Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Tore Anderson
* Jean-Daniel Pauget

> I confess using IPv6 behind a 6in4 tunnel because the "Business-Class" 
> service
> of the concerned operator doesn't handle IPv6 yet.
> 
> as such, I realised that, as far as I can figure, ICMPv6 packet "too-big" 
> (rfc 4443)
> seem to be ignored or filtered at ~60% of ClouFlare's http farms
> 
> as a result, random sites such as http://nanog.org/ or 
> https://www.ansible.com/
> are badly reachable whenever small mtu are involved ...

Hi Jean-Daniel.

If you're using using tunnels you'll want to have your tunnel endpoint
adjust down the TCP MSS value to match the MTU of the tunnel interface.
That way, you'll avoid problems with Path MTU Discovery. Even in those
situations where PMTUD does work fine, doing TCP MSS adjustment will
improve performance as the server does not need to spend an RTT to
discover your reduced MTU.

(This isn't really an IPv6 issue, by the way - ISPs using PPPoE will
typically perform MSS adjustment for IPv4 packets too.)

If you're using Linux as your tunnel endpoint, try:

ip6tables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS  
--clamp-mss-to-pmtu

Tore


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 6/3/19 03:29, Mark Andrews wrote:
> 
> 
>> On 6 Mar 2019, at 3:37 pm, Fernando Gont  wrote:
>>
>> On 6/3/19 01:09, Mark Andrews wrote:
>>>
>>>
 On 6 Mar 2019, at 1:30 pm, Fernando Gont  wrote:

 On 3/3/19 18:04, Mark Andrews wrote:
> There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
> getting
> back to the TCP servers.  There are also IDIOTS that deploy load 
> balancers that
> DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the 
> correct
> back end.  There are also IDOITS that rate limit PTB generation to 
> ridiculously
> low rates.  One should be able to generate PTB at line rate.
>
> Everyone that has configured mss-fix-up has contributed to 
> misunderstanding that
> you can block ICMP.  It is time we had a flag day to REMOVE mss-fix-up 
> from all
> the boxes you control.  We need to get PTB working and unfortunately that 
> means
> that we need to stop pandering to admins who don’t know how IP is 
> supposed to
> work.  ICMP is NOT optional.

 It would seem IETF's intention is to actually move away from
 ICMPv6-based PMTUD, to the extent that is possible. (RFC4821).
>>>
>>> Which is not a reason to not fix broken equipment and misconfigured 
>>> firewalls.
>>> The workarounds are basically there because people deploy broken equipment.
>>
>> Agreed. That said, it wasn't solved in 30+ years of IPv4. Do you have
>> hopes it will be different with IPv6?
> 
> Make a big enough stink and it will get fixed.  People just don’t make enough 
> of
> a stink.  Use social media.  None of the companies with broken firewalls 
> really
> want their idiotic practices pointed out in public.  Start doing so every time
> you see it #STUPIDFIREWALL.

At times, it's fw defaults. Other times, it is admin policies.

RFC4821 seems to signal that the IETF has given up in making ICMP-based
PMTUD work, and aims at a (mostly) ICMP-free PMTUD.

Essentially, when brokenness is widespread, you have to come-up with
workarounds. And when workarounds are sufficiently widespread, there's
less of an incentive to fix the original issue.

Other times, there's a disconnect between with protocol standards,
products, and operational requirements. That's the case of IPv6 EHs.
This is their usability on the public Internet: RFC 7872.  And these are
some of the reasons why you get the numbers in RFC 7872:
https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Mark Andrews



> On 6 Mar 2019, at 3:37 pm, Fernando Gont  wrote:
> 
> On 6/3/19 01:09, Mark Andrews wrote:
>> 
>> 
>>> On 6 Mar 2019, at 1:30 pm, Fernando Gont  wrote:
>>> 
>>> On 3/3/19 18:04, Mark Andrews wrote:
 There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
 getting
 back to the TCP servers.  There are also IDIOTS that deploy load balancers 
 that
 DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the 
 correct
 back end.  There are also IDOITS that rate limit PTB generation to 
 ridiculously
 low rates.  One should be able to generate PTB at line rate.
 
 Everyone that has configured mss-fix-up has contributed to 
 misunderstanding that
 you can block ICMP.  It is time we had a flag day to REMOVE mss-fix-up 
 from all
 the boxes you control.  We need to get PTB working and unfortunately that 
 means
 that we need to stop pandering to admins who don’t know how IP is supposed 
 to
 work.  ICMP is NOT optional.
>>> 
>>> It would seem IETF's intention is to actually move away from
>>> ICMPv6-based PMTUD, to the extent that is possible. (RFC4821).
>> 
>> Which is not a reason to not fix broken equipment and misconfigured 
>> firewalls.
>> The workarounds are basically there because people deploy broken equipment.
> 
> Agreed. That said, it wasn't solved in 30+ years of IPv4. Do you have
> hopes it will be different with IPv6?

Make a big enough stink and it will get fixed.  People just don’t make enough of
a stink.  Use social media.  None of the companies with broken firewalls really
want their idiotic practices pointed out in public.  Start doing so every time
you see it #STUPIDFIREWALL.

> Thanks,
> -- 
> Fernando Gont
> SI6 Networks
> e-mail: fg...@si6networks.com
> PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> 
> 
> 
> 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org



Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 6/3/19 01:09, Mark Andrews wrote:
> 
> 
>> On 6 Mar 2019, at 1:30 pm, Fernando Gont  wrote:
>>
>> On 3/3/19 18:04, Mark Andrews wrote:
>>> There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
>>> getting
>>> back to the TCP servers.  There are also IDIOTS that deploy load balancers 
>>> that
>>> DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the 
>>> correct
>>> back end.  There are also IDOITS that rate limit PTB generation to 
>>> ridiculously
>>> low rates.  One should be able to generate PTB at line rate.
>>>
>>> Everyone that has configured mss-fix-up has contributed to misunderstanding 
>>> that
>>> you can block ICMP.  It is time we had a flag day to REMOVE mss-fix-up from 
>>> all
>>> the boxes you control.  We need to get PTB working and unfortunately that 
>>> means
>>> that we need to stop pandering to admins who don’t know how IP is supposed 
>>> to
>>> work.  ICMP is NOT optional.
>>
>> It would seem IETF's intention is to actually move away from
>> ICMPv6-based PMTUD, to the extent that is possible. (RFC4821).
> 
> Which is not a reason to not fix broken equipment and misconfigured firewalls.
> The workarounds are basically there because people deploy broken equipment.

Agreed. That said, it wasn't solved in 30+ years of IPv4. Do you have
hopes it will be different with IPv6?

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: Arista Layer3

2019-03-05 Thread Colton Conor
How much do these boxes cost?

On Tue, Mar 5, 2019 at 5:24 PM Kaiser, Erich  wrote:

> It would be worth your time to look at Extreme SLX9640 with advanced
> routing license.
>
>
>
> On Tue, Mar 5, 2019 at 4:47 PM Roel Parijs  wrote:
>
>> We have been using the 7280SR-48C6 for 2.5 years now. Just after Arista
>> announced the full table BGP routing.
>> Looking at the price / port there is nothing near Arista. We also use
>> Cisco ASR1K and Juniper MX204 but these have far less capacity.
>>
>> When we first started, there were quite a few features missing but over
>> the past 2 year they have really been catching up. I was very happy when
>> they added MSS clamping at the end of last year.
>>
>> The new version 7280R2K should be able to handle 2M routes.
>>
>> On Tue, Mar 5, 2019 at 9:31 PM  wrote:
>>
>>> Check out the 7280sr2k, which is actually 24*10G, 24*25G, 6*100G
>>>
>>> On 03/05/2019 08:55 PM, David Hubbard wrote:
>>> > I love the NCS5501, but once Arista gets the 2M-route capacity down
>>> into the 48x10g format, I'd jump ship in a heartbeat; currently you have to
>>> do a much larger chassis-based device or their 100gig 7280 to have that
>>> route scale.  My big gripes with the 5501 are that, due to its
>>> architecture, if you want to do uRPF, you chop your route scale in half,
>>> even on the 5501-SE.  5501 also has no supported configuration where you
>>> have both first hop redundancy and physical path redundancy, because you
>>> can't do both VRRP (its only redundant first hop option) and BVI's, can't
>>> do MC-LAG, can't do vPC, so you need switches in addition to the 5501's if
>>> that's the goal..
>>> >
>>> > David
>>> >
>>>
>>>


Re: Comcast contact for wholesale ethernet/local loop

2019-03-05 Thread TJ Trout
Access to Comcast ethernet services on a wholesale level, interconnection
for NNI to use comcast as local access, etc

On Tue, Mar 5, 2019 at 9:01 PM Keith Christian 
wrote:

> TJ,
>
> What are you seeking, exactly?
>
> Keith
>
> On Tue, Mar 5, 2019 at 7:46 PM TJ Trout  wrote:
>
>> Does anyone know the name, or have contact information for the department
>> within Comcast that handles carriers looking to purchase local access, etc?
>>
>> Normally this would be the carrier or wholesale group, but either of
>> their websites seem to be aligned to the services we are looking for?
>>
>> Thank you,
>>
>> TJ Trout
>> EXPOHL LLC
>> AS62809
>>
>


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Mark Andrews



> On 6 Mar 2019, at 1:36 pm, Fernando Gont  wrote:
> 
> On 5/3/19 03:26, Mark Andrews wrote:
>> 
>> 
>>> On 5 Mar 2019, at 5:18 pm, Mark Tinka  wrote:
>>> 
>>> 
>>> 
>>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>> 
 
 Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
 they have installed broken ECMP devices.  The simplest way to do that
 is to set the interface MTUs to 1280 on all the servers.  Why should
 the rest of the world have to put up with their inability to purchase
 devices that work with RFC compliant data streams.
>>> 
>>> I've had this issue with cdnjs.cloudflare.com for the longest time at my
>>> house. But as some of you may recall, my little unwanted TCP MSS hack
>>> for IPv6 last weekend fixed that issue for me.
>>> 
>>> Not ideal, and I so wish IPv6 would work as designed, but…
>> 
>> It does work as designed except when crap middleware is added.  ECMP
>> should be using the flow label with IPv6.  It has the advantage that
>> it works for non-0-offset fragments as well as 0-offset fragments and
>> also works for transports other than TCP and UDP.  This isn’t a protocol
>> failure.  It is shitty implementations.
> 
> Not to play devil's advocate but the IETF fot to publish a spec for ECMP
> use of Flow Labels only a few years ago.
> 
> For quite a while, they were unasable... and might still be, for some
> implementations.

And if it is still using the quintuple the PTB has all the necessary information
for unfragmented and 0 offset fragment packets (which there shouldn’t be with a
working TCP stack) to be passed through.

> -- 
> Fernando Gont
> SI6 Networks
> e-mail: fg...@si6networks.com
> PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org



Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Mark Andrews



> On 6 Mar 2019, at 1:30 pm, Fernando Gont  wrote:
> 
> On 3/3/19 18:04, Mark Andrews wrote:
>> There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
>> getting
>> back to the TCP servers.  There are also IDIOTS that deploy load balancers 
>> that
>> DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the correct
>> back end.  There are also IDOITS that rate limit PTB generation to 
>> ridiculously
>> low rates.  One should be able to generate PTB at line rate.
>> 
>> Everyone that has configured mss-fix-up has contributed to misunderstanding 
>> that
>> you can block ICMP.  It is time we had a flag day to REMOVE mss-fix-up from 
>> all
>> the boxes you control.  We need to get PTB working and unfortunately that 
>> means
>> that we need to stop pandering to admins who don’t know how IP is supposed to
>> work.  ICMP is NOT optional.
> 
> It would seem IETF's intention is to actually move away from
> ICMPv6-based PMTUD, to the extent that is possible. (RFC4821).

Which is not a reason to not fix broken equipment and misconfigured firewalls.
The workarounds are basically there because people deploy broken equipment.
Additionally everything isn’t TCP.

> Thanks,
> -- 
> Fernando Gont
> SI6 Networks
> e-mail: fg...@si6networks.com
> PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> 
> 
> 
> 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org



Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Fernando Gont
On 5/3/19 03:26, Mark Andrews wrote:
> 
> 
>> On 5 Mar 2019, at 5:18 pm, Mark Tinka  wrote:
>>
>>
>>
>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>
>>>
>>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>>> they have installed broken ECMP devices.  The simplest way to do that
>>> is to set the interface MTUs to 1280 on all the servers.  Why should
>>> the rest of the world have to put up with their inability to purchase
>>> devices that work with RFC compliant data streams.
>>
>> I've had this issue with cdnjs.cloudflare.com for the longest time at my
>> house. But as some of you may recall, my little unwanted TCP MSS hack
>> for IPv6 last weekend fixed that issue for me.
>>
>> Not ideal, and I so wish IPv6 would work as designed, but…
> 
> It does work as designed except when crap middleware is added.  ECMP
> should be using the flow label with IPv6.  It has the advantage that
> it works for non-0-offset fragments as well as 0-offset fragments and
> also works for transports other than TCP and UDP.  This isn’t a protocol
> failure.  It is shitty implementations.

Not to play devil's advocate but the IETF fot to publish a spec for ECMP
use of Flow Labels only a few years ago.

For quite a while, they were unasable... and might still be, for some
implementations.


-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Comcast contact for wholesale ethernet/local loop

2019-03-05 Thread TJ Trout
Does anyone know the name, or have contact information for the department
within Comcast that handles carriers looking to purchase local access, etc?

Normally this would be the carrier or wholesale group, but either of their
websites seem to be aligned to the services we are looking for?

Thank you,

TJ Trout
EXPOHL LLC
AS62809


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Martin Hannigan
On Tue, Mar 5, 2019 at 07:15 Rich Kulawiec  wrote:

> On Mon, Mar 04, 2019 at 08:04:12AM +1100, Mark Andrews wrote:
> > ICMP is NOT optional.
>
> I've pointed folks at this for years:
>
> ICMP Packet Filtering v1.2
> http://www.cymru.com/Documents/icmp-messages.html
>
> ---rsk
>


Some of the networks that completely block ICMP are shocking.

Best,

-M<


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 3/3/19 20:16, Mark Andrews wrote:
> 
> 
>> On 4 Mar 2019, at 9:33 am, Stephen Satchell  wrote:
>>
>> On 3/3/19 1:04 PM, Mark Andrews wrote:
>>> There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
>>> getting
>>> back to the TCP servers.
>>
>> For those of us who are in the dark, "PTB" appears to refer to "Packet
>> Too Big" responses in ICMPv6.
>>
>> Yes, some admins don't have fine-enough grain tools to block or throttle
>> specific types of ICMP, but that's the fault of the vendors, not the admins.
> 
> No, it is the fault of the admins.  They should be making it part of the 
> purchasing
> decision if they want to filter ICMP.  It’s not like selective filtering is a 
> new idea.
> It is well over 20 years old at this stage.  The amount of +20 year old 
> equipment on the
> net is minimal.  
> 
> That said modern OS’s don’t need other equipment to “protect" them from ICMP 
> of any form.
> 

These news don't help in that direction:
https://www.theregister.co.uk/2016/06/02/cisco_warns_of_ipv6_dos_vulnerability/

(I'm not complaining about the news, but about the bugs, if you wish)

-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 3/3/19 18:04, Mark Andrews wrote:
> There are lots of IDIOTS out there that BLOCK ALL ICMP.  That blocks PTB 
> getting
> back to the TCP servers.  There are also IDIOTS that deploy load balancers 
> that
> DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the correct
> back end.  There are also IDOITS that rate limit PTB generation to 
> ridiculously
> low rates.  One should be able to generate PTB at line rate.
> 
> Everyone that has configured mss-fix-up has contributed to misunderstanding 
> that
> you can block ICMP.  It is time we had a flag day to REMOVE mss-fix-up from 
> all
> the boxes you control.  We need to get PTB working and unfortunately that 
> means
> that we need to stop pandering to admins who don’t know how IP is supposed to
> work.  ICMP is NOT optional.

It would seem IETF's intention is to actually move away from
ICMPv6-based PMTUD, to the extent that is possible. (RFC4821).

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 3/3/19 16:57, Jeroen Massar wrote:
> On 2019-03-03 20:13, Mark Tinka wrote:
>>
>>
>> On 3/Mar/19 18:05, Jeroen Massar wrote:
>>
>>> IPv6 requires a minimum MTU of 1280.
>>>
>>> If you cannot transport it, then the transport (the tunnel in this case) 
>>> needs to handle the fragmentation of packets of 1280 down to whatever does 
>>> fit in the tunnel.
>>
>> As you know, IPv6 does not support fragmentation in transit. So that's
>> not an option.
> 
> The transport (tunnel) CAN support that kind of fragmentation.

Still, that's certainly not panacea. See:
https://tools.ietf.org/html/rfc7872

-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Fernando Gont
On 27/2/19 07:01, Jean-Daniel Pauget wrote:
> hello,
> 
> I confess using IPv6 behind a 6in4 tunnel because the "Business-Class" 
> service
> of the concerned operator doesn't handle IPv6 yet.
> 
> as such, I realised that, as far as I can figure, ICMPv6 packet "too-big" 
> (rfc 4443)
> seem to be ignored or filtered at ~60% of ClouFlare's http farms
> 
> as a result, random sites such as http://nanog.org/ or 
> https://www.ansible.com/
> are badly reachable whenever small mtu are involved ...
> 
> support@cloudflare answered me that because I'm not the owner of 
> concerned site,
> and because of security reasons, they wouldn't investigate further.
> 
> are there security concerns with ICMP-too-big ?

Please see: https://tools.ietf.org/html/rfc5927

and also: https://tools.ietf.org/html/rfc8021

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492






Re: Best practices for BGP Communities

2019-03-05 Thread Job Snijders
On Wed, Mar 6, 2019 at 8:32 Smith, Courtney 
wrote:

> On 3/5/19, 6:04 PM, "NANOG on behalf of Job Snijders"
>  j...@instituut.net> wrote:
>
> On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> > A while back I read somewhere that transit providers shouldn't delete
> > communities unless the communities have a specific impact to their
> > network, but my google-fu is failing me and I can't find any sources.
> >
> > Is this still the case? Does anyone have a source for the practice of
> > leaving unknown communities alone or deleting them?
>
> https://tools.ietf.org/html/rfc7454#section-11
>
>
> Remember policies between two peers may not be same as customer policies.
>
> Example:  Customers_of_transit_X >>> Transit X >>> Peer_A >>
> Customers_of_Peer_A
>
> Customers_of_Peer_A may use community A:50 to set local pref to 50 in
> Peer_A network.  But that doesn’t not mean Customers_of_transit_X can send
> A:50 to set lpref on their routes in Peer_A's network.  Peer_A's policy
> with Transit X likely does not take action on customer communities since
> they are 'peers' not customers.  Transit X can send A:50 to Peer_A but
> nothing would happen.  What's the benefit of Transit X preserving A:50 from
> its customers if it means nothing in Transit X?



OP didn’t specify what kind of BGP communities they were referring to. In
general we can separate communities into two categories: “Informational”
and “Action”. You are right that preserving/propagating “action”
communities (such as in your example) probably isn’t that interesting.
“informational” communities on the other hand can be very valuable.

See https://tools.ietf.org/html/rfc8195 for more information on how the two
types differ.

Kind regards,

Job


Re: Best practices for BGP Communities

2019-03-05 Thread Smith, Courtney
On 3/5/19, 6:04 PM, "NANOG on behalf of Job Snijders" 
 wrote:

On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> A while back I read somewhere that transit providers shouldn't delete
> communities unless the communities have a specific impact to their
> network, but my google-fu is failing me and I can't find any sources.
> 
> Is this still the case? Does anyone have a source for the practice of
> leaving unknown communities alone or deleting them?

https://tools.ietf.org/html/rfc7454#section-11

Kind regards,

Job

Remember policies between two peers may not be same as customer policies.

Example:  Customers_of_transit_X >>> Transit X >>> Peer_A >> Customers_of_Peer_A

Customers_of_Peer_A may use community A:50 to set local pref to 50 in Peer_A 
network.  But that doesn’t not mean Customers_of_transit_X can send A:50 to set 
lpref on their routes in Peer_A's network.  Peer_A's policy with Transit X 
likely does not take action on customer communities since they are 'peers' not 
customers.  Transit X can send A:50 to Peer_A but nothing would happen.  What's 
the benefit of Transit X preserving A:50 from its customers if it means nothing 
in Transit X?







Re: Arista Layer3

2019-03-05 Thread Kaiser, Erich
It would be worth your time to look at Extreme SLX9640 with advanced
routing license.



On Tue, Mar 5, 2019 at 4:47 PM Roel Parijs  wrote:

> We have been using the 7280SR-48C6 for 2.5 years now. Just after Arista
> announced the full table BGP routing.
> Looking at the price / port there is nothing near Arista. We also use
> Cisco ASR1K and Juniper MX204 but these have far less capacity.
>
> When we first started, there were quite a few features missing but over
> the past 2 year they have really been catching up. I was very happy when
> they added MSS clamping at the end of last year.
>
> The new version 7280R2K should be able to handle 2M routes.
>
> On Tue, Mar 5, 2019 at 9:31 PM  wrote:
>
>> Check out the 7280sr2k, which is actually 24*10G, 24*25G, 6*100G
>>
>> On 03/05/2019 08:55 PM, David Hubbard wrote:
>> > I love the NCS5501, but once Arista gets the 2M-route capacity down
>> into the 48x10g format, I'd jump ship in a heartbeat; currently you have to
>> do a much larger chassis-based device or their 100gig 7280 to have that
>> route scale.  My big gripes with the 5501 are that, due to its
>> architecture, if you want to do uRPF, you chop your route scale in half,
>> even on the 5501-SE.  5501 also has no supported configuration where you
>> have both first hop redundancy and physical path redundancy, because you
>> can't do both VRRP (its only redundant first hop option) and BVI's, can't
>> do MC-LAG, can't do vPC, so you need switches in addition to the 5501's if
>> that's the goal..
>> >
>> > David
>> >
>>
>>


Re: Best practices for BGP Communities

2019-03-05 Thread Job Snijders
On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> A while back I read somewhere that transit providers shouldn't delete
> communities unless the communities have a specific impact to their
> network, but my google-fu is failing me and I can't find any sources.
> 
> Is this still the case? Does anyone have a source for the practice of
> leaving unknown communities alone or deleting them?

https://tools.ietf.org/html/rfc7454#section-11

Kind regards,

Job


RE: Internap Corporation - DDOS

2019-03-05 Thread Jerry Cloe
Don't forget, just because its the source IP in the packet doesn't mean thats 
where it originated from (its probably not). But, since it contains a 
consistent source IP, it should be fairly simple to filter it upstream.
 
-Original message-
From:Tyler Harden 
Sent:Tue 03-05-2019 02:44 pm
Subject:Internap Corporation - DDOS
To:nanog@nanog.org; 
 
Is anyone else being DDOS’d or flooded with traffic from Internap Corporation 
registered IP space?

 

 
 

We’re on day 2 of consistent outages and the traffic I’m receiving is entirely 
from IPs in the /15 range 64.94.0.0-64.95.255.255

 

 
 

Cheers,

 

Tyler Harden

 

President

 

exospec

 

Re: Arista Layer3

2019-03-05 Thread Roel Parijs
We have been using the 7280SR-48C6 for 2.5 years now. Just after Arista
announced the full table BGP routing.
Looking at the price / port there is nothing near Arista. We also use Cisco
ASR1K and Juniper MX204 but these have far less capacity.

When we first started, there were quite a few features missing but over the
past 2 year they have really been catching up. I was very happy when they
added MSS clamping at the end of last year.

The new version 7280R2K should be able to handle 2M routes.

On Tue, Mar 5, 2019 at 9:31 PM  wrote:

> Check out the 7280sr2k, which is actually 24*10G, 24*25G, 6*100G
>
> On 03/05/2019 08:55 PM, David Hubbard wrote:
> > I love the NCS5501, but once Arista gets the 2M-route capacity down into
> the 48x10g format, I'd jump ship in a heartbeat; currently you have to do a
> much larger chassis-based device or their 100gig 7280 to have that route
> scale.  My big gripes with the 5501 are that, due to its architecture, if
> you want to do uRPF, you chop your route scale in half, even on the
> 5501-SE.  5501 also has no supported configuration where you have both
> first hop redundancy and physical path redundancy, because you can't do
> both VRRP (its only redundant first hop option) and BVI's, can't do MC-LAG,
> can't do vPC, so you need switches in addition to the 5501's if that's the
> goal..
> >
> > David
> >
>
>


Re: a quick survey about LLDP and similar

2019-03-05 Thread Hunter Fuller
On Fri, Mar 1, 2019 at 8:26 AM Anderson, Charles R  wrote:
>
> We require LLDP/LLDP-MED to configure our VOIP phones.
>
> For trunk links, it is extremely helpful to verify correct topology.
>
> For datacenters, it is EXTREMELY helpful to verify hypervisor connectivity.

I'd say it's extremely helpful anywhere. We enable it on every single
port unless there is a specific reason to disable it.

Our particularly clueful customers can now submit requests like: "For
the system attached to port 1/2/3, please switch to VLAN 456." This
ticket gets closed in about 10 seconds.

We also run LLDP speakers on our University-controlled workstations so
we can see details about the system in "slow lldp neighbor" on the
switch.

The more LLDP the better, from my perspective.


Re: How to choose a transit provider?

2019-03-05 Thread Mehmet Akcin
thanks everyone watching the video, working on some more new ones. I am
also working on a ranking system for transit providers. The way ranking
will work is going to be limited to a Metro

Do you guys have any recommendations what technical aspects to look for
when ranking ISPs? it's quiet hard to rank them fairly without having their
routing table views, i think, please let me know your thoughts on this and
any recommendation is welcome.

On Thu, Feb 14, 2019 at 3:05 PM Mehmet Akcin  wrote:

> thanks for all feedback, I have tried to summarize my thoughts in a video,
> hoping this is useful set of notes https://youtu.be/4gihKxb6uys
>
> On Sat, Dec 15, 2018 at 9:46 AM Mark Tinka  wrote:
>
>>
>>
>> On 15/Dec/18 19:37, nanog-...@mail.com wrote:
>>
>> >
>> >   I certainly subscribe to the notion that transport + transit is
>> usually less expensive than DIA, but this does depend on the market and
>> location.
>>
>> ... and the type of customer.
>>
>> DIA for a high-value "Enterprise" customer (think of a large
>> conglomerate) is typically more costly than DIA for a low-value
>> "Enterprise" customer (think of a family-owned travel & tour company).
>> The large global ISP's are making more money from "enterprise" business
>> than typical wholesale/transit services. This can support the idea that
>> DIA can be pricier than transit.
>>
>> Mark.
>>
>


Internap Corporation - DDOS

2019-03-05 Thread Tyler Harden
Is anyone else being DDOS’d or flooded with traffic from Internap Corporation 
registered IP space?

We’re on day 2 of consistent outages and the traffic I’m receiving is entirely 
from IPs in the /15 range 64.94.0.0-64.95.255.255

Cheers,
Tyler Harden
President
exospec


Re: Arista Layer3

2019-03-05 Thread Dmitry Sherman
Thanks for info!

-- 
Dmitry Sherman
Interhost Networks Ltd
dmi...@interhost.net
Mobile: +972-54-3181182
Office: +972-74-7029881
Web: www.interhost.co.il

On 05/03/2019, 21:26, "Saku Ytti"  wrote:

Hey Dmitry,

> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP 
peering router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and 
another IXP feed?
> Considering switching from ASR9001 which is doing perfect work but has no 
more ports left.
> The price is very competitive comparing to MX or ASR and this 
router-switch have 48x10Gig + 6x100GigE ports.

You should compare 7280SR against NCS5500 and PTX1k, not ASR and MX.
ANET is great company, with great people, but they are like 2 years
old in SP market and this is quite visible. It is impressive though
what they've done in so little time.

-- 
  ++ytti




Re: Arista Layer3

2019-03-05 Thread nanog
Check out the 7280sr2k, which is actually 24*10G, 24*25G, 6*100G

On 03/05/2019 08:55 PM, David Hubbard wrote:
> I love the NCS5501, but once Arista gets the 2M-route capacity down into the 
> 48x10g format, I'd jump ship in a heartbeat; currently you have to do a much 
> larger chassis-based device or their 100gig 7280 to have that route scale.  
> My big gripes with the 5501 are that, due to its architecture, if you want to 
> do uRPF, you chop your route scale in half, even on the 5501-SE.  5501 also 
> has no supported configuration where you have both first hop redundancy and 
> physical path redundancy, because you can't do both VRRP (its only redundant 
> first hop option) and BVI's, can't do MC-LAG, can't do vPC, so you need 
> switches in addition to the 5501's if that's the goal..
> 
> David
> 



Re: Arista Layer3

2019-03-05 Thread David Hubbard
On 3/5/19, 2:28 PM, "NANOG on behalf of Saku Ytti"  wrote:

Hey Dmitry,

> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP 
peering router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and 
another IXP feed?
> Considering switching from ASR9001 which is doing perfect work but has no 
more ports left.
> The price is very competitive comparing to MX or ASR and this 
router-switch have 48x10Gig + 6x100GigE ports.

You should compare 7280SR against NCS5500 and PTX1k, not ASR and MX.
ANET is great company, with great people, but they are like 2 years
old in SP market and this is quite visible. It is impressive though
what they've done in so little time.

-- 
  ++ytti

I love the NCS5501, but once Arista gets the 2M-route capacity down into the 
48x10g format, I'd jump ship in a heartbeat; currently you have to do a much 
larger chassis-based device or their 100gig 7280 to have that route scale.  My 
big gripes with the 5501 are that, due to its architecture, if you want to do 
uRPF, you chop your route scale in half, even on the 5501-SE.  5501 also has no 
supported configuration where you have both first hop redundancy and physical 
path redundancy, because you can't do both VRRP (its only redundant first hop 
option) and BVI's, can't do MC-LAG, can't do vPC, so you need switches in 
addition to the 5501's if that's the goal..

David



Re: Arista Layer3

2019-03-05 Thread Saku Ytti
Hey Dmitry,

> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering 
> router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and 
> another IXP feed?
> Considering switching from ASR9001 which is doing perfect work but has no 
> more ports left.
> The price is very competitive comparing to MX or ASR and this router-switch 
> have 48x10Gig + 6x100GigE ports.

You should compare 7280SR against NCS5500 and PTX1k, not ASR and MX.
ANET is great company, with great people, but they are like 2 years
old in SP market and this is quite visible. It is impressive though
what they've done in so little time.

-- 
  ++ytti


Re: Arista Layer3

2019-03-05 Thread nanog
Those devices are awesome, I use those on the same usecase, and
recommend them

(I do not run pim, tho)

On 03/05/2019 07:17 PM, Dmitry Sherman wrote:
> Hello,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering 
> router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and 
> another IXP feed?
> Considering switching from ASR9001 which is doing perfect work but has no 
> more ports left.
> The price is very competitive comparing to MX or ASR and this router-switch 
> have 48x10Gig + 6x100GigE ports.
> Will it run smoothly with BGP, PIM, IPV6?
> Thanks.
> 



Re: Arista Layer3

2019-03-05 Thread Dmitry Sherman
Hello,
What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering 
router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and another 
IXP feed?
Considering switching from ASR9001 which is doing perfect work but has no more 
ports left.
The price is very competitive comparing to MX or ASR and this router-switch 
have 48x10Gig + 6x100GigE ports.
Will it run smoothly with BGP, PIM, IPV6?
Thanks.

-- 
Dmitry Sherman
Interhost Networks Ltd
dmi...@interhost.net
Mobile: +972-54-3181182
Office: +972-74-7029881
Web: www.interhost.co.il

On 01/12/2017, 1:17, "NANOG on behalf of joel jaeggli" 
 wrote:

On 11/30/17 13:00, Ken Chase wrote:
>   >Arista DCS-7280SRA-48C6 is a 1ru box.??
>   >
>   >Has a nominally million route fib, Jericho+ 8GB of packet buffer.
>   >control-plane is 8GB of ram andAMD GX-424CC SOC which is 4 core 2.4ghz.
>   >We do direct fib injection with bird rather than the arista bgpd but 
the
>   >control-plane is capable of managing quite a few bgp sessions.
>   >
>   >the 1/2ru 7280CR2K-30 and 60 are 2m route fib boxes with still heftier
>   >control planes but they're a different class of box being all 100G and
>   >requiring multi-chip/internal fabrics.
>
> Sounds pretty good - hows your power draw on that thing? Why'd you pick 
Bird
> in this case?
this a standard sr that's moderately busy but not exactly slammed, I'm
be impressed if you could triple that at full tilt.

#show environment power
Power  InputOutput   Output
Supply  ModelCapacity  Current  Current  PowerStatus
---  -   
-
1   PWR-500AC-R   500W0.35A5.27A62.8W Ok
2   PWR-500AC-R   500W0.32A4.81A56.4W Ok
Total   --   1000W   --   --   119.1W --

bird had memory footprint going with it as well as some local
modification and we hacked addpath into it a few years ago. filtering
poilcy is something we programmatically generate and interact with via
agents so a traditional style monolithic config isn't that useful.


> /kc
>
>
>   >> /kc
>   >>
>   >> On Thu, Nov 30, 2017 at 10:45:09AM -0800, Tyler Conrad said:
>   >>   >For Enterprise/DC, it works great. For service provider, they're 
not 100%
>   >>   >yet. The main issue is going to be around VRFs, as there's no 
interaction
>   >>   >between them (at least in the code version I'm on, that may have 
changed
>   >>   >recently or be changing soon). They'll work great as a P-Router, 
but if you
>   >>   >need a PE with route leaking I'd look at another vendor.
>   >>   >
>   >>   >I use a couple pairs of 7280SRs as edge routers/border leaves. 
Multiple
>   >>   >full table feeds without any issue.
>   >>   >
>   >>   >On Thu, Nov 30, 2017 at 10:36 AM, Romeo Czumbil 
   >>   >> wrote:
>   >>   >
>   >>   >> So I've been using Arista as layer2 for quite some time, and 
I'm pretty
>   >>   >> happy with them.
>   >>   >> Kicking the idea around to turn on some Layer3 features but 
I've been
>   >>   >> hearing some negative feedback.
>   >>   >> The people that I did hear negative feedback don't use Arista 
themselves.
>   >>   >> (they just heard)
>   >>   >>
>   >>   >> So do we have any Arista L3 people out here that can share some 
negatives
>   >>   >> or positives?
>   >>   >>
>   >>   >> Use case: Just some MPLS IPv4/IPv6 routing, l2vpn OSPF/BGP
>   >>   >> Maybe 20k routes (no full internet routes)
>   >>   >> 7050 Series
>   >>   >> 7280 Series
>   >>   >>
>   >>   >> -Romeo
>   >>   >>
>   >>
>   >
>   >
>
>
>
>



This mail was received via Interhost Mail-SeCure System.






Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Hunter Fuller
On Tue, Mar 5, 2019 at 10:09 AM Bjørn Mork  wrote:
> Stephen Satchell  writes:
> > Did you submit a bug report?
>
> I believe this was fixed 5 years ago (in Linux v3.17):
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb1ce2ef387b01686469487edd45994872d52d73
>
> But RHEL and CentOS are using kernels from the stone age, so they
> haven't noticed yet.

For those who might need this feature, and have a Red Hat contract, a
suggestion:

If you submit a ticket, someone at Red Hat might backport the patch for you.


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Bjørn Mork
Stephen Satchell  writes:

> On 3/5/19 2:54 AM, Thomas Bellman wrote:
>> Out of curiosity, which operating systems put anything useful (for use
>> in ECMP) into the flow label of IPv6 packets?  At the moment, I only
>> have access to CentOS 6 and CentOS 7 machines, and both of them set the
>> flow label to zero for all traffic.
>
> Did you submit a bug report?

I believe this was fixed 5 years ago (in Linux v3.17):
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb1ce2ef387b01686469487edd45994872d52d73

But RHEL and CentOS are using kernels from the stone age, so they
haven't noticed yet.


Bjørn


Looking for a Google contact

2019-03-05 Thread Jon Barnes
Can someone contact me off list about an issue.


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Saku Ytti
On Tue, Mar 5, 2019 at 4:54 PM  wrote:

> Let me play a devil's advocate here, the above statement begs a question 
> then, how do you know all that is harmful would you test for every possible 
> extension and hw/sw permutation?
> So there would be 3 sets (though lines might be blurred) known safe, known 
> harmful and the biggest of them unknown unknowns.
> Now as an operator of a commercial network (i.e. your customers like it 
> mostly up) wouldn't you do a calculated risk evaluation and opt for the known 
> safe -which you know 99% of your customers use and block the rest while 
> pissing off the remaining 1%?
> I know it sounds awful (like a calculations for vehicle safety recalls), but 
> ...

You don't know. Everything is horribly broken anyhow and if you are
not pwned, the main reason is that you're not attractive target. If
you are being targeted, you will be pwned by zero to modest budget.
Attacker budget leverage to defender is ridiculous. And ICMP won't be
the vector.

Fear is excellent marketing tool, as we can see in politics, works
every time. But I rather fix realised problems, rather than make
unprovable assumptions of actions yielding to net benefit. The
assumption here is, if we just allow ICMP types A, B and C we are
gaining in security, can we substantiate that claim at all? We can
substantiate easily that the proposed ICMP filter breaks real useful
ICMP tooling.



-- 
  ++ytti


RE: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread adamv0025
> From: NANOG  On Behalf Of Saku Ytti
> 
> Hey Rich,
> 
> > I've pointed folks at this for years:
> > ICMP Packet Filtering v1.2
> > http://www.cymru.com/Documents/icmp-messages.html
> 
> 
> To me, the correct pattern is here is to deny things you know to be harmful
> and can justify it reasonably and test that justification over time for its
> validity.
> 
Let me play a devil's advocate here, the above statement begs a question then, 
how do you know all that is harmful would you test for every possible extension 
and hw/sw permutation?
So there would be 3 sets (though lines might be blurred) known safe, known 
harmful and the biggest of them unknown unknowns. 
Now as an operator of a commercial network (i.e. your customers like it mostly 
up) wouldn't you do a calculated risk evaluation and opt for the known safe 
-which you know 99% of your customers use and block the rest while pissing off 
the remaining 1%? 
I know it sounds awful (like a calculations for vehicle safety recalls), but ...
 

adam 



Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Stephen Satchell
On 3/5/19 2:54 AM, Thomas Bellman wrote:
> Out of curiosity, which operating systems put anything useful (for use
> in ECMP) into the flow label of IPv6 packets?  At the moment, I only
> have access to CentOS 6 and CentOS 7 machines, and both of them set the
> flow label to zero for all traffic.

Did you submit a bug report?


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Saku Ytti
Hey Rich,

> I've pointed folks at this for years:
> ICMP Packet Filtering v1.2
> http://www.cymru.com/Documents/icmp-messages.html

To me this seems anti-pattern. It seems it was written on basis of
'what we know we allow, what we don't know we deny'. With assumption
that ICMP dangerous. Similarly we break IP extensibility by not
allowing IP protocols we don't know about.
There are many, hopefully obvious reasons that just because we don't
know about it, doesn't mean it's dangerous. One more obvious is, that
it may not exist yet.

To me, the correct pattern is here is to deny things you know to be
harmful and can justify it reasonably and test that justification over
time for its validity.

One particular example springs to mind, ICMP Timestamp, this allows
you to measure unidirectional latency to millisecond precision, unless
we specifically break it. It's been useful troubleshooting tool to me
in the past, saving time and money.


-- 
  ++ytti


Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Rich Kulawiec
On Mon, Mar 04, 2019 at 08:04:12AM +1100, Mark Andrews wrote:
> ICMP is NOT optional.

I've pointed folks at this for years:

ICMP Packet Filtering v1.2
http://www.cymru.com/Documents/icmp-messages.html

---rsk


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms,Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread sthaug
> Out of curiosity, which operating systems put anything useful (for use
> in ECMP) into the flow label of IPv6 packets?  At the moment, I only
> have access to CentOS 6 and CentOS 7 machines, and both of them set the
> flow label to zero for all traffic.

FreeBSD 11.2-STABLE.

Steinar Haug, Nethelp consulting, sth...@nethelp.no


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Saku Ytti
On Tue, Mar 5, 2019 at 12:09 PM Joel Jaeggli  wrote:

> Parsing the icmp payload was something we considered in  rfc7690 but wasn’t 
> one the approaches we pursued (we broadcasted the ptb to all hosts on the 
> segment(s) behind the load balancers in our original implementation).
>
> It actually seems like it is becoming feasible to do in an Ethernet switch 
> ASIC like tofino if that is what you want to burn real estate on. Being 
> worthwhile is another matter.

It is definitely possible in all relevant existing NPUs like Trio,
Solar, FP, EZChip, Lightspeed et.al. As it is within visibility of
lookup engine and it is at fixed offset. So not only possible but also
cheap.

-- 
  ++ytti


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Thomas Bellman
On 2019-03-05 07:26 CET, Mark Andrews wrote:

> It does work as designed except when crap middleware is added.  ECMP
> should be using the flow label with IPv6.  It has the advantage that
> it works for non-0-offset fragments as well as 0-offset fragments and
> also works for transports other than TCP and UDP.  This isn’t a protocol
> failure.  It is shitty implementations.

Out of curiosity, which operating systems put anything useful (for use
in ECMP) into the flow label of IPv6 packets?  At the moment, I only
have access to CentOS 6 and CentOS 7 machines, and both of them set the
flow label to zero for all traffic.

There is also the problem that the device generating the Packet Too
Big ICMP, is not the same as the end host that the big packet was
destined for, and does not know what flow label the end host would
have set in its TCP responses.  RFC 6437 is also explicit that:

   o  Forwarding nodes such as routers and load distributors MUST NOT
  depend only on Flow Label values being uniformly distributed.  In
  any usage such as a hash key for load distribution, the Flow Label
  bits MUST be combined at least with bits from other sources within
  the packet, so as to produce a constant hash value for each flow

In practice, using at least the source and destination IP(v6) addresses
in addition to the flow label.  But the ICMP packet has a different
source address than TCP responses from the end host.

Further problem is that the TCP responses from the destination end host
might not even be *passing* the router that generates a Packet Too Big
ICMP error.  In an anycast scenario, that router might have a route to
the sending IPv6 address that goes to a different datacenter than the
host that sent the large packet.  E.g, consider the following network:

 A1  A2
 |   |
DC1 DC2
/ \ /
   /   \   /
  / \ /
 R1  R2
  \ /
   \   /
\ /
 R3
 |
 B

A1 and A2 are hosts in different datacenters, using the same anycast
address A.  Host B initiates a TCP session with address A, R3 selects
the route via R1, and thus reaches A1 in datacenter DC1.  A1 sends a
large packet towards B, but the router in DC1 elects to send that via
R2.  R2 generates a PTB ICMP, but has its best route to address A
towards DC2...


/Bellman



signature.asc
Description: OpenPGP digital signature


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Joel Jaeggli



Sent from my iPhone

> On Mar 5, 2019, at 01:31, Saku Ytti  wrote:
> 
>> On Tue, Mar 5, 2019 at 12:26 AM Mark Andrews  wrote:
>> 
>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>> they have installed broken ECMP devices.  The simplest way to do that
> 
> Out of curiosity does that imply you are aware of non-broken ECMP
> devices, which are able to hash on the embedded original packet?

Parsing the icmp payload was something we considered in  rfc7690 but wasn’t one 
the approaches we pursued (we broadcasted the ptb to all hosts on the 
segment(s) behind the load balancers in our original implementation).

It actually seems like it is becoming feasible to do in an Ethernet switch ASIC 
like tofino if that is what you want to burn real estate on. Being worthwhile 
is another matter.


> 
> -- 
>  ++ytti
> 



Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Saku Ytti
On Tue, Mar 5, 2019 at 12:26 AM Mark Andrews  wrote:

> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
> they have installed broken ECMP devices.  The simplest way to do that

Out of curiosity does that imply you are aware of non-broken ECMP
devices, which are able to hash on the embedded original packet?

-- 
  ++ytti


Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Joel Jaeggli



Sent from my iPhone

> On Mar 4, 2019, at 22:26, Mark Andrews  wrote:
> 
> 
> 
>> On 5 Mar 2019, at 5:18 pm, Mark Tinka  wrote:
>> 
>> 
>> 
>>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>> 
>>> 
>>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>>> they have installed broken ECMP devices.  The simplest way to do that
>>> is to set the interface MTUs to 1280 on all the servers.  Why should
>>> the rest of the world have to put up with their inability to purchase
>>> devices that work with RFC compliant data streams.
>> 
>> I've had this issue with cdnjs.cloudflare.com for the longest time at my
>> house. But as some of you may recall, my little unwanted TCP MSS hack
>> for IPv6 last weekend fixed that issue for me.
>> 
>> Not ideal, and I so wish IPv6 would work as designed, but…
> 
> It does work as designed except when crap middleware is added.  ECMP
> should be using the flow label with IPv6.  It has the advantage that
> it works for non-0-offset fragments as well as 0-offset fragments and
> also works for transports other than TCP and UDP.  This isn’t a protocol
> failure.  It is shitty implementations.

Your mobile carrier’s stateless  tcp accelerator should stop sending  acks with 
a zero flow label so we can actually identify them as part of the same flow...

There a lot of headwind in the real world for using the flow label as a hash 
component.

> 
>> Mark.
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org
> 
>