<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blackhole on Wirez</title><link>https://wirez.top/tags/blackhole/</link><description>Recent content in Blackhole on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 01 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/blackhole/index.xml" rel="self" type="application/rss+xml"/><item><title>Active path verification stops blackhole errors</title><link>https://wirez.top/posts/active-path-verification-stops-blackhole-errors/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/active-path-verification-stops-blackhole-errors/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With &lt;a href="https://datatracker.ietf.org/doc/html/rfc6480" target="_blank" rel="noopener noreferrer">RPKI&lt;/a> adoption for leased prefixes surging from 29.9% in 2021 to 71.0% by late 2024, validating &lt;strong>blackhole routes&lt;/strong> remains dangerously ambiguous. Blindly propagating these filters across all points of view often collapses complex routing topologies into a single, erroneous perspective that the source ASN never authorized.&lt;/p></description></item><item><title>Blackhole route checks: Stop accidental outages</title><link>https://wirez.top/posts/blackhole-route-checks-stop-accidental-outages/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/blackhole-route-checks-stop-accidental-outages/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With the SDN market projected to grow over 4x in the next decade, automating &lt;strong>blackhole route&lt;/strong> validation is no longer optional. Reliance on legacy Internet Routing Registry (IRR) data creates critical vulnerabilities where unauthorized traffic suppression can cascade across networks due to blind acceptance of unverified path requests.&lt;/p></description></item><item><title>Blackhole validation must use active path data now</title><link>https://wirez.top/posts/blackhole-validation-must-use-active-path-data-now/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/blackhole-validation-must-use-active-path-data-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Strict path verification now overrides legacy IRR checks, as 2026 mandates enforce penalties for invalid blackhole route requests. The industry has decisively shifted from voluntary filtering to rigid &lt;strong>enforcement protocols&lt;/strong>, where regulators and Tier-1 providers penalize operators who fail to validate traffic forwarding paths accurately. Job Snijders confirmed in a March 2026 NANOG discussion that modern &lt;strong>blackhole validation&lt;/strong> must discard reliance on unverified IRR data, noting that such arbitrary lists lack the provenance required for today&amp;#039;s compliance environment. Instead, operators must verify if IP traffic is actively forwarded to the requesting entity before honoring any mitigation request.&lt;/p></description></item><item><title>RTBH validation: Secure blackhole routing fast</title><link>https://wirez.top/posts/rtbh-validation-secure-blackhole-routing-fast/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rtbh-validation-secure-blackhole-routing-fast/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Validating &lt;strong>RTBH routes&lt;/strong> requires checking for the &lt;strong>BLACKHOLE community&lt;/strong> within seconds, not relying on stale IRR data. The central thesis is that operators must shift to &lt;strong>originAS-only validation&lt;/strong> specifically for blackhole traffic, enforcing strict community attachment while ignoring maxLength constraints to ensure rapid, secure mitigation.&lt;/p></description></item><item><title>Validation errors break blackhole routes now</title><link>https://wirez.top/posts/validation-errors-break-blackhole-routes-now/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/validation-errors-break-blackhole-routes-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Bryton Herdes warns that relaxing &lt;strong>maxLength protections&lt;/strong> for blackhole routes creates a direct path for BGP hijacks.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The central thesis is that networks must strictly pair &lt;strong>originAS-only validation&lt;/strong> with the mandatory presence of the &lt;strong>BLACKHOLE community&lt;/strong> to prevent security degradation. While the global network security market races toward USD 205.98 billion by 2031, basic BGP hygiene remains fragile without these specific constraints. Herdes, a Principal Network Engineer at Cloudflare, argues that vendors offering shortcut configurations for loose validation directly undermine RFC9319 standards. &lt;a href="https://blog.cloudflare.com/rpki-2020-fall-update/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s rpki 2020 fall update&lt;/a>&lt;/p></description></item></channel></rss>