Skip to content
rule 11 reader
  • about
    • about me
    • linkedin
    • rss feeds
    • goodreads
    • feedly
    • amazon
    • travel pictures
    • dispatches from ziklag
  • the hedge
  • reading
    • books
    • papers
    • worth reading
  • archive
  • history
  • network icons

Rethinking BGP path validation (part 2)

This is the second post in the two part series on BGP path validation over on the LinkedIn Engineering blog.

We left off last time after having described the eight operational requirements that must be met for any system that reduces our reliance on transitive trust in relation to the AS Path. As a reminder, AS, or Autonomous Systems, is a set of routers which all follow a standard set of policies. A typical AS is run by a single organization, such as a company or an ISP. Now, let’s see how this kind of system might work in practice.

Related

Posted in ON THE NET, TECH, WRITTEN
← Securing BGP: A Case Study (5)CAP Theorem and Routing →
© 2025 rule 11 reader | Powered by Beaver Builder
Scroll To Top