Hi Rich,
What I see is a mix of approaches when announcing the more specific:
I see no reliable way to determine which might be used. The organization creating the ROA frequently doesn’t know. Sometimes, there’s IRR objects that hint at what happens.
Oh, and sometimes you need a third ROA to prevent a route object from being suppressed.
steve
On 18 Oct 2024, at 12:32, Compton, Rich wrote:
DDoS mitigation providers normally originate a customer’s /24 or /48 with their ASN as the origin. This prefix is the most specific prefix which covers the customer’s IP(s) under attack that will be accepted on the Internet. If a customer has created ROAs for the protected prefixes, they would need to add one or more additional ROAs to allow the DDoS mitigation provider to originate any /24 or /48 prefixes contained in their prefix from the DDoS mitigation provider’s ASN.
For example, if customer A is advertising 192.0.2.0/23 from an origin ASN of 65123 and they employ a DDoS mitigation provider with ASN 65456, before the mitigation service is enabled, the customer would need to create a ROA to allow 192.0.2.0/23 with a maximum length of /24 to originate from 65456. The other option is to create ROAs for each of the /24’s contained within the prefix.
If customer A is advertising 192.0.2.0/24 and they are under attack, they would need to withdraw this advertisement while the DDoS mitigation provider advertises out 192.0.2.0/24. Again, a ROA would need to be created to allow the DDoS mitigation provider to originate that prefix from their ASN.
Return traffic to the customer’s network after scrubbing the attack is usually sent through a cross connect or a tunnel like GRE.
If the customer has no ROAs, then they should NOT create ROAs to allow their DDoS mitigation provider to originate their prefixes without also creating a ROA for their own ASN. If they do, then the customer’s advertisement will become RPKI INVALID and will get rejected by those ISPs doing ROV. The only situation where this may be acceptable is an always-on configuration where the customer’s traffic is ALWAYS sent across the Internet to the DDoS mitigation provider and is NEVER advertised by the customer.
-Rich
Steven Wallace
Director - Routing Integrity
Internet2
ssw@internet2.edu