BLACKHOLE Community (RFC7999)
Original Publication Date: 2016-Oct-01
Included in the Prior Art Database: 2016-Oct-20
Internet Society Requests For Comment (RFCs)
T. King: AUTHOR [+5]
Network infrastructures have been increasingly hampered by DDoS attacks. In order to dampen the effects of these DDoS attacks, IP networks have offered blackholing with BGP [RFC4271] using various mechanisms such as those described in [RFC3882] and [RFC5635].
Internet Engineering Task Force (IETF) T. King Request for Comments: 7999 C. Dietzel Category: Informational DE-CIX ISSN: 2070-1721 J. Snijders NTT G. Doering SpaceNet AG G. Hankins Nokia October 2016
This document describes the use of a well-known Border Gateway Protocol (BGP) community for destination-based blackholing in IP networks. This well-known advisory transitive BGP community named "BLACKHOLE" allows an origin Autonomous System (AS) to specify that a neighboring network should discard any traffic destined towards the tagged IP prefix.
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7999.
King, et al. Informational [Page 1]
RFC 7999 BLACKHOLE Community October 2016
Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication...