59 lines
1.2 KiB
Text
59 lines
1.2 KiB
Text
function ebgp_import_v4()
|
|
bool ok;
|
|
{
|
|
ok = false;
|
|
|
|
return ok;
|
|
}
|
|
|
|
function ebgp_import_v6()
|
|
bool ok;
|
|
{
|
|
ok = true;
|
|
|
|
# Make sure we dont use peering IPs for originating traffic
|
|
krt_prefsrc = 2a09:11c0:200::14;
|
|
|
|
|
|
if roa_check(roa_v6, net, bgp_path.last_nonaggregated) = ROA_VALID then
|
|
bgp_large_community.add(informational_rpki_valid);
|
|
else if roa_check(roa_v6, net, bgp_path.last_nonaggregated) = ROA_UNKNOWN then
|
|
bgp_large_community.add(informational_rpki_unknown);
|
|
else if roa_check(roa_v6, net, bgp_path.last_nonaggregated) = ROA_INVALID then {
|
|
print "Ignore RPKI invalid ", net, " for ASN ", bgp_path.last, " from ", proto;
|
|
bgp_large_community.add(informational_rpki_invalid);
|
|
ok = false;
|
|
}
|
|
else
|
|
bgp_large_community.add(informational_rpki_not_checked);
|
|
|
|
if net.len > 48 then {
|
|
bgp_large_community.add(filtered_import_prefix_too_long);
|
|
ok = false;
|
|
}
|
|
|
|
if bgp_path.len > 64 then {
|
|
bgp_large_community.add(filtered_import_as_path_too_long);
|
|
ok = false;
|
|
}
|
|
|
|
return ok;
|
|
}
|
|
|
|
function ebgp_export_v4()
|
|
bool ok;
|
|
{
|
|
# I dont have ane IPv4 prefixes :(
|
|
return false;
|
|
}
|
|
|
|
function ebgp_export_v6()
|
|
bool ok;
|
|
{
|
|
ok = true;
|
|
|
|
if ! is_mine_ripe() then
|
|
ok = false;
|
|
|
|
return ok;
|
|
}
|