Recent BGP news
The Border Gateway Protocol (BGP) is probably the most important routing protocol in today’s Internet. Its main role is the exchange of interdomain routes, but it also plays a key role inside ISP networks to support various services. This post provides pointers to recent articles and blog posts that are directly related to the evolution of BGP and could be of interest to the readers of Computer Networking : Principles, Protocols and Practice.
Geoff Huston continued his tradition of summarizing the evolution of the BGP routing tables at the beginning of each year. His recent blog post summarizes what he observed during the last year and his predictions for the future. Looking at the IPv6 BGP routing tables, there is a risk entering an exponential growth in the coming years given the growing fragmentation of the announced IPv6 prefixes.
In December 2018, a group of researchers announced a plan to conduct some experiments by announcing a route for prefix 18.104.22.168/24 with specific BGP attributes to test the feasibility of a new technique to improve the security of BGP routes. BGP, like many Internet protocols, is extensible and BGP implementations can negotiate the utilisation of new BGP attributes. Unfortunately, past experience has shown that announcing new BGP attributes could disrupt interdomain routing by triggering bugs in existing BGP implementation. In 2010, such an experiment triggered bugs in Cisco routers and caused major disruptions. In January 2019, the new experiment, triggered a bug in FRRouting, a popular open-source implementation of BGP. FRRouting has since been updated. Apparently, some ISPs were affected by this experiment. This shows that unfortunately it remains very difficult to extend BGP in 2019.
On the more positive side, the security of BGP continues to slowly improve with the efforts of MANRS and some operators. In a recent blog post, Andrei Robalchevsky summarized the security problems that affected BGP in 2018. There seems to be a postive trends when comparing 2017 and 2018. Ben Cox also summarized his views on the evolution of the deployment of the RPKI.
Another interesting blog post was Ben Cox who described how he configured lightweight virtual machines to run BGP in order to simulate the London tube by using BGP with the MED attribute.
This blog post was written to inform the readers of Computer Networking : Principles, Protocols and Practice about the evolution of the field. You can subscribe to the Atom feed for this blog at https://obonaventure.github.io/cnp3blog/feed.xml.