That doesn't mean publically available blocklists need to misrepresent
their use-case.
Team Cymru CEO, Rob Thomas, studied a frequently attacked website to discover that 60% of the bad packets were obvious bogons (e.g. 127.1.2.3, 0.5.4.3, etc.). Your mileage may vary, and you may opt to filter more conservatively or more liberally. As always, you must KNOW YOUR NETWORK to understand the effects of such filtering.
Bogon filtering is a component of anti-spoofing filtering
The concern is not about networks that know what they are doing, the
concern is about the rest (and more specifically entities that don't
operate their own ASN).
>> They talk about bogon prefixes "for hosts", provide configuration
>> examples for Cisco ASA firewalls,
>
> Which are perfectly valid use cases for some networks / situations.
Absolutely, everybody's free to drop whatever they like on their gear,
I'm sure there are networks, gear, applied and documented
configurations out there that block 1.1.1.0/24.
That doesn't mean publically available blocklists need to misrepresent
their use-case.
The concern is not about networks that know what they are doing, the
concern is about the rest (and more specifically entities that don't
operate their own ASN).
Thanks,
Lukas