Governance

Preventing route leaks made simple: BGP roleplay with Junos

A recent update in BGP routing management, RFC 9234, brings new tools to prevent route leaks, enhancing security in global routing systems.

Preventing route leaks made simple: BGP roleplay with Junos

Headline

A recent update in BGP routing management, RFC 9234, brings new tools to prevent route leaks, enhancing security in global routing systems.

Context

Border Gateway Protocol (BGP) has long been a source of network instability, with accidental route leaks and hijacks being common occurrences. This problem has persisted since BGP’s inception over three decades ago. However, a simple yet crucial tweak, defined in RFC 9234, aims to address this issue effectively. The RFC introduces the “Only-To-Customer” (OTC) BGP Capability, which significantly reduces the risk of these leaks by assigning roles to Autonomous Systems (ASes) in a network, ensuring that routes are only advertised to the intended recipients. The feature has already been implemented by Quagga/FRR, with a patch available for BIRD. Notably, Juniper’s Junos OS now supports this capability, marking a major milestone in the adoption of RFC 9234. This innovation allows for more precise control over route advertisement, preventing accidental leaks by enforcing strict role-based policies on how networks interact.

Evidence

Pending intelligence enrichment.

Analysis

Also Read: How AFRINIC’s board elections became a political battlefield Also Read: Why AFRINIC’s fallout has global implications for internet governance The importance of RFC 9234 cannot be overstated in the context of BGP route management. Traditionally, operators used complex routing policies to define how routes should be shared between providers, peers, and customers. However, these manual configurations were prone to errors, especially in large-scale networks with hundreds or thousands of BGP neighbours. RFC 9234 simplifies the process by automating role assignment, helping prevent errors that lead to route leaks. For example, when an AS mistakenly advertises routes to a peer that should only be available to a customer, it can lead to severe network disruptions, including BGP hijacking. With the new OTC role, these routes can be automatically blocked from being advertised outside their intended scope. This development is particularly crucial for Tier 1 and Tier 2 network operators, who manage vast and complex networks. It promises a more streamlined and error-resistant BGP management system, improving the reliability of the internet backbone.

Key Points

  • BGP roleplay in Junos now supports RFC 9234, offering simplified route management.
  • The new feature addresses long-standing issues of accidental route leaks in large networks.

Actions

Pending intelligence enrichment.

Author

a.tang@btw.media