Introduction

This document outlines the security peering policy for SPMZT. Our goal is to maintain a secure and reliable peering environment while promoting an open peering policy that encourages collaboration and connectivity.

Peering Philosophy

Our LIR adopts an open peering philosophy, welcoming peering requests from any legitimate network that meets our criteria.

Peering Criteria

To establish a peering relationship, the following criteria must be met:

  • The requesting network must have a valid Autonomous System Number (ASN).
  • The network must have a valid AS-SET for their prefixes and their downstreams.
  • The network must demonstrate a commitment to maintaining a secure and stable connection.
  • The network must fully support IPv6 and be capable of securely forwarding IPv6 traffic in compliance with all relevant IETF RFC standards.

Security Measures

To ensure the security of our peering connections, we implement the following measures:

  • BGP Security: We require the use of the Resource Public Key Infrastructure (RPKI) to validate route announcements. All peers must implement BGP prefix filtering to prevent route hijacking.
  • Traffic Filtering: We reserve the right to filter traffic that appears malicious or violates our acceptable use policy.
  • Monitoring: We continuously monitor peering connections for unusual activity and will take appropriate action if any security threats are detected.

Acceptable Use Policy

All peers must adhere to our acceptable use policy, which prohibits:

  • Any form of DDoS attacks or other malicious activities.
  • The transmission of illegal content or activities is prohibited, except for Tor traffic, for which the network must provide proof that any abuse originates from a Tor exit node. Additionally, the network must be prepared to terminate the session if requested by us.
  • Any actions that could compromise the integrity or security of our network or that of our peers.

Incident Response

In the event of a security incident, we will:

  • Notify affected peers as soon as possible.
  • Collaborate with peers to investigate and mitigate the incident.
  • Review and update our security measures as necessary to prevent future incidents.

Policy Review

This peering policy will be reviewed annually or as needed to ensure its effectiveness and relevance. Feedback from peers is encouraged to improve our policies and practices.

Contact Information

For inquiries regarding our peering policy or to initiate a peering request, please contact us at info@spmzt.net.