AS-SET failures directly impact global internet stability and expose operators to routing attacks, making their phase‑out critical for network security and reliability.
AS-SETs were introduced in the early 2000s as a convenient mechanism for aggregating Autonomous System (AS) numbers into a single identifier that could be referenced in BGP import and export filters. By allowing network operators to group multiple upstream or downstream ASes, they promised to reduce the complexity of eBGP peering configurations and accelerate policy deployment across large fabrics. In theory, a single AS-SET entry could replace dozens of individual AS‑path statements, streamlining route‑control at the edge of the internet. This approach also simplified coordination among transit providers during rapid network growth.
In practice, however, AS-SETs have become a source of operational risk. Because the set definitions are often maintained manually, errors propagate quickly, leading to unintended route announcements and, in extreme cases, global routing leaks. The lack of real‑time validation means that a stale or overly permissive AS-SET can expose an ISP to hijacks or traffic black‑holing. Moreover, the opaque nature of nested AS-SETs hampers troubleshooting, forcing engineers to sift through layers of inherited policies to pinpoint the root cause. Consequently, network outages triggered by AS-SET errors have prompted regulatory scrutiny.
The industry response is shifting toward more granular, automated controls such as prefix‑list filters, RPKI‑based origin validation, and BGPsec. These tools provide cryptographic assurance and eliminate the need for manual AS-SET maintenance, reducing the attack surface for routing incidents. Leading operators are already deprecating AS-SETs in favor of policy‑as‑code frameworks that integrate directly with network orchestration platforms. As standards bodies discuss formal retirement pathways, the consensus is clear: reliable, data‑driven routing security will replace legacy AS-SET practices. Adopting these modern mechanisms not only improves resilience but also aligns with emerging compliance frameworks.
AS-SETs (not that kind) were originally designed to simplify filtering at eBGP peering points--but they seem to have gone horribly wrong. Job Snijders and Doug Madory join Tom and Russ to discuss the history, use, problems, and (hopeful) demise of AS-SETs.
Comments
Want to join the conversation?
Loading comments...