North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Peering with the Internet Alert Registry

  • From: Josh Karlin
  • Date: Mon Mar 10 11:14:27 2008
  • Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:mime-version:content-type:x-google-sender-auth; bh=mWJvq+9Yt1/GGkZkFR+fdTJXUBz5dxc078R85y3CbDY=; b=IJnS+rQ7j/1ru2HWAegjmhuXE3Q+AZJM8Md8Bfv+kAwA7pIY1WE3x6aMG1JiUrkG0Sd8bCId6QScHh8idS3cIwqIug05trssMVbl1qeYeFTMIdHF1xCdU8sk5mS/HPC0EeBk4Po+GFGAMcQMT2i1xbpHDxKzgQcLcgw4x/Dc1Rg=
  • Domainkey-signature: a=rsa-sha1; c=nofws;; s=gamma; h=message-id:date:from:sender:to:subject:mime-version:content-type:x-google-sender-auth; b=g+ypg8vXzMS8hIE4GurkiA4wGkGzn14KJKqauUQPeq1zi/XHqALXv+45kSNk3t3bCqtCJyHFHJrB01yi0NfL78pmIdmWbl1tTEwU9DFYOZG+v2dGHa6aVoTtw3pws5Nx/CpxTRrP/xd4+11ppkufe21RYlob+iY3HJd1fsq94Lo=


Some of you are aware of the site for network operators:  which has running for two years now.  The purpose of the site is to detect and distribute network anomaly information to the network operators that need to know.  The flip side of our proposed security system, Pretty Good BGP (PGBGP), lowers the local preference of anomalous routes on BGP routers for 24 hours, giving operators time to respond to anomalous routes before they can fully propagate.

Now, PGBGP is in actual routing software (Quagga), which we soon hope to distribute.  As an initial means of test, we will switch the IAR to it (instead of scraping RIPE/RouteViews with a script). This means that we will need peers to provide the IAR with BGP updates (we will not propagate any route updates to your routers).  Currently we have three BGP streams, more would be appreciated. 

If you would like to contribute to our research project, please reply directly to me.  More information about the project can be found here: