An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space---i.e., private address space and address space that has not been allocated by the Internet Assigned Numbers Authority (IANA). This paper presents an empirical study of bogon route announcements, as observed at eight vantage points on the Internet. On average, we observe several bogon routes leaked every few days; a small number of ASes also temporarily leak hundreds of bogon routes. About 40% of these bogon routes are not withdrawn for at least a day. We observed 110 different ASes originating routes for bogon prefixes and a few ASes that were responsible for advertising a disproportionate number of these routes. We also find that some ASes that do filter unallocated prefixes continue to filter them for as long as five months after they have been allocated, mistakenly filtering valid routes. Both of these types of delinquencies have serious implications: the failure to filter valid prefixes can could make nefarious activities such as denial of service attacks difficult to trace; failure to update filters when new prefixes are allocated prevents legitimate routes from being globally visible.
[1]
Ping Pan,et al.
Internet Engineering Task Force
,
1995
.
[2]
Yakov Rekhter,et al.
A Border Gateway Protocol 4 (BGP-4)
,
1994,
RFC.
[3]
Christopher Krügel,et al.
Topology-Based Detection of Anomalous BGP Messages
,
2003,
RAID.
[4]
Abhijit Bose,et al.
Delayed Internet routing convergence
,
2000,
SIGCOMM.
[5]
Matthew C. Caesar,et al.
Towards Localizing Root Causes of BGP Dynamics
,
2003
.
[6]
Nick Feamster,et al.
Detecting BGP configuration faults with static analysis
,
2005
.
[7]
Daniel Massey,et al.
On Detection of Anomalous Routing Dynamics in BGP
,
2004,
NETWORKING.
[8]
Ratul Mahajan,et al.
Understanding BGP misconfiguration
,
2002,
SIGCOMM 2002.
[9]
Ratul Mahajan,et al.
Understanding BGP misconfiguration
,
2002,
SIGCOMM '02.