top | item 20268874

(no title)

kevinreedy | 6 years ago

> The RPKI framework that we implemented and deployed globally last year is designed to prevent this type of leak. It enables filtering on origin network and prefix size. The prefixes Cloudflare announces are signed for a maximum size of 20. RPKI then indicates any more-specific prefix should not be accepted, no matter what the path is.

Does RPKI prevent Cloudflare from announcing additional /22 routes during an incident like this? Any network with RPKI implemented would reject the /22s, but those who ignore it should pick them up over the leaked /21s.

discuss

order

eastdakota|6 years ago

We could break our prefixes into smaller routes, but 1) the Internet's routers have limited memory; 2) we have a lot of routes; and 3) we want to be good Internet citizens.

If every network announced all their routes as /24s — the smallest route generally accepted over the public Internet — the routing table would be a giant mess and would overwhelm many routers' ability to store them.

That said, after today we are thinking about ways that, in case of an emergency, we could break the routes down to be more specific than whatever is leaking. Given how broadly peered we are, Cloudflare's network will be as protected as anyone's. However, that's not really a good solution for the Internet generally. Better that we all implement and enforce RPKI.

hn20180220|6 years ago

Kudos for a CEO that understands in and outs of Internet routing, making me want to join CF's neteng team

lima|6 years ago

Kudos for not deaggregating routes into /24s like many other major ISPs do nowadays.

ikiris|6 years ago

And you believe the internet optimizer wouldn't have added /23s and /24s.... why?