Re: IPv6 BGP table size comparisons

2010-12-21 Thread Kevin Loch

Jared Mauch wrote:

Maybe this is a good place to start..

http://www.sixxs.net/tools/grh/compare/

- Jared

On Dec 21, 2010, at 11:32 AM, Frank Bulk wrote:


A week or more ago someone posted in NANOG or elsewhere a site that had made
a comparison of the IPv6 BGP table sizes of different operators (i.e. HE,
Cogent, Sprint, etc), making the point that a full view might take multiple
feeds.  I think that website also had text files with the comparisons.

But I can't find that e-mail or website anywhere!

Does anyone know where that listserv posting or website is?



Also route-views6.routeviews.org has several feeds.

- Kevin



Re: Where to go for connectivity in VA / DC

2011-01-06 Thread Kevin Loch

bas wrote:

Hi,

We've recently opened a POP in northern Virginia.
The DC does not have a lot of connectivity options to choose from.

So we've ordered dark fiber to Equinix Ashburn DC2, we will light it
up with our own DWDM, and pick up connectivity there.

We do however need a second point to pick up connectivity for
redundancy purposes. (that runway from IAD is pretty scary)
Initially we had thought to pick up that connectivity at Coresite K-street.
However many of the carriers we use are not available at K-street.


8100 Boone Blvd.

- Kevin



Re: ISP support for use of 4-byte ASNs in peering

2011-08-09 Thread Kevin Loch

John Curran wrote:
Folks - 
 
  Is there a public list somewhere of service providers that do not support 4-byte 
  autonomous system numbers when peering?  (if not, should there be one?)


  At ARIN, we are still having parties returning 4-byte ASN's (seeking 2-byte 
instead),
  indicating that the 4-byte ones are not sufficiently accepted in peering to be usable.  
  This is obviously a less than desirable situation, and it appears that it is not trending 
  towards resolution at this time.


Perhaps you meant to send this to c-nsp and re-worded it slightly?

- Kevin



Re: Aqua Conduit for 10G multi-mode?

2011-08-30 Thread Kevin Loch

Michael J McCafferty wrote:

All,
Orange innerduct/split-loom tubing for multi-mode, yellow for
single-mode... Where's the aqua for the aqua OM3 fiber?
I feel like the Ethernet fashion police, but it's a horrible color
clash for aqua fiber dressed in yellow or orange.

Where is my aqua innerduct and/or tubing? Does anyone make it?


I'm guessing that there isn't much of a market for that since 10Gbase-LR
is rated from 2m-10km and most people don't use conduit for runs less
than 2 meters :)

- Kevin



Re: Advice on BGP traffic engineering for classified traffic

2011-10-26 Thread Kevin Loch

Jack Bates wrote:
I'm curious if anyone has a pointer on traffic manipulation for 
classified traffic.


Basics, I have a really cheap transit connection that some customers are 
paying reduced rates to only use that connection (and not my other 
transits). Though I've considered support for cases where NSP peering 
disputes break out. While I can advertise their networks out the correct 
transit for return traffic, I still have to figure out how to handle 
egress traffic.


I'm guessing the crux of it is policy routing based on source address, 
but I'm interested in ways to engineer it to easy management and 
scalability. I've considered the possibility of an l3vpn to interconnect 
customers that are not requiring full routes, and possibly some type of 
vpls tunnel terminated at the necessary router for customers who need 
full routes.


Thoughts, pointers, suggestions?


One simple way to do this is with two routers each with a different
table.  One for your expensive transit and one for your cheap transit.
Each customer's vlan is on both routers with vrrp preference
set to the desired router for non-bgp customers.  expensive transit
customers have the ability to failover to the cheap router.
you may or not want to allow the reverse to occur.

- Kevin





Re: Colocation providers and ACL requests

2011-11-01 Thread Kevin Loch

Christopher Pilkington wrote:

Is it common in the industry for a colocation provider, when requested to put 
an egress ACL facing us such as:

  deny udp any a.b.c.d/24 eq 80

…to refuse and tell us we must subscribe to their managed DDOS product?


We have always accommodated temporary ACL's for active DDOS attacks.  I
think that is fairly standard across the ISP/hosting industry.

I do feel it is bad practice to regularly implement customer specific
ACL's on routers.  If a customer wants a managed firewall we have a
full range of those services available.

- Kevin



Re: economic value of low AS numbers

2011-11-17 Thread Kevin Loch

Dave Hart wrote:

AS path geeks:

At the risk of invoking ire and eliciting comparisons to the
widely-reviled and growing practice of selling IPv4 addresses, I'm
wondering if anyone has sold legacy AS numbers for quick cash.


I have heard first hand stories of folks being offered 5 figures
for four digit ASN's in the past (and they did not sell btw).   That was
before ARIN started recycling unused short ASN's two years ago.  There
was a three month period in 2009 where almost every ASN assigned by ARIN 
was < 1 as they burned through the backlog.


- Kevin



Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-21 Thread Kevin Loch

Ravi Duggal wrote:


We thus have draft-droms-dhc-dhcpv6-default-router-00 that extends
DHCPv6 to do what RA does. And now, we have
draft-bcd-6man-ntp-server-ra-opt-00.txt that extends RA to advertise
the NTP information that is currently done via DHCPv6.

My question is, that which then is the more preferred option for the
operators? 


In many environments RA is a catastrophic disaster. Some operators need
to be able to do everything with RA turned off on routers, disabled on
hosts and filtered on switches.

- Kevin



Re: subnet prefix length > 64 breaks IPv6?

2011-12-29 Thread Kevin Loch

Iljitsch van Beijnum wrote:

On 24 Dec 2011, at 6:32 , Glen Kent wrote:


I am trying to understand why standards say that "using a subnet
prefix length other than a /64 will break many features of IPv6,
including Neighbor Discovery (ND), Secure Neighbor Discovery (SEND)
[RFC3971], .. " [reference RFC 5375]


For stateless autoconfig the issue is that it uses 64-bit "interface 
identifiers" (~ MAC addresses) that are supposed to be globally unique. You can't 
shave off bits and remain globally unique.

With SEND a cryptographic hash that can be used to determine address ownership 
is stored in the interface identifier. Here shaving off addresses reduces 
security.

Also somehow the rule that all normal address space must use 64-bit interface 
identifiers found its way into the specs for no reason that I have ever been able 
to uncover. On the other hand there's also the rule that IPv6 is classless and 
therefore routing on any prefix length must be supported, although for some 
implementations forwarding based on > /64 is somewhat less efficient.



The 64 bit "mattress tag" is one of the cute historical quirks of IPv6.
Of course in practice we use all sorts of longer prefixes for the same
reasons we do in IPv4:  Loopback ips, Limiting the scope of
infrastructure links and server subnets, the many uses of more specific
static routes, null routes (including the very important /128 ddos
blackhole).

The good news is that vendors recognized the need to efficiently route
all 128 bits.  Is there any known platform that does not?  I'm starting
to think this is an ancient myth that keeps resurfacing.

- Kevin



Re: Misconceptions, was: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-30 Thread Kevin Loch

Steven Bellovin wrote:


VRRP?  The Router Discovery Protocol (RFC 1256).  But given
how much more reliable routers are today than in 1984, I'm
not convinced it's that necessary these days.


VRRP is an absolutely essential protocol in today's Internet.  We use
it on every non-bgp customer port.  Routers still have routing and
performance issues, hardware failures and routine software upgrades.
The layer2 infrastructure between the routers and the customer is also
susceptible to various hardware/software/maintenance problems and fiber
cuts and VRRP can help work around some of those.  A nice side benefit
is the virtual mac addresses that allow for migration to new routers
without the mac address of the default gateway changing.

One key advantage of VRRP over RA's is that you can have multiple
instances on the same layer2 network (vlan) with different functions.

It is very common to have different "routers" (routers, firewalls or
load balancers) on the same vlan with different functions in hosting
environments.  It is also sometimes necessary to have multiple default
gateways on the same vlan for load balancing or traffic engineering.
RA/auto configuration is incompatible with all but the most trivial
configurations.

- Kevin



Re: NANOG 40 agenda posted

2007-05-29 Thread Kevin Loch


Jared Mauch wrote:

Some providers (eg: www.us.ntt.net) have their sales/marketing
path ipv6 enabled.  Perhaps this will help self-select customers that are
clued? ;)


Most European/Asian based providers/peers don't even blink when I
mention turning up IPv6.  Not so with most US based networks.


The upcoming nanog meeting I think will have native IPv6
connectivity (not a tunnel).  It's a good time for folks to
play around with it.  Visit the ipv6 enabled websites from the lan.
Submit a nice 10 min talk saying what you loved and what you hated
about the ipv6 network.


Better yet, nanog would be a good place for folks to arrange IPv6 peering.

- Kevin


Re: IPv6 Deployment (Was: Re: NANOG 40 agenda posted)

2007-05-30 Thread Kevin Loch


Donald Stahl wrote:


If ARIN is going to assign /48's, and people are blocking anything 
longer than /32- well then that's a problem :)


To be specific, ARIN is currently assigning up to /48 out of
2620::/23.

I noticed that http://www.space.net/~gert/RIPE/ipv6-filters.html
has the following entry in the "strict" list:

ipv6 prefix-list ipv6-ebgp-strict permit 2620::/23 ge 24 le 32

which is not particularly useful. It should be 'le 48' if the
intent is to track RIR assignment policies.

- Kevin


Re: Router for Metro Ethernet

2010-04-12 Thread Kevin Loch

Jeffrey Negro wrote:

In our case I believe we would be dealing with just static routes and a
lines of ACL. 


In that case a linux/FreeBSD router would work great.

- Kevin



Re: Rate of growth on IPv6 not fast enough?

2010-04-19 Thread Kevin Loch

sth...@nethelp.no wrote:


*If* the whole IPv6 config can be driven from the same database. For
the time being, DHCPv6 cannot deliver a default gateway to customers
(and there is a religious faction within the IPv6 community which
seem to want to prevent this at all costs).


s/IPv6/IETF/

I don't know of anyone outside of the IETF promoting the insanity
of a DHCP server not having the option of giving out a gateway address.

- Kevin



Re: Lightly used IP addresses

2010-08-13 Thread Kevin Loch

Randy Bush wrote:
(and to answer Randy - the only control over the administration is based 
on the policies adopted.  Reduce the corpus of applicable policy if that

is your desire.)


we created careers for junior policiy weenies.  arin and other rirs have
become well-funded playgrounds for the semi-clued who think they can and
should tell others how to run their businesses, operate the internet, ..


Yet most of the bad ideas in the past 15 years have actually come from
the IETF (TLA's, no end site multihoming, RA religion), some of which
have actually been "fixed" by the RIR's.

The RIR's provide uniqueness and have done a good job at that.  Who 
cares how they make the sausage?


- Kevin



Re: Phoenix Area Network Issues?

2009-04-27 Thread Kevin Loch

Something is definately happening, 50% drop in inbound
traffic to our PHX datacenter across all transit providers.

- Kevin

Ray Sanders wrote:

Are there any fiber cuts or other routing issues anyone in the Phoenix
area is aware of?


Thanks. 






Re: Phoenix Area Network Issues?

2009-04-27 Thread Kevin Loch

Kevin Loch wrote:

Something is definately happening, 50% drop in inbound
traffic to our PHX datacenter across all transit providers.

- Kevin

Ray Sanders wrote:

Are there any fiber cuts or other routing issues anyone in the Phoenix


Update: Qwest did not appear to be affected by this, Highwinds
traffic has just returned to normal, Level3 and GBLX still
affected.

- Kevin



Re: Eye protection in DWDM systems -- what threshold?

2009-06-09 Thread Kevin Loch

On Tue, Jun 09, 2009 at 04:06:58PM -0400, Deepak Jain wrote:
This conversation has gone places I didn't expect. Leo, that card is 
pretty cool, but for a few hundred $$ more, you can get a light meter 
(if someone is smart enough to use the card...)


In a pinch the camera on a MacBook pro can be used to detect
presence of IR light.  Here's light from a 10Gbase-LR xenpak:

http://www.majhost.com/gallery/kl/Macbook/macbook-laser-camera.jpg

It's easier to see when previewing in real time than
in the static picture but it does require careful aim.

- Kevin



Re: Repeated Blacklisting / IP reputation

2009-09-10 Thread Kevin Loch

Benjamin Billon wrote:



 Why don't we just blacklist everything and only whitelist those we know
 are good?


Note we all could start using IPv6 and avoid this problem altogether.


Yeah. When ISP will start receiving SMTP traffic in IPv6, they could 
start to accept whitelisted senders only.


"IPv6 emails == clean"

Utopian thought?


Are you not receiving SMTP traffic via IPv6 yet?

Received: from s0.nanog.org ([IPv6:2001:48a8:6880:95::20])

- Kevin




Re: Wireless STM-1 link

2009-09-10 Thread Kevin Loch

Brian Reichert wrote:

On Thu, Sep 10, 2009 at 11:55:40AM +0200, Rens wrote:

All the interfaces are forced to 1Gbps and full duplex.


I thought that with 1000T, you need to keep autonegotiation in place:

  
http://etherealmind.com/2008/07/15/ethernet-autonegotiation-works-why-how-standard-should-be-set/

"A major problem is that many people are also hard setting
Gigabit Ethernet , and this is causing major problems. Gigabit
Ethernet must have auto-negotiation ENABLED to allow negotiation
of master / slave PHY relationship for clocking at the physical
layer.  Without negotiation the line clock will not establish
correctly and physical layers problems can result."

Further:

  http://en.wikipedia.org/wiki/Autonegotiation

"The debatable portions of the autonegotiation specifications were
eliminated by the 1998 version of IEEE 802.3. In 1999, the negotiation
protocol was significantly extended by IEEE 802.3ab, which specified the
protocol for gigabit Ethernet, making autonegotiation mandatory for
1000BASE-T gigabit Ethernet over copper."

Note the 'mandatory'...



I'm in the "it's not 1996 anymore, let autonegotiation do it's
job" camp.  I occasionally see folks who religiously "lock down"
all ports only to create the very duplex mismatches they are trying
to avoid.  Engineers, equipment, port positions and operating systems
can change over time defeating even the best laid plans for total
port control.

- Kevin



Re: Multi-homed implementation and BGP convergence time

2009-09-11 Thread Kevin Loch

Seth Mattinen wrote:

Jay Hennigan wrote:

"Tier 1", "tier 2" etc. are terms used primarily by salespeople, and
don't have a lot to do with technical matters.



Sure it does. If you're multihoming it will increase your AS path length.


There is no general correlation between AS path length and whether
or not a network pays to exchange traffic.

There is a noticeable correlation between cost and local-preference,
as-path prepending, metric setting and other ways networks control
how they send you traffic.  This is affected by peering selectivity
as well as transit prices.


- Kevin



Re: ISP customer assignments

2009-10-06 Thread Kevin Loch

Owen DeLong wrote:


Part of the reason that 128 bits was chosen (64 bits is FAR more than
enough) was that it allowed for 64 bits of stateless auto-configuration
(IEEE was already pushing EUI-64) within each network and still
provided more than enough network numbers.


I'm sure the Really Smart People over at the IETF could have figured
out a way to do auto configuration with "just" 16 bits of /112 (or
a /48 of 64 bit space).

It will be interesting to see if things evolve to using /112's anyway
just to escape auto configuration.  I use them for router links and 
server subnets because it's a convenient boundary for notation.


- Kevin



Re: Practical numbers for IPv6 allocations

2009-10-07 Thread Kevin Loch

David Conrad wrote:

On Oct 6, 2009, at 6:13 PM, Nathan Ward wrote:
My understanding is that the RIRs are doing sparse allocation, as 
opposed to reserving a few bits. I could be wrong.


Last I heard, with the exception of APNIC and contrary to what they 
indicated they'd do prior to IANA allocating the /12s, you are indeed 
wrong.  I'd be happy to hear things have changed.


Only APNIC is doing "bisection" style assignments today:

20091001|apnic|AU|ipv6|2402:c00::|32|allocated
20091001|apnic|SG|ipv6|2402:400::|32|allocated
20091005|apnic|JP|ipv6|2402:1400::|32|allocated
20091006|apnic|NZ|ipv6|2402:1c00::|32|allocated

20090930|arin|US|ipv6|2607:fd70::|32|allocated
20090930|arin|CA|ipv6|2607:fd78::|32|allocated
20091001|arin|US|ipv6|2607:fd80::|32|allocated
20091006|arin|US|ipv6|2607:fd88::|32|allocated

20091005|ripencc|RU|ipv6|2a00:1440::|32|allocated
20091005|ripencc|SI|ipv6|2a00:1448::|32|allocated
20091005|ripencc|IE|ipv6|2a00:1450::|32|allocated
20091005|ripencc|BE|ipv6|2a00:1458::|32|allocated

20090709|lacnic|PY|ipv6|2800:3a0::|32|allocated
20090714|lacnic|CL|ipv6|2800:3b0::|32|allocated
20090807|lacnic|GY|ipv6|2800:3c0::|32|allocated
20090903|lacnic|AR|ipv6|2800:3d0::|32|allocated

20090708|afrinic|GH|ipv6|2001:43c0::|32|allocated
20090729|afrinic|EG|ipv6|2001:43c8::|32|allocated
20090813|afrinic|KE|ipv6|2001:43d0::|32|allocated
20090909|afrinic|ZA|ipv6|2001:43d8::|32|allocated

- Kevin



Re: 32-bit AS numbers

2009-10-09 Thread Kevin Loch

Greg Hankins wrote:


We also started a Wiki with content based on the presentation that has
more updated information, including a current list of vendor support.
If you see a vendor missing, let us know and we can update the list.
Or better yet, create an account and add some content yourself :-).

http://as4.cluepon.net/index.php/Main_Page


While it's good to see support _finally_ in 2.2SX, I still don't see it
in 12.2SR (for rsp720).  It's almost like Cisco has no idea how
many of these things are actually used on the Internet.

- Kevin



Re: IPv6 internet broken, Verizon route prefix length policy

2009-10-12 Thread Kevin Loch

Adrian Chadd wrote:

On Tue, Oct 13, 2009, valdis.kletni...@vt.edu wrote:


You get some substantial wins for the non-TE case by being able to fix
the legacy cruft.  For instance, AS1312 advertises 4 prefixes:
63.164.28.0/22, 128.173.0.0/16, 192.70.187.0/24, 198.82.0.0/16
but on the IPv6 side we've just got 2001:468:c80::/48.

And we're currently advertising *more* address space in one /48 than we
are in the 4 IPv4 prefixes - we have a large chunk of wireless network that
is currently NAT'ed into the 172.31 space because we simply ran out of room
in our 2 /16s - but we give those users globally routed IPv6 addresses.



I suggest you're not yet doing enough IPv6 traffic to have to care
about IPv6 TE.


I think he was pointing out that extra routes due to "slow start"
policies should not be a factor in v6.  My guess is that is about
half of the "extra" routes announced today, the other half being
TE routes.

Speaking of TE, it's going to be interesting to see how we deal with
that.  We can't expect everyone to accept any /48 that gets announced.
I'm still waiting for the first time someone blows up the Internet
by announcing all 65536 /48's in their /32.  I'm amazed it hasn't
happened yet.

Stricter use of the IRR might help if there wasn't rampant auto
proxy registering going on.  RPKI may be the answer since that
can't be proxy-registered.  That would at least mitigate router
bugs and carelessness.   The issue of what intentional TE routes
are seen as "acceptable" is another issue.

- Kevin



Re: ISP customer assignments

2009-10-13 Thread Kevin Loch

Chris Adams wrote:

I guess I'm missing something; what in section 3 is this referring to?
I can understand /64 or /126 (or maybe /124 if you were going to
delegate reverse DNS?), but why /112 and "16 bits for node identifiers"
on a point-to-point link?


The only thing special about /112 is that it is on a ":" boundary
so it makes for some nice numbering plans:

Let's say you set aside 2001::0:1::/64 for /112's

link 1:
2001::0:1::1:1
2001::0:1::1:2

link 2:
2001::0:1::2:1
2001::0:1::2:2

This :1, :2 arrangement seems to be common but for internal links you
could make the last hextet be a unique id for the specific router.
That could use more than a few bits in a large network.

- Kevin




Re: IPv6 Deployment for the LAN

2009-10-18 Thread Kevin Loch

Nathan Ward wrote:


On 19/10/2009, at 1:10 AM, Owen DeLong wrote:


On Oct 18, 2009, at 3:05 AM, Nathan Ward wrote:


On 18/10/2009, at 11:02 PM, Andy Davidson wrote:


On 18 Oct 2009, at 09:29, Nathan Ward wrote:


RA is needed to tell a host to use DHCPv6


This is not ideal.


Why?
Remember RA does not mean SLAAC, it just means RA.


Because RA assumes that all routers are created equal.


RFC4191


In some cases different devices on a segment need a different
default router (for default).  This is the fundamental
problem with RA's, they shotgun the entire segment.




Because RA is harder to filter.


DHCP in IPv4 was hard to filter before vendors implemented it, too.

Because the bifercated approach to giving a host router/mask 
information and address information

creates a number of unnecessary new security concerns.


Security concerns would be useful to explore. Can you expand on this?


What would be useful would be having the option to give a default
router to a dhcpv6 client, and having vrrpv6 work without RA's.
Why can't we have those options in our toolbox in addition to
this continuously evolving RA+hacks?

- Kevin



Re: IPv6 Deployment for the LAN

2009-10-18 Thread Kevin Loch

TJ wrote:

In some cases different devices on a segment need a different
default router (for default).  This is the fundamental


This capability is also defined, "more specific routes" - but no one
encouraged any vendors that I know of to support it - so they don't.  Big
demand?


by "Default" I meant 0.0.0.0/0, not more specifics.


problem with RA's, they shotgun the entire segment.


As opposed to a standard deployment, where the DHCP server provides the same
information to every host on that link ... ???


Not always.  The DHCP server can be aware of specific clients by
mac address and give different options (and even pseudo-static IPs).
DHCP server is not always running on a router so adding this 
functionality to routers won't help.


- Kevin



Re: IPv6 Deployment for the LAN

2009-10-21 Thread Kevin Loch

Iljitsch van Beijnum wrote:

On 18 okt 2009, at 10:03, Andy Davidson wrote:


Support default-routing options for DHCPv6 !


This would be a big mistake. Fate sharing between the device that 
advertises the presence of a router and the device that forwards packets 
makes RAs much more robust than DHCPv4. And DHCPv6 is just a case of 
very bad design, don't expect it to work well without bending over 
backwards even farther than you're used to with DHCPv4. It's time for 
this DHC stuff to reach its final resting place.


Then don't use it.  That's why it's called an Option :)

However some of us actually need to use this stuff and sometimes
in ways not imagined by the IETF.

- Kevin




Re: IPv6 Deployment for the LAN

2009-10-22 Thread Kevin Loch

Iljitsch van Beijnum wrote:

If, on the other hand, the REAL desire is to have a DHCP server break 
the tie in the selection between several routers that advertise their 
presence, that wouldn't be unreasonable.


In some configurations not all hosts are supposed to use the same
router.  We need the _option_ to specify a default gateway and
have the override any RA's a host may see.

There is no requirement that the IETF provides all functionality that 
someone can think up. The list of desired functionality is infinite, and 
much on that list is a bad idea and/or can be achieved in different ways.


Ok, lets start with not breaking the functionality we have today
in IPv4.  Once you get that working again we can look at new
ideas (like RA) that might have utility. Let the new stuff live/die on
it's own merits.  The Internet is very good at sorting out the useful
technology from the crap.

Seriously, we're all adults.  So treating us like children and taking 
away

the power tools is not appreciated.


Stop trying to break the internet and I'll treat you like an adult.


At conferences I keep hearing "It would be great if the IETF had
more operator input."  Yet whenever we try to provide operationally
useful advice we are ridiculed for not being smart enough to know
how things should work.

How do we fix that?

- Kevin






Re: about interdomain multipath routing.

2009-11-09 Thread Kevin Loch

Bin Dai wrote:

Hi:
These days, in the research, the interdomain multipath routing is pretty 
hot but i doubt its actually use in reality.
Does anyone tell me any use of interdomain multipath routing like 
multipath BGP in the real world?


"BGP multipath" is extremely common and used to load balance multiple
links to the same neighbor ASN.  As implemented by popular vendors it
requires most attributes (like as-path) to be identical.

Did you really mean this or something that uses different as-paths
in parallel?

- Kevin






Re: Internet partitioning event regulations

2008-11-05 Thread Kevin Loch

William Herrin wrote:

On Wed, Nov 5, 2008 at 12:12 PM, Larry Sheldon <[EMAIL PROTECTED]> wrote:

Lamar Owen wrote:

There are three ways that I know of (feel free to add to this
list) to limit the events: 1.) As you mentioned, regulation (or a
government run and regulated backbone);

Which government?


First, let me say that I think peering regulation is a terrible idea.
No matter how cleverly you plan it, the result will be that fewer
small companies can participate. That's the character of regulation:
compliance creates more barriers to entry than it removes.


The problem isn't that which networks don't peer with each other it is
that some networks don't buy transit from anyone.  That is what
causes partition related outages and distortions in peering policies.
If regulation could be part of the 'solution' then that would be the 
place to start.


But despite the flaws with the current environment it really isn't that
bad and any regulation would likely be a disaster for the industry.

- Kevin



Re: Catalyst 6500 High Switch Proc

2008-11-15 Thread Kevin Loch

Jon Lewis wrote:

On Sat, 15 Nov 2008, Philip L. wrote:


This is on a Sup720-3BXL by the way:

'sh mls netflow table-con detailed:'
Earl in Module 5
Detailed Netflow CAM (TCAM and ICAM) Utilization

TCAM Utilization : 100%
ICAM Utilization : 6%
Netflow TCAM count : 262024
Netflow ICAM count : 8
Netflow Creation Failures : 2085847
Netflow CAM aliases : 0


This looks like the same issue I ran into not long ago.  Switch your 
netflow over from full to sampled...you lose lots of data, but your 
hardware can't handle full netflow for your traffic level.


AFAIK, your only other options are to mess with the mls aging timers 
(shorten them) or buy cards with DFC and hope that gets you enough 
additional netflow capacity for the interfaces your collecting.


http://www.gossamer-threads.com/lists/cisco/nsp/94953


Hopefully he is not trying to use netflow for accounting/billing.
I use:

mls sampling packet-based 1024 8192

As it is a convenient factor of ~1000 from the real numbers.
1Gbit/s of traffic shows up as 1Mbit/s. This has been accurate enough
for anything I have wanted to look at like per-AS traffic.

- Kevin



Re: IPv6 routing /48s

2008-11-18 Thread Kevin Loch

Christopher Morrow wrote:


GRH is too slow to get me an answer on what it thinks the v6 table
size should be :( Geoff says though:
1627 routes
(http://bgp.potaroo.net/v6/as2.0/index.html)


route-views6 is another good place to look.  1481 is the max
seen there.  Perhaps there are some internal/customer routes
in the feed Geoff is using?

route-views6.routeviews.org> sh bgp sum

(output snipped for brevity)

- Kevin



Re: Level 3 issues

2008-12-28 Thread Kevin Loch

marco wrote:


From what I heard, it was some some malfunction with a router in

Washington D.C. which terminated a 100GB bundle from Paris. It was
carring about 50GB at the time of the failure.

Not sure why routes within the US would be effected.


We connect to level3 in Ashburn/DC and saw traffic drop 50% in both
directions on that port.  Testing showed 100% loss on 50% of the
flows.  We shut that port down and now it won't come back up.  I have
link but no arp for their IP.  This is a new link that was turned
up in the past few weeks.

- Kevin



Re: IPv6 Confusion

2009-02-18 Thread Kevin Loch

David Conrad wrote:


Yeah.  Rants about the IETF should probably be directed elsewhere.


Just how DO we get the message to the IETF that we need all the tools we
have in v4 (DHCP, VRRP, etc) to work with RA turned off?

- Kevin



Re: IPv6 Confusion

2009-02-18 Thread Kevin Loch

Leo Bicknell wrote:



It wouldn't be so bad if we could just turn it off.  Indeed, in
part you can.  On a static LAN there is no need for RA's.  Static
IP the box, static default route, done and done.



VRRPv6 however is relevant to static environments and also needs to
(optionally) work with RA turned off.

- Kevin



Re: options for full routing table in 1 year?

2009-04-08 Thread Kevin Loch

Jo Rhett wrote:


Cisco 6500/7600 with SUP720-3BXL handles 1mil routes


Sounds great on paper but a sup720 can barely handle full tables today.
Depending on how many full tables you take and what else you are doing
with it, cpu resources are unreasonably tight. Having many vlans with
vrrp and snmp polling also adds significant cpu load.

Also, beware the memory consequences of 'maximum-paths' in bgp
context.  8 full tables from a transit provider with maximum-paths=8
will exceed available ram on a sup720. With 6 you will have ~128m free.
Fortunately this is not  a common configuration.

The rsp720 is substantially better at both of these issues.  However the
rsp720 is only supported in 76xx chassis (officially) so chassis
selection is important for future upgrades.

- Kevin



Re: Important New Requirement for IPv4 Requests [re "impacting revenue"]

2009-04-21 Thread Kevin Loch

Shane Ronan wrote:

C) Are ARIN's books open for public inspection? If so, it might be 
interesting for the group to see where all our money is going, since 
it's obviously not going to outreach and solution planning. Perhaps it 
is being spent in a reasonable manner, and the fees are where they need 
to be to sustain the organizations reasonable operations, but perhaps not.


A quick search of the website found this:

https://www.arin.net/about_us/corp_docs/annual_rprt.html

- Kevin



Re: IPv4 Anycast?

2009-04-22 Thread Kevin Loch

Patrick W. Gilmore wrote:

On Apr 22, 2009, at 4:35 PM, Jack Bates wrote:

Zhenkai Zhu wrote:
I just want to make sure if I understand correctly. You mean that the 
anycasted address space can be announced in different places yet with 
the same origin AS?


Yes, and it is commonly done.


I was under the impression anycast services with homogeneous origin AS 
was far more common than the heterogeneous.  Almost all the instances I 
know of use homogeneous origin AS.


I'd be interested in statistics either way.


192.88.99.0/24, 2002::/16, and 2001::/32 are some
notable examples of heterogeneous origin AS.

- Kevin





Re: dotted AS numbers in asn.txt

2007-09-19 Thread Kevin Loch


Andreas Ott wrote:

Hi,

since when does ftp://ftp.arin.net/info/asn.txt contain dotted
AS numbers? Where is the new formatting documented, asn.h ?


http://www.ietf.org/internet-drafts/draft-michaelson-4byte-as-representation-04.txt


 6.0 B6WM110-ARIN (Tech)
 6.1 ASN4-TELUSAAT-ARIN (Abuse), FTS1-ARIN (Tech), 
TBOTP-ARIN (Tech)
 6.3 H6KML9-ARIN (Tech)
 6.5 ISC-32AS  ISCAT-ARIN (Abuse), JDA87-ARIN (Tech)
 6.6 BLUEFIN-TRADING   HOSTM912-ARIN (Abuse)

"Your search -  AS number 6.5 ISC32-AS - did not match any documents. "


Fwiw, the ARIN website search function does understand asdot notation.

-Kevin


Re: Geographic map of IPv6 availability

2007-10-05 Thread Kevin Loch


Nathan Ward wrote:


On 6/10/2007, at 3:18 AM, Stephen Wilcox wrote:


Given the above, I think there is no myth.. !


That's because the 'v6 network' is broken enough that putting  
records on sites that need to be well reachable is a bad idea.


For example, due mainly to Vista's 6to4 tunnelling stuff (based on 
researching a random sample of users), I'd lose about 4% of visitors to 
my web-sites if I were to turn on  records.


Has anyone who was using  records for a site turned them off due to
reachability problems?

- Kevin


Re: Geographic map of IPv6 availability

2007-10-11 Thread Kevin Loch


Tony Hain wrote:

Nathan Ward wrote:

That's because the 'v6 network' is broken enough that putting 
records on sites that need to be well reachable is a bad idea.


So why didn't you put up a 6to4 router and put  records in that pointed
to the 6to4 prefix for those servers? 


That would not help situations where a client has 6to4 enabled (and
a non rfc1918 address) and is behind a firewall that doesn't support or
filters proto 41.  At least Teredo detects whether or not it will work
before enabling the interface.

In a perfect world people would fix the routing or filtering issue. In
reality if it only affects a few sites the typical end user won't think
it's their problem.

- Kevin


Re: Repotting report

2008-02-04 Thread Kevin Loch


Leo Bicknell wrote:

I have been using queries like these to test:

dig any . @f.root-servers.net | egrep "(DiG 9|)"
dig +bufsize=1400 any . @f.root-servers.net | egrep "(DiG 9|)"

The first offers up a standard DNS query, the second an EDNS0 query of
1400 bytes.

In a standard query you're only going to get 3  records, EDNS0
should allow for all of them.  There are currently 6 servers with 
records:

% dig any . @f.root-servers.net | egrep "(DiG 9|)"
; <<>> DiG 9.5.0b2 <<>> any . @f.root-servers.net
A.ROOT-SERVERS.NET. 360 IN  2001:503:ba3e::2:30
F.ROOT-SERVERS.NET. 360 IN  2001:500:2f::f
H.ROOT-SERVERS.NET. 360 IN  2001:500:1::803f:235


There is an interesting variation in what records are returned for a
standard 512 byte request (dig ns . @[x].root-servers.net):

A,C,D,E,F,G,I,J: return the same 10 A records and 4  records in the
same order every time.  They never return A records for K,L,M and never
get  records for K,M.

B: returns all 13 A records in random order and then two  records
in random order.  This allows all records to be returned with equal
weight within each record type.

H,K,L,M: return all 13 A records in static order and then A and F 
records so H,J,K,M  records are never returned.

Tested with dig 9.4.1-p1 on a v6 enabled system.

- Kevin


Re: Is it time to abandon bogon prefix filters?

2008-08-19 Thread Kevin Loch

Jared Mauch wrote:


While you're at it, you also placed the reachable-via rx on
all your customer interfaces.  If you're paranoid, start with the 'any'
rpf and then move to the strict rpf.  The strict rpf also helps with
routing loops.


Be careful not to enable strict rpf on multihomed customers.  This includes
any bgp customer unless you know for sure they are single homed to you and that 
will not
change.

- Kevin



Re: It's Ars Tech's turn to bang the IPv4 exhaustion drum

2008-08-19 Thread Kevin Loch

Randy Bush wrote:

In practice, many routers require the packet to go twice in the hardware if
the prefix length is > 64 bits, so even though it is a total waste of space,
it is not stupid to use /64 for point-to-point links and even for loopbacks!


some of us remember when we thought similarly for /24s for p2p links,
especially when using rip.

and consider matsuzaki-san's dos vulnerability on a /64 p2p link.  the
prudent operational advice today is to use a /127.


I thought there was an issue with duplicate address detection with /127
(RFC3627)?  /126 should work and lots of folks use /112 which is a more
human-friendly bit boundary.  /112 is also good for multiple access
vlans and just about anything that isn't using autoconfig.

- Kevin



Re: Is it time to abandon bogon prefix filters?

2008-08-20 Thread Kevin Loch

Pekka Savola wrote:

On Tue, 19 Aug 2008, Kevin Loch wrote:

 While you're at it, you also placed the reachable-via rx on
 all your customer interfaces.  If you're paranoid, start with the 'any'
 rpf and then move to the strict rpf.  The strict rpf also helps with
 routing loops.


Be careful not to enable strict rpf on multihomed customers.  This 
includes
any bgp customer unless you know for sure they are single homed to you 
and that will not

change.


Strict uRPF (feasible paths variant, RFC3704) works just fine with 
multihomed customers here.


But we don't allow TE more specifics either from the customer or from 
peers, so the longest prefix matching doesn't get messed up.  And with 
certain kind of p2p link numbering, you may need to add a dummy static 
route.  But it works.


It doesn't look like the feasible paths rpf handles the situation where
your bgp customer is not announcing all or any of their prefixes to you.
This can be done for TE or debugging an inbound routing
issue.  Announcing prefixes to me and then blackholing the traffic
is not something I would appreciate as a customer.

If you do this (or strict rpf) on BGP customers at least warn them up front
that if they ever stop announcing prefixes to you then traffic they send
you will get dropped.

- Kevin



Re: Cogent Outage?

2010-01-14 Thread Kevin Loch

Ketan Mangal wrote:
Yes there is a Newyork to Philadelphia fiber cut is there 
It might not be an outage it might be high latency due to multiple

routes going out via there buffalo POP.


That fiber cut was at 9:30EST this morning, the major Cogent internal
routing problems started around 12:10 and lasted about 30 mins.

- Kevin



Re: How polluted is 1/8?

2010-02-04 Thread Kevin Loch

Mirjam Kuehne wrote:

Hello,

After 1/8 was allocated to APNIC last week, the RIPE NCC did some 
measurements to find out how "polluted" this block really is.


See some surprising results on RIPE Labs: 
http://labs.ripe.net/content/pollution-18


Please also note the call for feedback at the bottom of the article.


The most surprising thing in that report was that someone has an AMS-IX
port at just 10 megs.  It would be nice to see an actual measurement of
the traffic and daily/weekly changes. A breakdown of the flow data by
source ASN and source prefix (for the top 50-100 sources) would also be
interesting.

- Kevin



Re: Blocking private AS

2010-02-19 Thread Kevin Loch

Thomas Magill wrote:

I am thinking about implementing a filter to block all traffic with
private AS numbers in the path.  I see quite a few in my table though so
I am concerned I might block some legitimate traffic.  In some cases,
these are just prefixes with the private appended to the end but a few
have the private as a transit.  Is this a good idea or would I likely be
blocking too much legitimate traffic?  The filter I am using currently
shows the following:


I filter private asn's and have not had any reachability problems
related to that.   I suspect most of the routes you see with a private
ASN in the path are covered by a less specific route without any
private ASN in the path.  Someone used a private ASN with their
customer and forgot to filter it to their upstreams/peers.

- Kevin



Re: Competition for Internap's FCP product.

2010-02-25 Thread Kevin Loch

Drew Weaver wrote:

Hi,

As my Avaya CNA/Route Science box begins to seriously age, and without the 
support of Avaya for 'Service Provider' uses of the product, I have been 
looking for alternatives to the product.

The value we get from this product is mainly in the ability to easily manage 
our bandwidth commitments in a hands off way without having to manually 
manipulate anything. I have no real illusions that the 'performance' side of 
things is 'arguable' at best with these sorts of products due to the nature of 
the Internet.

Internap to me stands out as essentially the only alternative to this product, but they have been tremendously difficult to work with, they won't allow us to demo a unit to see if it offers the same functionality as our current solution. The reason they won't allow us to a demo a unit is because they 'don't stock them'. So basically they have 0 units until someone orders one, that is fine if that is their policy but that hasn't really been our experience with other hardware vendors that want close to 100K for a piece of niche equipment. 


My questions are:

-What are other people doing who currently use or used the Avaya/RS product in 
the past?
-Does anyone know of any competition in this space (aside from hiring a guy 
that sits there and does this for us manually)?
-Has Cisco's OER/PFR made any progress in the last few years (is anyone using 
it?)


We use the Avaya CNA in one data center and it does an excellent job at
both commit management and rerouting around problems.  I almost never
see tickets regarding latency/packet loss at that data center except
when it involves inbound issues that the CNA can't fix.  Other data
centers have a more typical occurrence of routing issues that require
manual intervention.

Most of the parts to replace this exist in open source software today:

bird/quagga for bgp to import routes and inject re-routes.
net-snmp-utils for importing interface stats/state and bgp session state
various performance testing tools [tcp]traceroute/mtr etc.
netflow tools (like ehnt) to receive netflow data

The parts that are missing:

api for bird/quagga to import and assert routes
code to use netflow to generate list of targets for performance testing
  and to determine bandwidth/route for commit management
code to decide which routes to assert to which next-hop based on 
configured performance and commit levels.

reporting

None of that seems very tricky, especially the commit management which
does not need a sophisticated performance evaluation, just "does it
work at all via that link."

- Kevin





Re: YouTube AS36561 began announcing 1.0.0.0/8

2010-03-12 Thread Kevin Loch

Axel Morawietz wrote:

Am 12.03.2010 17:03, schrieb Nathan:

[...] Its
amazing how prolific 1.x traffic is.


one reason might also be, that at least T-Mobile Germany uses 1.2.3.*
for their proxies that deliver the content to mobile phones.
And I'm not sure what they are doing when they are going to receive this
route from external. ;)


If 1.0.0.0/8 has been widely used as de-facto rfc1918 for many years, 
perhaps it is time to update rfc1918 to reflect this?


- Kevin




Re: .io registrar

2011-05-11 Thread Kevin Loch

Jeremy Kister wrote:
Does anyone know of a competent .io registrar who charges in the <= 
$75/yr area ?


I've been using tierra.net (domaindiscover.com) but they continually 
break my domains.


this year, although their website says my domain expires 4/2012, my 
domain stopped working today.  the .io servers aren't serving records, 
and nic.io says the domain expired 4/8/2011.


i got a hold of them this morning got a ticket -- but after 4 hours 
still no response.



also, although nic.io lists a bunch of .io registrars, when I called 
them they almost all say "we don't register .io" :D


I have a .io domain with Moniker and have not had any problems.

- Kevin



Broken Teredo relay AS1101?

2011-06-07 Thread Kevin Loch

This path for 2001::/32 leads to a broken teredo relay:

  3257 1103 1101

http://ip6.me was using this path and not working from my client. When I
routing to prefer 6939's relays it started working.

- Kevin



Re: Cogent & HE

2011-06-08 Thread Kevin Loch

Richard A Steenbergen wrote:

On Wed, Jun 08, 2011 at 06:39:02PM -0400, Patrick W. Gilmore wrote:
Yes, both refuse to buy transit, yes.  But HE is able, willing, and 
even begging to peer; Cogent is not.  These are not "the same thing".


I'm ready, willing, and lets say for the purposes of this discussion 
begging to peer with every Tier 1, but some of them aren't willing to 
peer with me. Does that mean I should stop buying transit and blame them 
for my resulting lack of global reachability? 


Do you have half the routing table as your customer base?

- Kevin



Re: The stupidity of trying to "fix" DHCPv6

2011-06-11 Thread Kevin Loch

Leo Bicknell wrote:

In a message written on Fri, Jun 10, 2011 at 05:13:09PM +0200, Iljitsch van 
Beijnum wrote:

Now you could argue that the DHCPv6-supplied gateway addresses should have 
higher priority than the ones learned from RAs. At least that solves the 
problem. However, that solution still has two issues:

1. No longer the fait sharing that comes from RA-learned gateway addresses


I proport that VRRPv6 is a superior solution to have redundant
gateways than using RA's to broadcast both and let the host choose.


VRRP is definitely superior to RA's in that you can have many different
redundant gateway groups for different purposes.  Things like alternate
default gateways, gateways to other back-end networks and VPN routers.

In all but the most trivial hosting environments RA's will have to be
disabled, filtered, and protected against at all cost.

VRRPv3 (http://tools.ietf.org/html/rfc5798) is still a bit broken
in that it makes mention of "MUST advertise RA's" and inexplicably 
limits VRRP addresses to link local only (?!)*.  But at least we have

something, it took years for the RA police at the IETF to allow even
this limited solution.

* In many cases it may be desirable to have VRRP addresses routed via
IGP, especially static routes to VRRP next-hops.

- Kevin