An Exceptions Capability for Distributed Null-Routing in BGP
draft-cgray-ietf-bgpexceptions-00

Document Type Expired Internet-Draft (individual)
Last updated 2016-01-27 (latest revision 2015-07-26)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-cgray-ietf-bgpexceptions-00.txt

Abstract

There is not currently any standardized method of dealing with distributed or other large scale threats other than individual firewall and/or null routing instructions. This Internet Draft describes an optional BGP Capability (as defined by RFC 5492) that allowed Autonomous Systems to self-censor utilizing the existing Inter-Domain Routing system. This capability does not add any automatic actions and must be explicitly activated by an administrator.

Authors

Cameron Gray (c.gray@bangor.ac.uk)
Sa'ad Mansoor (s.mansoor@bangor.ac.uk)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)