Abstract
Autonomous Systems (ASes) exchange reachability information between each other using BGP---the de-facto standard inter-AS routing protocol. While IPv4 (IPv6) routes more specific than /24 (/48) are commonly filtered (and hence not propagated), route collectors still observe many of them.
In this work, we take a closer look at those "hyper-specific" prefixes (HSPs). In particular, we analyze their prevalence, use cases, and whether operators use them intentionally or accidentally. While their total number increases over time, most HSPs can only be seen by route collector peers. Nonetheless, some HSPs can be seen constantly throughout an entire year and propagate widely. We find that most HSPs represent (internal) routes to peering infrastructure or are related to address block relocations or blackholing. While hundreds of operators intentionally add HSPs to well-known routing databases, we observe that many HSPs are possibly accidentally leaked routes.
- Emile Aben and Colin Petrie. 2014. Propagation of Longer-than-/24 IPv4 Prefixes. https://labs.ripe.net/Members/emileaben/propagation-of-longer-than-24-ipv4-prefixesGoogle Scholar
- Emile Aben and Colin Petrie. 2015. Has the Routability of Longer-than-/24 Prefixes Changed? https://labs.ripe.net/Members/emileaben/has-the-routability-of-longer-than-24-prefixes-changedGoogle Scholar
- Tian Bu, Lixin Gao, and Don Towsley. 2002. On characterizing BGP routing table growth. In Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE, Vol. 3. IEEE, 2185--2189.Google Scholar
- Rocky KC Chang and Michael Lo. 2005. Inbound traffic engineering for multihomed ASs using AS path prepending. IEEE network 19, 2 (2005), 18--25.Google ScholarDigital Library
- Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, et al. 2019. RPKI is coming of age: a longitudinal study of RPKI deployment and invalid route origins. In Proceedings of the Internet Measurement Conference. 406--419.Google ScholarDigital Library
- Cisco. 2021. Removing Private AS Numbers from the AS Path in BGP. https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/removing-private-as-numbers-from-the-as-path-in-bgp.htmlGoogle Scholar
- Luca Cittadini, Wolfgang Mühlbauer, Steve Uhlig, Randy Bush, Pierre Francois, and Olaf Maennel. 2010. Evolution of Internet address space deaggregation: Myths and reality. IEEE Journal on Selected Areas in Communications 28, 8 (2010), 1238--1249.Google ScholarDigital Library
- DE-CIX. 2021. BGP announcement filtering. https://www.de-cix.net/en/locations/frankfurt/route-server-guideGoogle Scholar
- Christoph Dietzel, Anja Feldmann, and Thomas King. 2016. Black-holing at ixps: On the effectiveness of ddos mitigation in the wild. In International Conference on Passive and Active Network Measurement. Springer, 319--332.Google ScholarCross Ref
- Christoph Dietzel, Matthias Wichtlhuber, Georgios Smaragdakis, and Anja Feldmann. 2018. Stellar: network attack mitigation using advanced blackholing. In Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies. 152--164.Google ScholarDigital Library
- Gert Döring. 2013. IPv6 BGP filter recommendations. https://www.space.net/~gert/RIPE/ipv6-filters.htmlGoogle Scholar
- J. Durand, I. Pepelnjak, and G. Doering. 2015. BGP Operations and Security. RFC 7454 (Best Current Practice). Google ScholarCross Ref
- Lixin Gao. 2001. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on networking 9, 6 (2001), 733--745.Google Scholar
- Petros Gigis, Matt Calder, Lefteris Manassakis, George Nomikos, Vasileios Kotronis, Xenofontas Dimitropoulos, Ethan Katz-Bassett, and Georgios Smaragdakis. 2021. Seven Years in the Life of Hypergiants' Off-Nets. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference. 516--533.Google ScholarDigital Library
- Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann, and Arthur Berger. 2017. Inferring BGP blackholing activity in the internet. In Proceedings of the 2017 Internet Measurement Conference. 1--14.Google ScholarDigital Library
- Caitlin Gray, Clemens Mosig, Randy Bush, Cristel Pelsser, Matthew Roughan, Thomas C Schmidt, and Matthias Wahlisch. 2020. BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping. In Proceedings of the ACM Internet Measurement Conference. 492--505.Google ScholarDigital Library
- Geoff Huston. 2017. BGP more specifics: routing vandalism or useful? https://blog.apnic.net/2017/06/26/bgp-specifics-routing-vandalism-useful/Google Scholar
- G. Huston and G. Michaelson. 2012. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC 6483 (Informational). Google ScholarCross Ref
- irr.net. 2021. List of Routing Registries. http://www.irr.net/docs/list.htmlGoogle Scholar
- Isolario 2021. Isolario Project. Available at https://isolario.it/.Google Scholar
- Lin Jin, Shuai Hao, Haining Wang, and Chase Cotton. 2018. Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 362--373.Google Scholar
- Juniper. 2021. Understanding BGP Confederations. https://www.juniper.net/documentation/us/en/software/junos/bgp/topics/topic-map/bgp-confederations-for-scaling.htmlGoogle Scholar
- T. King, C. Dietzel, J. Snijders, G. Doering, and G. Hankins. 2016. BLACKHOLE Community. RFC 7999. RFC Editor.Google Scholar
- Thomas Krenc, Robert Beverly, and Georgios Smaragdakis. 2021. AS-level BGP community usage classification. In Proceedings of the 21st ACM Internet Measurement Conference. 577--592.Google ScholarDigital Library
- Thomas Krenc and Anja Feldmann. 2016. BGP prefix delegations: a deep dive. In Proceedings of the 2016 Internet Measurement Conference. 469--475.Google ScholarDigital Library
- Andra Lutu, Marcelo Bagnulo, Cristel Pelsser, Kenjiro Cho, and Rade Stanojevic. 2015. An analysis of the economic impact of strategic deaggregation. Computer Networks 81 (2015), 147--163.Google ScholarDigital Library
- Andra Lutu, Marcelo Bagnulo, and Rade Stanojevic. 2012. An economic side-effect for prefix deaggregation. In 2012 Proceedings IEEE INFOCOM Workshops. IEEE, 190--195.Google ScholarCross Ref
- Andra Lutu, Cristel Pelsser, Marcelo Bagnulo, and Kenjiro Cho. 2013. The aftermath of prefix deaggregation. In Proceedings of the 2013 25th International Teletraffic Congress (ITC). IEEE, 1--8.Google ScholarCross Ref
- MANRS. 2021. Prefix filter configuration tools. https://www.manrs.org/isps/guide/filtering/Google Scholar
- Alexander Marder, Matthew Luckie, Amogh Dhamdhere, Bradley Huffaker, KC Claffy, and Jonathan M Smith. 2018. Pushing the boundaries with bdrmapit: Mapping router ownership at Internet scale. In Proceedings of the Internet Measurement Conference 2018. 56--69.Google Scholar
- Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, and Lixia Zhang. 2005. IPv4 address allocation and the BGP routing table evolution. ACM SIGCOMM Computer Communication Review 35, 1 (2005), 71--80.Google ScholarDigital Library
- Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C Schmidt, and Matthias Wählisch. 2019. Down the black hole: dismantling operational practices of BGP blackholing at IXPS. In Proceedings of the Internet Measurement Conference. 435--448.Google ScholarDigital Library
- NLNOG. 2021. Filtering Small Prefixes. https://bgpfilterguide.nlnog.net/guides/small_prefixes/Google Scholar
- NOCTION. 2021. BGP Prefix Filtering. https://www.noction.com/knowledge-base/bgp-prefix-filteringGoogle Scholar
- Ramakrishna Padmanabhan, John P Rula, Philipp Richter, Stephen D Strowes, and Alberto Dainotti. 2020. DynamIPs: Analyzing address assignment practices in IPv4 and IPv6. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. 55--70.Google ScholarDigital Library
- Lars Prehn, Franziska Lichtblau, and Anja Feldmann. 2020. When wells run dry: the 2020 IPv4 address market. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. 46--54.Google ScholarDigital Library
- Bruno Quoitin, Cristel Pelsser, Louis Swinnen, Olivier Bonaventure, and Steve Uhlig. 2003. Interdomain traffic engineering with BGP. IEEE Communications magazine 41, 5 (2003), 122--128.Google ScholarDigital Library
- Rapid7. 2021. Rapid7 Open Data. https://opendata.rapid7.com/Google Scholar
- Y. Rekhter (Ed.), T. Li (Ed.), and S. Hares (Ed.). 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). Updated by RFCs 6286, 6608, 6793, 7606, 7607, 7705, 8212, 8654. Google ScholarDigital Library
- A. Retana, R. White, V. Fuller, and D. McPherson. 2000. Using 31-Bit Prefixes on IPv4 Point-to-Point Links. RFC 3021 (Proposed Standard). Google ScholarDigital Library
- RIPE. 2021. RIPE Atlas Measurement Dumps - [2021/05/17-23]. https://data-store.ripe.net/datasets/atlas-daily-dumps/Google Scholar
- RIPE NCC. 2021. RIPE Atlas measurement platform. https://atlas.ripe.net/Google Scholar
- RIPE NCC. 2021. RIPE RPKI Snapshots. https://ftp.ripe.net/rpki/Google Scholar
- RIPE-RIS 2021. RIPE Routing Information Service. http://www.ripe.net/ris/.Google Scholar
- Matthew Roughan, Walter Willinger, Olaf Maennel, Debbie Perouli, and Randy Bush. 2011. 10 lessons from 10 years of measuring and modeling the internet's autonomous systems. IEEE Journal on Selected Areas in Communications 29, 9 (2011), 1810--1821.Google ScholarCross Ref
- Routeviews 2021. Routeviews Project - University of Oregon. Available at http://www.routeviews.org/.Google Scholar
- Brandon Schlinker, Todd Arnold, Italo Cunha, and Ethan Katz-Bassett. 2019. PEERING: Virtualizing BGP at the Edge for Research. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies. Orlando, FL.Google ScholarDigital Library
- Georgos Siganos and Michalis Faloutsos. 2004. Analyzing BGP policies: Methodology and tool. In IEEE INFOCOM 2004, Vol. 3. IEEE, 1640--1651.Google ScholarCross Ref
- P. Smith and R. Evans. 2011. RIPE-532 - RIPE Routing Working Group Recommendations on IPv6 Route Aggregation. https://www.ripe.net/publications/docs/ripe-532Google Scholar
- P. Smith, R. Evans, and M. Hughes. 2006. RIPE-399 - RIPE Routing Working Group Recommendations on Route Aggregation. https://www.ripe.net/publications/docs/ripe-399Google Scholar
- Stephen Strowes and Colin Petrie. 2017. BGP Even-More Specifics in 2017. https://labs.ripe.net/Members/stephen_strowes/bgp-even-more-specifics-in-2017Google Scholar
- The Broadband Forum. 2018. TR-069: CPE WAN Management Protocol. https://www.broadband-forum.org/technical/download/TR-069_Amendment-6.pdfGoogle Scholar
- CAIDA UCSD. 2021. The IPv4 Routed /24 Topology Dataset - [2021/05/17-23]. https://data.caida.org/datasets/topology/ark/ipv4/probe-data/Google Scholar
- CAIDA UCSD. 2021. The IPv6 Routed /48 Topology Dataset - [2021/05/17-23]. https://publicdata.caida.org/datasets/topology/ark/ipv6/probe-data/Google Scholar
- Maya Ziv, Liz Izhikevich, Kimberly Ruth, Katherine Izhikevich, and Zakir Durumeric. 2021. ASdb: a system for classifying owners of autonomous systems. In Proceedings of the 21st ACM Internet Measurement Conference. 703--719.Google ScholarDigital Library
Index Terms
- Hyper-specific prefixes: gotta enjoy the little things in interdomain routing
Recommendations
Neighbor-specific BGP: more flexible routing policies while improving global stability
SIGMETRICS '09The Border Gateway Protocol (BGP) offers network administrators considerable flexibility in controlling how traffic flows through their networks. However, the interaction between routing policies in different Autonomous Systems (ASes) can lead to ...
Neighbor-specific BGP: more flexible routing policies while improving global stability
SIGMETRICS '09: Proceedings of the eleventh international joint conference on Measurement and modeling of computer systemsThe Border Gateway Protocol (BGP) offers network administrators considerable flexibility in controlling how traffic flows through their networks. However, the interaction between routing policies in different Autonomous Systems (ASes) can lead to ...
Architecture of the remote routing validation tool for BGP anomaly detection
RACS '12: Proceedings of the 2012 ACM Research in Applied Computation SymposiumThe Border Gateway Protocol (BGP) is an Inter-domain routing protocol that has gradually evolved over the past few decades. The main functionality of BGP is to exchange Network Layer Reachability Information (NLRI) between ASes so that a BGP speaker can ...
Comments