtnurm via db-wg wrote on 07/07/2023 16:11:
Hello

Sorry, you didn't say.
But starting to manually advertise /48 to my DDoS protection provider beats the purpose of automatic DDoS protection.

Lugupidamisega / Best regards, 

Kaupo Ehtnurm 


Network & System administrator 
WaveCom AS 
ISO 9001 & 27001 Certified DC and verified VMware Cloud 
kaupo@wavecom.ee | +372 5685 0002 
Endla 16, Tallinn 10142 Estonia | [ http://www.wavecom.ee/ | www.wavecom.ee ]

----- Original Message -----
From: "Randy Bush via db-wg" <db-wg@ripe.net>
To: "Kaupo Ehtnurm via db-wg" <db-wg@ripe.net>
Sent: Friday, July 7, 2023 6:05:53 PM
Subject: Re: [db-wg] Route(6) objects

Here the problem is "for longer defensive prefixes"
For example in normal situation I advertise /32 to my ip transit providers.
When DDoS happens then one of my providers will start advertisin 1x/48
of my /32 prefix to hi-jack the route from us and filter it.
i did not say that your provider advertised, did i?

By doing this the internet will always (also under normal
circumstances) prefer that one provider.

0 - register irr and rpki objects for aggregates and for longer
    defensive prefixes

1 - announce only aggregates to both providers

2 - when ddosed,
    - do not change announcement of aggregate to non-mediating
    - deaggregate announcement to mediating provider

3 - when ddos ends, return to state 1
randy