High quality,low latency.
AS393577 is a network created by us, whose purpose is to provide high quality routing to hobbyists, developers, and anyone else. Our network's quality is consistently rated as one of the best in our category of hosting providers.
Short AS Path
High Quality Peering
Low Latency
Information
Contact
Additionally, you can visit our contact us page for more information.
Compliance
We recently joined Mutually Agreed Norms for Routing Security (MANRS) to help secure the internet's routing infrastructure because we believe that a stable and secure network is essential for everyone. By participating in the MANRS initiative, we are committing to implement best practices that enhance the resilience of the global internet.
Peering Policy
- Have an ASN and publicly routable IP space of at least a /24 IPv4 and/or /48 IPv6.
- Have an entry on PeeringDB and keep it up to date.
- All routes must be filtered to only send routes that have valid RPKI records.
- Only send routes that you are allowed to send or from your own network.
- Only send traffic that is destined to routes that we announced to you.
- You add our ASN to your AS-SET, and accept any routes from our upstream AS-SET.
- You do not announce bogons.
- Not point default or static routes at us without permission. You must only send us traffic for prefixes we advertise.
Routing Policy
Attempt to find an as-set to use for this network:
- In PeeringDB, for this ASN, check for an IRR as-set name. Validate the as-set name by retrieving it. If it exists, use it.
- In IRR, query for an aut-num for this ASN. If it exists, inspect the aut-num for this ASN to see if we can extract from their IRR policy an as-set for what they will announce to Tritan by finding export or mp-export to AS393577, ANY, or AS-ANY. Precedence is as follows: The first match is used, "export" is checked before "mp-export", and "export: to AS393577" is checked before "export: to ANY" or "export: to AS-ANY". Validate the as-set name by retrieving it. If it exists, use it.
- Check various internal lists maintained by Tritan Internet's NOC that map ASNs to as-set names where we discovered or were told of them. Validate the as-set name by retrieving it. If it exists, use it.
- If no as-set name is found by the previous steps use the ASN.
- Collect the received routes for all BGP sessions with this ASN. This details both accepted and filtered routes.
For each route, perform the following rejection tests:
- Reject default routes 0.0.0.0/0 and ::/0.
- Reject AS paths that use BGP AS_SET notation (i.e. [1] or [1 2], etc).
- Reject prefix lengths less than minimum and greater than maximum. For IPv4 this is 8 and 24. For IPv6 this is 16 and 48. 3.4 Reject bogons (RFC1918, documentation prefix, etc).
- Reject exchange prefixes for all exchanges Tritan Internet is connected to.
- Reject AS paths that use unallocated ASNs between 64496 to 131071 and 1000000 to 4294967295. https://www.iana.org/assignments/as-numbers/as-numbers.xhtml
- Reject AS paths that use AS23456. AS23456 should not be encountered in the AS paths of BGP speakers that support 32-bit ASNs.
- Reject AS paths that use AS0. As per RFC 7606, "A BGP speaker MUST NOT originate or propagate a route with an AS number of zero".
- Reject routes that have RPKI status INVALID_ASN or INVALID_LENGTH based on the origin AS and prefix.
- Reject AS paths that use known transit networks.
BGP Communities
- 393577:0:12, Route originated from transit provider.
- 393577:0:13, Route originated from an internet exchange.
- 393577:0:14, Route originated from direct peer.
- 393577:0:15, Route originated from downstream.
- Route originated from internal router.
- Do not announce to route servers.
- Prepend 1x to our tier 1 providers
- Remote triggered blackhole (request to be enabled).
"Good for the Internet"
Internet Exchanges
Connectivity
Tritan Internet is proud to power the following networks:
Name | ASN | PeeringDB |
---|
Still not convinced?
Our team is here to help. Contact us today to learn more about our network.
Reach out