2017
DOI: 10.17487/rfc8093
|View full text |Cite
|
Sign up to set email alerts
|

Deprecation of BGP Path Attribute Values 30, 31, 129, 241, 242, and 243

Abstract: This document requests IANA to mark BGP path attribute values 30, 31, 129, 241, 242, and 243 as "Deprecated".

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The number identifying this attribute is configurable in our implementation. Our tests running DISCO ( §VII) use the 0xFF attribute which is reserved for experimental use to avoid interference with another standardized or squatted attribute types (see [56], [55]) during experiments. We acknowledge the need for standardizing the use of this BGP attribute type before DISCO can be widely adopted.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The number identifying this attribute is configurable in our implementation. Our tests running DISCO ( §VII) use the 0xFF attribute which is reserved for experimental use to avoid interference with another standardized or squatted attribute types (see [56], [55]) during experiments. We acknowledge the need for standardizing the use of this BGP attribute type before DISCO can be widely adopted.…”
Section: Methodsmentioning
confidence: 99%
“…Routers need not understand these (optional) attributes but are still expected to forward them onwards to other networks (transitive); hence they provide a useful mechanism for extending BGP [48]. In practice, however, BGP implementations might violate the protocol's specification and filter unknown optional transitive attributes (as indeed happened during the standardization of BGP large communities [55]). We describe below how we evaluate the propagation of DISCO's new public key BGP attribute and provide evidence that such a new BGP attribute would reliably propagate to the global Internet.…”
Section: A Compatibility With Today's Internetmentioning
confidence: 99%
“…We confirm that Tier-1 ASes typically cannot be poisoned (Section 8.6.3.1). We also see that filters designed to prevent route leaks [255] also interfere with poisoning.…”
Section: Effects Of Choice Of Anycast Sitesmentioning
confidence: 83%
“…We find that many ISPs, especially Tier-1 ASes, filter out AS paths that poison any Tier-1 AS. Tier-1 ASes deploy these filters to block BGP announcements from customers that contain other Tier-1 ASes in the path to prevent route leaks [255,184]. This filtering often makes path poisoning ineffective to control traffic.…”
Section: Poisoning Coveragementioning
confidence: 99%