We are done reviewing. I've sent a few emails to different networks directly.

Please check your sessions and let me know if you are seeing something broken that should not be.

Please review your routes for filtering:

  1. Go to the looking glass: https://ixpmgr.micemn.net/lg
  2. IPv4 will be selected by default at the top.
  3. Click "Looking Glass" for "Route Server #1 - MICE - IPv4"
  4. Find your network. You can use the search box to filter, e.g. by ASN.
  5. Click on the number in the State/PfxRcd column. If you do not see that column, either expand your browser window (the scroll bar is not enough for me) or click the blue + icon.
  6. That will show you just the prefixes that MICE is receiving from you / that you are announcing to MICE.
  7. If any of them show the black ! triangle icon, that is getting filtered now (albeit only on one route server). You should fix that ASAP.
  8. For everything else, since the filtering is not currently enforced, there is unfortunately no "at a glance" way to see if anything would be filtered. If you click on "Details" for a particular route, you can see its RPKI/IRR status in the "BGP :: Large Communities" section. If you see something in red, that is bad.
  9. After checking IPv4, repeat for IPv6.

For example, here are my IPv6 routes: https://ixpmgr.micemn.net/lg/rs1-ipv6/routes/protocol/pb_0102_as33362 At the moment, I am announcing a 2600:2600::666/128 that is being filtered. (This is from blackhole testing. Ignore the whole blackhole thing for now, please.) I can see it is filtered from the black ! triangle icon. If I click "Details" for it, I can see the reason for filtering is "PREFIX LENGTH TOO LONG".

--
Richard


To unsubscribe from the MICE-ANNOUNCE list, click the following link:
&*TICKET_URL(MICE-ANNOUNCE,SIGNOFF);