On 23.6.2021. 12:09, Claudio Jeker wrote:
> On Wed, Jun 23, 2021 at 11:40:25AM +0200, Hrvoje Popovski wrote:
>> Hi all,
>>
>> fist of all, thank you for rpki-client, it's so easy to use it and to
>> get the job done.
>> I'm playing with rpki-client and denying ovs invalid statement and I've
>> seen that with default ovs config statement (deny from ebgp ovs invalid)
>> BLACKHOLE routes are blocked/invalid.
>>
>> What is the right way to allow BLACKHOLE routes through rpki ? Or if
>> someone can give me a hint on what to do.
>>
> 
> BLACKHOLE routes normally have a more specific check so you can re-allow
> them back after the ovs invalid check (for that you need to take away the
> quick from the default ruleset or actually allow quick the blackholes
> before).
> 
> I guess you can use something along the lines of:
> allow quick from group clients inet prefixlen 32 community $BLACKHOLE set 
> nexthop blackhole
> allow quick from group clients inet6 prefixlen 128 community $BLACKHOLE set 
> nexthop blackhole
> 
> I guess you also have some client prefix-sets that should be added to the
> filter rule so that one client can not blackhole for another.
> 
> BLACKHOLE routes are done in many ways and I'm not sure if there is
> consensus who is allowed to announce what. Also if there are multiple
> paths to the destination should the blackhole only be active if the
> covering route is from the same peer?
> 

Thank you guys for rpki-client. Now we have block invalids in cix and
blackhole routes still works :)

Thank you ..

Reply via email to