Re: Touble ospf md5 authentication

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 05:52:04PM +0159, Vitaliy Kolodinsky wrote:
> In area 0.0.0.2 works some Cisco routers, Quagga and experimental
> BIRD. Cisco and Quagga work perfectly together.
> Cisco at the end of OSPF Hello packet sent LLS Data Block.
> Quagga this unit is not sending.
> LLS Data Block is mentioned in the IETF RFC 4813
> May participate in the testing.

Hello

Could you try attached patch to BIRD 1.2.1? That should fix this issue.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."
diff -uprN bird-1.2.1/proto/ospf/packet.c bird-1.2.1-/proto/ospf/packet.c
--- bird-1.2.1/proto/ospf/packet.c	2010-01-14 11:06:27.0 +0100
+++ bird-1.2.1-/proto/ospf/packet.c	2010-03-19 19:24:47.0 +0100
@@ -179,7 +179,7 @@ ospf_pkt_checkauth(struct ospf_neighbor 
 return 0;
   }
 
-  if (ntohs(pkt->length) + OSPF_AUTH_CRYPT_SIZE != size)
+  if (ntohs(pkt->length) + OSPF_AUTH_CRYPT_SIZE < size)
   {
 OSPF_TRACE(D_PACKETS, "OSPF_auth: size mismatch (%d vs %d)",
 	  ntohs(pkt->length) + OSPF_AUTH_CRYPT_SIZE, size);


signature.asc
Description: Digital signature


Re: Touble ospf md5 authentication

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 06:11:51PM +0100, Csaba Szép wrote:
> Hello!
> 
> In my opinion, this is the same issue that i reported at 2009.10.05 in
> this list.

Hello

It is similar (also related to LLS) but not the same issue. The problem
you reported (with error message 'received: options mismatch') was fixed
in version 1.2.0 (i hope). This one is specific to usage of MD5 auth
together with LLS.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."


signature.asc
Description: Digital signature


Re: Touble ospf md5 authentication

2010-03-19 Thread Csaba Szép
Hello!

Of course this is only a workaround

But. I use this command with Cisco 7200 12.2(28)SB5 software,
which is older than 12.3(21)

Another temporaly solution is to disable lls globally .


router ospf 1
router-id 10.0.0.2
no capability lls


2010/3/19 Vitaliy Kolodinsky :
> Dear, Csaba Szép.
>
> Вы писали 19 марта 2010 г., 19:11:51:
>
>> In my opinion, this is the same issue that i reported at 2009.10.05 in
>> this list.
>
>> Then i disabled LLS in the cisco side, and after everything works well.
>
>
>> ip ospf lls disable
>
> Using the ip ospf lls disable probably quite a good temporary solution, but 
> the old IOS, this command is not
>
> bras7 (config-subif) # ip ospf lls disa
>                               ^
> % Invalid input detected at '^' marker.
>
> bras7 (config-subif) # do sh ver
> Cisco Internetwork Operating System Software
> IOS (tm) 7200 Software (C7200-JS-M), Version 12.3 (21), RELEASE SOFTWARE (fc2)
> Technical Support: http://www.cisco.com/techsupport
>
>
> With pleasure I will see a patch from the author
> and with no less pleasure test the patch work.
>
> --
>
> Best regards,
> Vitaliy
> Kolodinsky
> BYVK-RIPE
> ISP Atlant Telecom
> kolodin...@telecom.by
>
>


Re: Touble ospf md5 authentication

2010-03-19 Thread Vitaliy Kolodinsky
Dear, Csaba Szép.

Вы писали 19 марта 2010 г., 19:11:51:

> In my opinion, this is the same issue that i reported at 2009.10.05 in
> this list.

> Then i disabled LLS in the cisco side, and after everything works well.


> ip ospf lls disable

Using the ip ospf lls disable probably quite a good temporary solution, but the 
old IOS, this command is not

bras7 (config-subif) # ip ospf lls disa
   ^
% Invalid input detected at '^' marker.

bras7 (config-subif) # do sh ver
Cisco Internetwork Operating System Software
IOS (tm) 7200 Software (C7200-JS-M), Version 12.3 (21), RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport


With pleasure I will see a patch from the author
and with no less pleasure test the patch work.

--

Best regards,
Vitaliy
Kolodinsky
BYVK-RIPE
ISP Atlant Telecom
kolodin...@telecom.by



Re: minor bird crash

2010-03-19 Thread Arnold Nipper
On 19.03.2010 15:02 Ondrej Zajicek wrote

> On Fri, Mar 19, 2010 at 01:57:25PM +0100, Arnold Nipper wrote:
>> > and if you do are you clearing the bgp sessions (in bird-speak
>> > reloading the protocols)?
>> > 
>> 
>> good question :-) My impression was that "configure soft" should do the
>> trick, but I'm not sure whether this really is true. Reloading the pipes
>> for instance generates a mssive route update afais. That's definitely
>> not what we want. I have even added "prefer older on;" to the bgp
>> protocol section to make prefixes more stable across the IXP.
> 
> Essentially, you have three options what to do after a change in filters:
> 

thank you for the detailled explanation. One final question:

what does the timestamp attached to routes mean? Like

 show route
194.0.194.0/24 via 80.81.192.35 on eth0 [R192_35 2010-03-14
16:22:10] * (100) [AS42315?]


TIA, Arnold
-- 
Arnold Nipper / nIPper consulting, Sandhausen, Germany
email: arn...@nipper.de   phone: +49 6224 9259 299
mobile: +49 172 2650958 fax: +49 6224 9259 333



signature.asc
Description: OpenPGP digital signature


Re: Touble ospf md5 authentication

2010-03-19 Thread Csaba Szép
Hello!

In my opinion, this is the same issue that i reported at 2009.10.05 in
this list.

Then i disabled LLS in the cisco side, and after everything works well.


ip ospf lls disable




2010/3/19 Ondrej Zajicek :
> On Fri, Mar 19, 2010 at 05:52:04PM +0159, Vitaliy Kolodinsky wrote:
>> > Hmm, it seems that Cisco just sends some trash after the end of OSPF 
>> > packet.
>> > Perhaps it would suffice to remove the check in BIRD, but i personally
>> > don't test this compatibility.
>>
>> In area 0.0.0.2 works some Cisco routers, Quagga and experimental
>> BIRD. Cisco and Quagga work perfectly together.
>> Cisco at the end of OSPF Hello packet sent LLS Data Block.
>> Quagga this unit is not sending.
>> LLS Data Block is mentioned in the IETF RFC 4813
>> May participate in the testing.
>
> Yes, LLS data blocks in OSPF packets is the cause of the problem. Thank
> you for a note, i didn't know about RFC 4813. I will look at this
> issue and send you the patch for BIRD to be able to handle LLS data
> blocks.
>
> --
> Elen sila lumenn' omentielvo
>
> Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
> OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
> "To err is human -- to blame it on a computer is even more so."
>
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iEYEARECAAYFAkujrW8ACgkQw1GB2RHercNN4gCeJttuETRAYSEE7Qczl6pYNCMh
> YysAn0YWM1ENwQbzx2KJ4lG1hRqUjsUn
> =f0t3
> -END PGP SIGNATURE-
>
>


Re: Touble ospf md5 authentication

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 05:52:04PM +0159, Vitaliy Kolodinsky wrote:
> > Hmm, it seems that Cisco just sends some trash after the end of OSPF packet.
> > Perhaps it would suffice to remove the check in BIRD, but i personally
> > don't test this compatibility.
> 
> In area 0.0.0.2 works some Cisco routers, Quagga and experimental
> BIRD. Cisco and Quagga work perfectly together.
> Cisco at the end of OSPF Hello packet sent LLS Data Block.
> Quagga this unit is not sending.
> LLS Data Block is mentioned in the IETF RFC 4813
> May participate in the testing.

Yes, LLS data blocks in OSPF packets is the cause of the problem. Thank
you for a note, i didn't know about RFC 4813. I will look at this
issue and send you the patch for BIRD to be able to handle LLS data
blocks.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."


signature.asc
Description: Digital signature


Re: Touble ospf md5 authentication

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 04:15:27PM +0159, Vitaliy Kolodinsky wrote:
> Dear, Ondrej Zajicek.
> 
> ?? ?? 19 ? 2010 ?., 16:05:04:
> 
> > On Fri, Mar 19, 2010 at 01:57:36PM +0200, Vitaliy Kolodinsky wrote:
> >> Dear, bird-us...@atrey.karlin.mff.cuni.cz.
> >> 
> >> Who has a working BIRD 1.2.1 ospf md5 authentication and Cisco?
> >> 
> >> 
> >> ---Log File--
> >> Mar 16 17:34:52 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
> >> Mar 16 17:34:52 vulture2 bird: Bad OSPF packet from 93.125.5.141 - 
> >> authentification failed
> 
> > That is strange, could you send me an output of tcpdump on that packets? 
> > (tcpdump -s 0 -x)

Hmm, it seems that Cisco just sends some trash after the end of OSPF packet.
Perhaps it would suffice to remove the check in BIRD, but i personally
don't test this compatibility.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."


signature.asc
Description: Digital signature


Re: Touble ospf md5 authentication

2010-03-19 Thread Vitaliy Kolodinsky
Dear, Ondrej Zajicek.

Вы писали 19 марта 2010 г., 16:05:04:

> On Fri, Mar 19, 2010 at 01:57:36PM +0200, Vitaliy Kolodinsky wrote:
>> Dear, bird-us...@atrey.karlin.mff.cuni.cz.
>> 
>> Who has a working BIRD 1.2.1 ospf md5 authentication and Cisco?
>> 
>> 
>> ---Log File--
>> Mar 16 17:34:52 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
>> Mar 16 17:34:52 vulture2 bird: Bad OSPF packet from 93.125.5.141 - 
>> authentification failed

> That is strange, could you send me an output of tcpdump on that packets? 
> (tcpdump -s 0 -x)


16:06:51.521476 IP 93.125.5.138 > 224.0.0.5: OSPFv2, Hello, length: 108
0x:  45c0 0090 af0c  0159 c63c 5d7d 058a
0x0010:  e000 0005 0201 0048 5d7d 058a  0002
0x0020:   0002  0510 4ba1 5a10  ffe0
0x0030:  000a 1200  0028 5d7d 0587  
0x0040:  5d7d 0506 5d7d 0507 5d7d 0586 5d7d 0588
0x0050:  5d7d 058b 5d7d 058c d5b8 e114 6236 9632
0x0060:  077c dcfa 7ea2 cac8 d7c3 af5c  0009
0x0070:  0001 0004  0001 0002 0014 4ba1 5a10
0x0080:  6726 c4b0 26dc 0582 874c 7296 98eb ce77
16:06:53.525031 IP 93.125.5.133 > 224.0.0.5: OSPFv2, Hello, length: 108
0x:  45c0 0090 495f  0159 2bef 5d7d 0585
0x0010:  e000 0005 0201 0048 5d7d 0506  0002
0x0020:   0002  0510 4ba2 cd13  ffe0
0x0030:  000a 1200  0028 5d7d 0587  
0x0040:  5d7d 0507 5d7d 0586 5d7d 0588 5d7d 058a
0x0050:  5d7d 058b 5d7d 058c d5b8 e114 c33e e87d
0x0060:  19f8 6dd2 3892 e4b8 bf9b 70d7  0009
0x0070:  0001 0004  0001 0002 0014 4ba2 cd13
0x0080:  0f41 ed82 0ae3 c693 6428 af08 8a47 3648
16:06:53.896032 IP 93.125.5.139 > 224.0.0.5: OSPFv2, Hello, length: 108
0x:  45c0 0090 3e6e  0159 36da 5d7d 058b
0x0010:  e000 0005 0201 0048 5d7d 058b  0002
0x0020:   0002  0510 4ba2 61c8  ffe0
0x0030:  000a 1200  0028 5d7d 0587  
0x0040:  5d7d 0506 5d7d 0507 5d7d 0586 5d7d 0588
0x0050:  5d7d 058a 5d7d 058c d5b8 e114 0c7d 0dac
0x0060:  b3fd fd3d 9916 d949 8efd a327  0009
0x0070:  0001 0004  0001 0002 0014 4ba2 61c8
0x0080:  b599 46e0 d304 2213 c442 5821 8e1b c562
16:06:54.470461 IP 93.125.5.135 > 224.0.0.5: OSPFv2, LS-Update, length: 64
0x:  45c0 0064 f0b1  0159 84c6 5d7d 0587
0x0010:  e000 0005 0204 0040 d5b8 e114  0002
0x0020:   0002  0510 4bac fa49  0001
0x0030:  0e10 2005 0a80 0284 5d7d 0588 8000 0002
0x0040:  4377 0024   00ff   
0x0050:    27a9 7d32 4b03 1f70 625c b1ab
0x0060:  1311 6dc0
16:06:54.471771 IP 93.125.5.134 > 224.0.0.6: OSPFv2, LS-Ack, length: 44
0x:  45c0 0050 ba4c  0159 bb3f 5d7d 0586
0x0010:  e000 0006 0205 002c 5d7d 0586  0002
0x0020:   0002  0510 0005 5084 0e10 2005
0x0030:  0a80 0284 5d7d 0588 8000 0002 4377 0024
0x0040:  fe2a f44a a621 7612 cb02 dfb0 764c 7c4b
16:06:54.543948 IP 93.125.5.135 > 224.0.0.5: OSPFv2, LS-Update, length: 64
0x:  45c0 0064 f0b2  0159 84c5 5d7d 0587
0x0010:  e000 0005 0204 0040 d5b8 e114  0002
0x0020:   0002  0510 4bac fa4a  0001
0x0030:  0e10 2005 0a80 013b 5d7d 0588 8000 0002
0x0040:  2bd9 0024   00ff   
0x0050:    bfcf ad0e ec4a 8105 a36a c4b4
0x0060:  8e0d 1c1c
16:06:54.712154 IP 93.125.5.141 > 224.0.0.5: OSPFv2, Hello, length: 108
0x:  45c0 0090 9e27  0159 d71e 5d7d 058d
0x0010:  e000 0005 0201 0048 5d7d 0507  0002
0x0020:   0002  0510 4ba3 661a  ffe0
0x0030:  000a 1200  0028 5d7d 0587  
0x0040:  5d7d 0506 5d7d 0586 5d7d 0588 5d7d 058a
0x0050:  5d7d 058b 5d7d 058c d5b8 e114 df1f 8fc6
0x0060:  07e8 35a1 7edb 9ec7 6346 7041  0009
0x0070:  0001 0004  0001 0002 0014 4ba3 661a
0x0080:  2514 486c c8c7 7831 b6db bfa6 5196 833a

Mar 19 16:06:51 vulture2 bird: MyOSPF: Running ospf_age cleanup
Mar 19 16:06:51 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
Mar 19 16:06:51 vulture2 bird: Bad OSPF packet from 93.125.5.138 - 
authentification failed
Mar 19 16:06:53 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
Mar 19 16:06:53 vulture2 bird: Bad OSPF packet from 93.125.5.133 - 
authentification failed
Mar 19 16:06:53 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
Mar 19 16:06:53 vulture2 bird: Bad OSPF packet from 93.125.5.139 - 
authentification failed
Mar 19 16:06:54 vulture2 bird: MyOSPF: LSUPD packet received from 93.125.5.135 
via vlan200
Mar 19 16:06:54 vulture2 bird: MyOSPF: length   64
Mar 19 16:06:54 vulture2 bird: MyOSPF: router   213.184.225.20
Mar 19 16:06:54 vulture2 bird: MyOSPF: LSA  Type: 0005, Id: 
10.128.2

Re: Touble ospf md5 authentication

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 01:57:36PM +0200, Vitaliy Kolodinsky wrote:
> Dear, bird-us...@atrey.karlin.mff.cuni.cz.
> 
> Who has a working BIRD 1.2.1 ospf md5 authentication and Cisco?
> 
> 
> ---Log File--
> Mar 16 17:34:52 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
> Mar 16 17:34:52 vulture2 bird: Bad OSPF packet from 93.125.5.141 - 
> authentification failed

That is strange, could you send me an output of tcpdump on that packets? 
(tcpdump -s 0 -x)

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."


signature.asc
Description: Digital signature


Re: minor bird crash

2010-03-19 Thread Ondrej Zajicek
On Fri, Mar 19, 2010 at 01:57:25PM +0100, Arnold Nipper wrote:
> > and if you do are you clearing the bgp sessions (in bird-speak
> > reloading the protocols)?
> > 
> 
> good question :-) My impression was that "configure soft" should do the
> trick, but I'm not sure whether this really is true. Reloading the pipes
> for instance generates a mssive route update afais. That's definitely
> not what we want. I have even added "prefer older on;" to the bgp
> protocol section to make prefixes more stable across the IXP.

Essentially, you have three options what to do after a change in filters:

1) restart a protocol 
All routes from the protocol are withdrawn from the connected
table and will appear later (after restart) If these routes are
primary routes in that table, other protocols connected to that
table receive two notifications (first about route disappear and
later about route appear).

2) reload a protocol
All routes are repropagated through the protocol
If these repropagations does not change primary route
in the connected tables, the event wouldn't be propagated
tho other connected protocols. I will write more about
it later.

3) do nothing (and have an inconsistent state of propagated routes)

If you use 'configure soft' command, BIRD ignore changes in filters and
in that case it does nothing. But it is expected that operator restarts
or reloads affected protocols. The main reason for 'configure soft' is
that BIRD can't decide whether the change in filters is important enough.

For example if you found that you have a bug in common 'martians'
filter function and you found that one BGP neighour sent you a martian route,
then you update the common filter function but you know that you have
to restart/reload just that one BGP neighbour. But if you use
'configure', BIRD decides to restart/reload all protocols that
use the common filter function.

For older (before 1.2.1) versions, 'configure' does not use protocol
reload (just a restart [*]), so there was another reason for
'configure soft' (to choose reload instead of restart).

[*] or reconfigure, which is used for OSPF and RIP and is unrelated
to BGP or pipe.

> Documentation says: Changes in filters usually lead to restart of
> affected protocols. If soft option is used, changes in filters does not
> cause BIRD to restart affected protocols, therefore already accepted
> routes (according to old filters) would be still propagated, but new
> routes would be processed according to the new filters.
> 
> However with _our_ current model, we only filter between customer table
> and master table, accepting everything from customer side. From what
> I've seen (more precise: meant to have seen) applying new filters does
> not trigger importing routes to the master table.
> 
> Another question: what exactly is reloading a table doing.

There is no such thing like reloading a table - we speak about
reloading a protocol. As i wrote eariler, it is essencially
repropagating routes through a protocol. There are two
subcases - reload-in (used when import filter changes) and
reload-out (used when export filter changes):

reload-in for BGP protocol - BGP protocol sends route-refresh request
and then the other side sends updates for all prefixes.

reload-out for BGP protocol - BGP protocol sends updates for all
prefixes in connected table (and accepted by export filter).

reload-in/out for pipe protocol - all routes from one table are
repropagated to the other table. This should not have direct
impact on external behavior of route server (just causes some
CPU load).

In all cases that change a state of some routing table (reload-in for BGP
and reload-in/out for a pipe), the repropagation of route might change
primary route in that routing table and in that case the change is
propagated to other protocols (and might cause sending updates for
BGP protocols).

> Reloading the pipes
> for instance generates a mssive route update afais. 

That is strange, just reloading a pipe (if there is no real
change in export/import) may cause some CPU load, but the primary
routes should not change and therefore connected BGP protocols
should not send any updates.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santi...@crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."


signature.asc
Description: Digital signature


Re: minor bird crash

2010-03-19 Thread Arnold Nipper
On 19.03.2010 09:03 Wolfgang Hennerbichler wrote

> On Mar 19, 2010, at 08:47 , Arnold Nipper wrote:
> 
> what I meant by checking the as-path was if the peer-as was in the 
> as-path:
> 
> if ! (bgp_path ~ [= 1120 * =]) then reject;
> 

ic ...

>> where pref_AS() simply matches against all prefixes found in 
>> RADB for AS y.
> 
> our members decided to not filter on RADB but RIPE and rather use the
>  solution above instead of dropping prefixes.
> 

afaik RIPE is a subset of what you get from RADB. I like RADB because of
its features like being able to do

 whois -h whois.radb.net \!ias-telia,1
or
 whois -h whois.radb.net \!gas1299

for example. Piping to some sed and tr and you are done ;-)

> Out of curiosity: How often do you rebuild your filters,

We did it only once the day, but current plans are to do it more often.
Perhaps every 2h or so. Sebastian did not only work on Hoofprints but
also spent some time on re-writing the filter generation software (incl.
an aggregate6). Rebuilding the filters for ~370 AS-SETs now takes a
little more than five minutes.

> and if you do are you clearing the bgp sessions (in bird-speak
> reloading the protocols)?
> 

good question :-) My impression was that "configure soft" should do the
trick, but I'm not sure whether this really is true. Reloading the pipes
for instance generates a mssive route update afais. That's definitely
not what we want. I have even added "prefer older on;" to the bgp
protocol section to make prefixes more stable across the IXP.

Documentation says: Changes in filters usually lead to restart of
affected protocols. If soft option is used, changes in filters does not
cause BIRD to restart affected protocols, therefore already accepted
routes (according to old filters) would be still propagated, but new
routes would be processed according to the new filters.

However with _our_ current model, we only filter between customer table
and master table, accepting everything from customer side. From what
I've seen (more precise: meant to have seen) applying new filters does
not trigger importing routes to the master table.

Another question: what exactly is reloading a table doing.


Best regards,
Arnold
-- 
Arnold Nipper / nIPper consulting, Sandhausen, Germany
email: arn...@nipper.de   phone: +49 6224 9259 299
mobile: +49 172 2650958 fax: +49 6224 9259 333



signature.asc
Description: OpenPGP digital signature


Touble ospf md5 authentication

2010-03-19 Thread Vitaliy Kolodinsky
Dear, bird-us...@atrey.karlin.mff.cuni.cz.

Who has a working BIRD 1.2.1 ospf md5 authentication and Cisco?


---Log File--
Mar 16 17:34:52 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
Mar 16 17:34:52 vulture2 bird: Bad OSPF packet from 93.125.5.141 - 
authentification failed

-

--Configuration---
protocol ospf MyOSPF {
import all;
#   export all;
area 2 {
stub no;
networks {
93.125.5.128/27;
};
interface "vlan200" {
priority 0;
password "xx" {
id 5;
};
authentication cryptographic;
};
};
}

-

--

Best regards,
Vitaliy
Kolodinsky



ospf md5 authentication

2010-03-19 Thread Vitaliy Kolodinsky
Spam detection software, running on the system "trubka.network.cz", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.

Content preview:  Dear, bird-users. Who has a working BIRD 1.2.1 ospf md5 
authentication
   and Cisco? ---Log File-- Mar 16 17:34:52 vulture2 bird: MyOSPF: 
OSPF_auth:
   size mismatch (88 vs 124) Mar 16 17:34:52 vulture2 bird: Bad OSPF packet
  from 93.125.5.141 - authentification failed [...] 

Content analysis details:   (5.7 points, 5.0 required)

 pts rule name  description
 -- --
 3.2 FH_DATE_PAST_20XX  The date is grossly in the future.
 1.1 DNS_FROM_OPENWHOIS RBL: Envelope sender listed in bl.open-whois.org.
 1.4 AWLAWL: From: address is in the auto white-list


--- Begin Message ---
Dear, bird-users.

Who has a working BIRD 1.2.1 ospf md5 authentication and Cisco?


---Log File--
Mar 16 17:34:52 vulture2 bird: MyOSPF: OSPF_auth: size mismatch (88 vs 124)
Mar 16 17:34:52 vulture2 bird: Bad OSPF packet from 93.125.5.141 - 
authentification failed

-

--Configuration---
protocol ospf MyOSPF {
import all;
#   export all;
area 2 {
stub no;
networks {
93.125.5.128/27;
};
interface "vlan200" {
priority 0;
password "xx" {
id 5;
};
authentication cryptographic;
};
};
}

-


--

Best regards,
Vitaliy
Kolodinsky

--- End Message ---


Re: minor bird crash

2010-03-19 Thread Wolfgang Hennerbichler

On Mar 19, 2010, at 08:47 , Arnold Nipper wrote:

> On 19.03.2010 08:10 Wolfgang Hennerbichler wrote
> 
>> ... checks if the as-path is valid ...
> 
> you really do that? We only do something like
> 
> case bgp_path.last {
> 13238: if pref_AS13238() then accept;
> 43247: if pref_AS43247() then accept;
> }


we filter on prefixes, but we only mark them good or "not in RIPE". A customer 
can select in the webinterface if he would like to receive only good routes, 
all routes or he can do a per-peer selection. 

what I meant by checking the as-path was if the peer-as was in the as-path: 

  if ! (bgp_path ~ [= 1120 * =]) then reject;

> where pref_AS() simply matches against all prefixes found in RADB
> for AS y.

our members decided to not filter on RADB but RIPE and rather use the solution 
above instead of dropping prefixes. 

Out of curiosity: How often do you rebuild your filters, and if you do are you 
clearing the bgp sessions (in bird-speak reloading the protocols)? 

> Best regards,
> Arnold

cu soon, 
Wolfgang

> -- 
> Arnold Nipper / nIPper consulting, Sandhausen, Germany
> email: arn...@nipper.de   phone: +49 6224 9259 299
> mobile: +49 172 2650958 fax: +49 6224 9259 333
> 

-- 
www.vix.at | www.aco.net
w...@univie.ac.at | WH844-RIPE
Vienna University Computer Center
Tel: +43 1 4277-14031 | Fax: -9140



Re: minor bird crash

2010-03-19 Thread Arnold Nipper
On 19.03.2010 08:10 Wolfgang Hennerbichler wrote

> ... checks if the as-path is valid ...

you really do that? We only do something like

case bgp_path.last {
13238: if pref_AS13238() then accept;
43247: if pref_AS43247() then accept;
}

where pref_AS() simply matches against all prefixes found in RADB
for AS y.


Best regards,
Arnold
-- 
Arnold Nipper / nIPper consulting, Sandhausen, Germany
email: arn...@nipper.de   phone: +49 6224 9259 299
mobile: +49 172 2650958 fax: +49 6224 9259 333



signature.asc
Description: OpenPGP digital signature


Re: minor bird crash

2010-03-19 Thread Wolfgang Hennerbichler

On Mar 18, 2010, at 21:03 , Arnold Nipper wrote:

> On 18.03.2010 15:25 Wolfgang Hennerbichler wrote
> 
>> I'm having my bird6 nearly up and running, and just stumbled across
>> the following minor crash.
> 
> just curious ... what is a _minor_ crash? Sounds like a little bit
> pregnant ;-)

heh :) 
a minor crash in my little world is a crash that is caused by a stupid user, 
not a gifted software developer. 

> 
> SCNR, Arnold
> btw: why don't you make your filter a function? You only would have to
> define it once and use it several times? But perhaps I'm not getting the
> whole picture ...

yeah, there's more to that than just the part you've seen. it also contains a 
set of ip adresses generated from the ripedb to mark them as 'good' routes, 
checks if the as-path is valid and so on... 



> -- 
> Arnold Nipper / nIPper consulting, Sandhausen, Germany
> email: arn...@nipper.de   phone: +49 6224 9259 299
> mobile: +49 172 2650958 fax: +49 6224 9259 333
> 

-- 
www.vix.at | www.aco.net
w...@univie.ac.at | WH844-RIPE
Vienna University Computer Center
Tel: +43 1 4277-14031 | Fax: -9140



Re: IPv6 Template

2010-03-19 Thread Wolfgang Hennerbichler

On Mar 18, 2010, at 22:36 , Ondrej Filip wrote:

> On 17.3.2010 16:34, Wolfgang Hennerbichler wrote:
>> Hi Ondrejs & Fellow BIRD users, 
>> 
>> I'm currently building the IPv6 Part of our BIRD Configuration Template. I'm 
>> trying to build it in the same way as our IPv4 stuff, which is trivial, 
>> because I've prepared all the code for a "dual stack" implementation. My 
>> question is, what your current best practice is for avoiding martians or 
>> unnecessary ipv6 routes (Like the Link Local Range, but I guess there are 
>> much more which I currently am not thinking about). 
>> 
>> Like in IPv4 I have this: 
>> prefix set martians;
>> {
>>  martians = [ 169.254.0.0/16+, 172.16.0.0/12+, 192.168.0.0/16+, 10.0.0.0/8+, 
>> 224.0.0.0/4+, 240.0.0.0/4+ ];
>>  if net.ip = 0.0.0.0 then return false;
>>  # Avoid too short and too long prefixes
>>  if (net.len < 8) || (net.len > 30) then return false;
>>  if net ~ martians then return false;
>>  return true;
>> }
>> 
>> What is your recommendation for that?
> 
> As Ondrej has mentioned, this is a little bit better/faster approach:
> 
> --
> function avoid_martians()
> prefix set martians;
> {
>  martians = [ 169.254.0.0/16+, 172.16.0.0/12+,
>   192.168.0.0/16+, 10.0.0.0/8+,
>   224.0.0.0/4+, 240.0.0.0/4+,
>   0.0.0.0/32-, 0.0.0.0/0{31,32}, 0.0.0.0/0{0,7} ];
> 
>  # Avoid RFC1918 networks
>  if net ~ martians then return false;
> 
>  return true;
> }
> --
> 
> But I personally prefer: 0.0.0.0/0{25,32}
> :-)

Yeah, we really should not accept bigger networks than /24, that's true. 

> 
> I use this IPv6 filter:
> --
> # This function excludes weird networks
> function avoid_martians()
> prefix set martians;
> {
>  martians = [ fc00::/7+, fec0::/10+,
> ::/128-, ::/0{0,15}, ::/0{49,128} ];
> 
>  if net ~ martians then return false;
> 
>  return true;
> }
> --

Allright, I came up with this now (Thanks to Arnold's Hint and yours above): 

# this function avoids illegal ipv6 networks.
function avoid_martians()
prefix set ipv6_no_gos;
{
  ipv6_no_gos = [ 3ffe::/16+, 2001:db8::/32+, fe00::/9+, ff00::/8+, ::/128-, 
::/0{0,15}, ::/0{49,128} ];
  if net ~ ipv6_no_gos then return false;
  return true;
}


Thanks for your hints; 

Wolfgang

-- 
www.vix.at | www.aco.net
w...@univie.ac.at | WH844-RIPE
Vienna University Computer Center
Tel: +43 1 4277-14031 | Fax: -9140