论文标题
超特定前缀:必须享受界间路由中的小东西
Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing
论文作者
论文摘要
自主系统(ASES)使用BGP彼此交换可触及性信息 - 事实上的标准间路由协议。尽管IPv4(IPv6)路由比 /24( /48)通常被过滤(因此没有传播),但路线收集器仍然观察到其中许多。在这项工作中,我们仔细研究了那些“超特定”前缀(HSP)。特别是,我们分析了它们的患病率,用例以及操作员是故意还是意外地使用它们。尽管它们的总数随时间增加,但大多数HSP只能通过Route Collector同行看到。尽管如此,一年中可以不断地看到一些HSP并广泛传播。我们发现,大多数HSP表示(内部)路由对等基础架构,或与地址块重新定位或黑手座相关。虽然数百个操作员故意将HSP添加到众所周知的路由数据库中,但我们观察到许多HSP可能是意外泄漏的路线。
Autonomous Systems (ASes) exchange reachability information between each other using BGP -- the de-facto standard inter-AS routing protocol. While IPv4 (IPv6) routes more specific than /24 (/48) are commonly filtered (and hence not propagated), route collectors still observe many of them. In this work, we take a closer look at those "hyper-specific" prefixes (HSPs). In particular, we analyze their prevalence, use cases, and whether operators use them intentionally or accidentally. While their total number increases over time, most HSPs can only be seen by route collector peers. Nonetheless, some HSPs can be seen constantly throughout an entire year and propagate widely. We find that most HSPs represent (internal) routes to peering infrastructure or are related to address block relocations or blackholing. While hundreds of operators intentionally add HSPs to well-known routing databases, we observe that many HSPs are possibly accidentally leaked routes.