I think if we asked telstra why they didn't filter their customer some
1) we did, we goofed, oops!
2) we don't it's too hard
3) filters? what?
I suspect in the case of 1 it's a software problem that needs more
I suspect in the case of 2 it's a problem that could be shown to be
simpler with some resource-certification in place
I suspect 3 is not likely... (or I hope so).
So, even without defining what a leak is, providing a tool to better
create/verify filtering would be a boon.
Yes, I agree!
What I'd hate to see is:
4) We fully deployed BGPSEC, and RPKI, and upgraded our
infrastructure, and retooled provisioning, operations and processes
to support it all fully, and required our customers and peers to use it,
and even then this still happened - WTF was the point?