Re: Over-utilisation of v6 neighbour slots

2013-11-03 Thread Jared Mauch
I've noticed that my ipv6 is about 1ms faster than ipv4 consistently in 
measurements. I doubt that is enough faster to make a difference in most 
transactions so they would be equally preferred. 

Jared Mauch

 On Nov 1, 2013, at 3:46 PM, Erik Kline e...@google.com wrote:
 
 It looks like you would basically need to penalize IPv4 in order get
 your IPv6 ROI, *if* all your customers ever do is surf the web using
 Safari on recent Macs to do so.


Re: Over-utilisation of v6 neighbour slots

2013-11-03 Thread Phil Mayers

On 03/11/2013 16:30, Jared Mauch wrote:

I've noticed that my ipv6 is about 1ms faster than ipv4 consistently
in measurements. I doubt that is enough faster to make a difference
in most transactions so they would be equally preferred.


Interestingly, that last time I timed the IPv4 versys IPv6 latency - 
from myself to www.google.com - I saw a clear bias in favour of IPv4, of 
about 2ms.


Having just re-timed it, they're pretty much dead-on the same. 
Presumably my upstream and/or google have rejigged things in the meantime.


Re: Over-utilisation of v6 neighbour slots

2013-11-01 Thread Sander Steffann
Hi Erik,

 Looking at our data, looking at an IPv6 FTTH deployment's dedicated
 resolvers, averaging over 7 days, I'm seeing:
 
Safari + 10.6  =  ~89% IPv6 native preference
Safari + 10.7  =  ~38% IPv6 native preference (somewhat lower sample set)
Safari + 10.8  =  ~39% IPv6 native preference
Safari + 10.9  =  ~47% IPv6 native preference
 
 This hasn't been rigorously reviewed, of course.
 
 Perhaps Mavericks is a bit better, but not much...

:-(
Sander



Re: Over-utilisation of v6 neighbour slots

2013-11-01 Thread Ralph Droms (rdroms)
Erik - do different versions of Safari have any impact (I don't have a clue 
about where HE is actually implemented and whether the version of Safari makes 
a difference)?

- Ralph

On Nov 1, 2013, at 2:25 PM 11/1/13, Eric Vyncke (evyncke) evyn...@cisco.com
 wrote:

 Interesting to see the confirmation of OS roll-out impact
 
 -Original Message-
 From: ipv6-ops-bounces+evyncke=cisco@lists.cluenet.de [mailto:ipv6-
 ops-bounces+evyncke=cisco@lists.cluenet.de] On Behalf Of Sander
 Steffann
 Sent: vendredi 1 novembre 2013 19:17
 To: Erik Kline
 Cc: IPv6 Ops list
 Subject: Re: Over-utilisation of v6 neighbour slots
 
 Hi Erik,
 
 Looking at our data, looking at an IPv6 FTTH deployment's dedicated
 resolvers, averaging over 7 days, I'm seeing:
 
   Safari + 10.6  =  ~89% IPv6 native preference
   Safari + 10.7  =  ~38% IPv6 native preference (somewhat lower sample
 set)
   Safari + 10.8  =  ~39% IPv6 native preference
   Safari + 10.9  =  ~47% IPv6 native preference
 
 This hasn't been rigorously reviewed, of course.
 
 Perhaps Mavericks is a bit better, but not much...
 
 :-(
 Sander
 



Re: Over-utilisation of v6 neighbour slots

2013-11-01 Thread Ralph Droms (rdroms)

On Nov 1, 2013, at 3:46 PM 11/1/13, Erik Kline e...@google.com wrote:

 I'm not sure what you mean by impact.

Sorry for the lack of clarity.  You answered my question - the different 
behaviors are strictly correlated to the version of OS 10 and are independent 
of the version of Safari.

- Ralph

 
 Different OS versions do seem to behave differently.  I think 10.7 is
 when the dueling connections implementation was introduced, and it did
 drop Safari's IPv6 native preference by basically half.  And if you
 think about it, in a perfect network where IPv4 and IPv6 have
 identical performance each would likely only be used ~50% of the time.
 
 It looks like you would basically need to penalize IPv4 in order get
 your IPv6 ROI, *if* all your customers ever do is surf the web using
 Safari on recent Macs to do so.  The total impact of an HE
 implementation is obviously in proportion to its use for web traffic.
 
 Let me revise the numbers for this sample network.  I was including
 measurements where the client may not have asked for any s, so let
 me restrict my numbers just to measurements where s were
 requested.  That's what I get for not waiting to have my stats-diving
 be peer reviewed (different timezone, etc).
 
 Once more, with feeling!, and I'm sure Lorenzo and correct me later on.
 
 [All MSIE]
no HE, later versions do a simple reachability check ~once
96% IPv6 native preference
7ms average extra latency
 
 [All Chrome]
HE: 300ms lead for IPv6 then fallback to IPv4
83% IPv6 native preference
1.5ms average latency improvement over IPv4
 
 [All Safari + 10.6]
I think no HE?  (it's been so long...)
97.5% IPv6 native preference
0ms average latency delta between IPv4 and IPv6
 
 [All Safari + 10.7,10.8, and 10.9]
HE: strict connection racing, at one point A record requested
 first, I believe
48% IPv6 native preference
9ms average latency improvement over IPv4 (by design, working as
 intended, etc.)
 
 So the HE implementation does matter.  In this particular sample
 network I'm guessing that there may be about an extra 7-8 ms for IPv6
 requests to Google (this is end-to-end, so the sources of latency
 could be multiple including whether or not the interconnect paths for
 IPv4 and IPv6 are the same).
 
 Lastly, I am attaching an old slide from a measurements presentation
 we gave at the V6 World Congress in Paris in the very beginning of
 this year wherein I attempted to graphically illustrate the effect of
 different HE implementations.
 Finicky Eyeballs.png



Re: Over-utilisation of v6 neighbour slots

2013-10-29 Thread Doug Barton

On 10/28/2013 10:49 PM, Lorenzo Colitti wrote:

On Tue, Oct 29, 2013 at 6:53 AM, Phil Mayers p.may...@imperial.ac.uk
mailto:p.may...@imperial.ac.uk wrote:

I wanted to follow up on this. Some folks from Cisco kindly
contacted me off-list, and correctly guessed that a large number of
the IPv6 neighbour entries were in state STALE, and pointed me to
the relatively new:


   ipv6 nd cache expire seconds

...interface-level command. This wasn't in the IOS train we were
running until relatively recently, so I hadn't seen it before.


I wonder what the designers were thinking when they did the original
implementation. Without this option, a box with enough client churn
could run out of neighbour cache entries even if all the clients are
perfectly behaved.

Perhaps they didn't think of it because it doesn't happen in IPv4 due to
a) much fewer addresses on a given box due to scarcity and b) ARP has
timeouts.


Probably not scarcity in 1918 world, but I think you hit the nail on the 
head with arp has timeouts. :)


Doug



Re: Over-utilisation of v6 neighbour slots

2013-10-28 Thread Phil Mayers

On 21/10/13 20:35, Phil Mayers wrote:


Specifically, our Cisco 6500/sup720 ran out of IPv6 FIB slots, as
num_routes + num_neighs exceeded 32k (the default IPv4/IPv6 TCAM split
on this platform being 192k/32k).


I wanted to follow up on this. Some folks from Cisco kindly contacted me 
off-list, and correctly guessed that a large number of the IPv6 
neighbour entries were in state STALE, and pointed me to the 
relatively new:


  ipv6 nd cache expire seconds

...interface-level command. This wasn't in the IOS train we were running 
until relatively recently, so I hadn't seen it before.


Having applied this, we saw a sharp drop in v6 neighbour count, although 
it didn't seem to take effect on existing entries - I was able to force 
it by flapping the interface and refreshing all the neighbours.


The entries seem to expire after ipv6 nd cache expire + ipv6 nd 
reachable-time i.e. I see a max age in the neighbour table of 24 
minutes for parameter values of 1200 and 30 (in seconds and 
milliseconds) respectively.


There are also a bunch of newer per-interface ND commands (per-IF ND 
cache size limits, for example) that could help with resource 
exhaustion, so people on Cisco gear should take a look.





Re: Over-utilisation of v6 neighbour slots

2013-10-26 Thread Daniel Roesen
On Fri, Oct 25, 2013 at 11:55:05AM +0200, Andrew Yourtchenko wrote:
 rantI presume that those who want ultimate privacy have inspected
 their browsers to not do evercookies[1], removed any features in their
 browsers identifying them via the fingerprint, and ensured that the
 call-home feature of their favourite operating system and the apps is
 deactivated, as well as taking care that they manually reconfigure the
 new mac address on each new connection. /rant

Excellent point. Identification via IP address is the least point of
concern to me (as long as the host part doesn't use a GUID of course).

But making a lot of fuzz about prefix randomization like some German
ISPs do in the press nicely distracts from the real powerful
identification methods you mentioned - which are widely used.

Best regards,
Daniel

-- 
CLUE-RIPE -- Jabber: d...@cluenet.de -- dr@IRCnet -- PGP: 0xA85C8AA0


Re: Over-utilisation of v6 neighbour slots

2013-10-25 Thread Andrew Yourtchenko
On 10/25/13, Tim Chown t...@ecs.soton.ac.uk wrote:
 On 22 Oct 2013, at 06:03, Eric Vyncke (evyncke) evyn...@cisco.com wrote:

 IMHO iOS obviously implemented the first part but not the second part ;-)

 But, the rapid rate of new RFC 4941 addresses for iOS has another impact
 because network devices cannot anymore limit the number of IPv6 addresses
 per MAC address in order to prevent a local DoS.

 Yes, thanks for breaking our IPv6 network with that one in your FHS
 implementation Eric :)

That's in 7.2 WLC only which you hopefully do not run by now. The 7.3+
does the cleanup of the stale entries above a threshold, that do not
answer the DAD probes.

rantI presume that those who want ultimate privacy have inspected
their browsers to not do evercookies[1], removed any features in their
browsers identifying them via the fingerprint, and ensured that the
call-home feature of their favourite operating system and the apps is
deactivated, as well as taking care that they manually reconfigure the
new mac address on each new connection. /rant

[1] http://samy.pl/evercookie/

--a


Re: Over-utilisation of v6 neighbour slots

2013-10-25 Thread Benedikt Stockebrand
Hi Andrew and list,

Andrew Yourtchenko ayour...@gmail.com writes:

 rant

ok, I'll bite:

 I presume that those who want ultimate privacy have inspected
 their browsers to not do evercookies[1],

Yuck.  Good thing only the Internet thing needs this, not e-mail.  Oh,
wait...

Anyway, there are things on the Internet beyond HTTP/s and HTML...

 removed any features in their browsers identifying them via the
 fingerprint,

Actually, there *are* people doing this...

However, pointing at somebody else screwing up as badly as oneself
doesn't help any.  With IPv6 we've had a rare occasion to deal with this
problem properly at the network layer; if anybody tries to replace the
HTTP/s and HTML combo with some new design, I sure hope they will
address their side of the problem, too, so the problem might be solved
there in as little as 20+ years...

 and ensured that the call-home feature of their favourite operating
 system and the apps is deactivated,

Same issue, only worse.  Within the IETF/W3C and similar, there's some
sort of chance that they at least understand the issues involved here.
Chances are getting slimmer with OS vendors, worse with browser
developers/vendors, and next to null (for \epsilon  0) with apps
developers/vendors.

 as well as taking care that they manually reconfigure the
 new mac address on each new connection. /rant

Come on, you know that this is unfair.  The MAC address is only visible
on-link (except through EUI64-based IIDs), so the damage here is
severely restricted, especially in an environment that is seriously
subnetted.

If we wanted to do this properly, why not switch from Ethernet to PPPoE
all the way---with PPP there are no MAC addresses, and on pointopoint
links we could use 0:0:0:0:0:1 for the router/RAS and 0:0:0:0:0:2 for
the end device in all cases...


Cheers,

Benedikt

PS: Sarcasm markup left as an exercise to the so inclined reader.

-- 
 Business Grade IPv6
Consulting, Training, Projects

Stepladder IT Training+Consulting GmbH Benedikt Stockebrand
Fichardstr. 38, 60322 Frankfurt/Main   Dipl.-Inform./Geschäftsführer
HRB 94202, Registergericht Frankfurt/M cont...@stepladder-it.com   
http://www.stepladder-it.com/  +49 (0) 69 - 247 512 362  
http://www.benedikt-stockebrand.de/+49 (0) 177 - 41 73 985   

Bitte kein Spam, keine unaufgeforderten Werbeanrufe, keine telefonischen
Umfragen.  Anrufe werden ggf. zu rechtlichen Zwecken aufgezeichnet.
No spam, no unsolicited sales calls, no telephone surveys, please. Calls
may be recorded for legal purposes.


Re: rant Re: Over-utilisation of v6 neighbour slots

2013-10-25 Thread Benedikt Stockebrand
Hi Andrew and list,

Andrew Yourtchenko ayour...@gmail.com writes:

 I've tweaked the subject, so the folks can filter it out if needed,
 given that the discussion is way above L4 :-)

good move, thanks.

 Anyway, there are things on the Internet beyond HTTP/s and HTML...

 True. FTP active mode. It's immortal. :-)

...because it doesn't support cookies:-)

 [Fingerprinting at various protocol layers]

 The problem  I think did not really exist at the time IPv6 was defined - so
 it is not fair to say we have had an occasion.

Bad choice of words on my side: s/occasion/opportunity/

Let me rephrase my statement: IPv6 had the chance to start over from
scratch (within the boundaries of the network layer and the socket API,
that is).  HTTP/s and HTML never had that.  (Nor had SMTP, IMAP, DNS and
a host of other protocols.)

 And now it is http://xkcd.com/927/.
 Tricky.

The good news here is that the protocol version field in the IP header
is only 4 bits wide---we won't see more than 16 different IP versions
around:-)

 If we wanted to do this properly, why not switch from Ethernet to PPPoE
 all the way---

 This has triggered my fantasy to go far and wild enough that even I
 considered that the result does not belong to a mail on the technical
 list, so I instead edited it into a little fiction piece, which I hope
 you might find entertaining:

 http://stdio.be/blog/2013-10-25-One-completely-random-passage-of-thought/

Andrew, take it easy on the coffee...maybe switch to something
healthier, like methylated spirit or so.

On a more serious note:  Some of the approaches you mention would be
rather exciting at least from an academic point of view, but they would
force us start over with an entirely new network stack.  Considering the
time it took IPv6 to come to (some sort of) speed and our age, we would
unlikely live long enough to see this happen...


Cheers,

Benedikt

-- 
 Business Grade IPv6
Consulting, Training, Projects

Benedikt Stockebrand, Dipl.-Inform.http://www.stepladder-it.com/


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Benedikt Stockebrand
Hi Phil and list,

Phil Mayers p.may...@imperial.ac.uk writes:

 Shrug. People have them (in quantity) because they're cost effective
 and did a mix of stuff that no other box did, that it turns out a lot
 of people wanted, and in most cases tolerably well.

the problem here is that with mobile devices getting increasingly
popular, the design of the supervisor engine is outdated.  So I agree
with James that we have to cope with, where we is the entire
industry, including the router vendors.

In my opintion the problem here is not so much Apple, but Cisco.  While
I understand that CAM/TCAM is painfully expensive in hardware, in the
long run increasing its size is the way to go.  On the Cisco side, the
quick workaround may be a reliable expiration mechanism.  On your side,
maybe some further segmentation can help to spread the load over
multiple routers (yes, I know that's frequently not an option on WiFi).


Cheers,

Benedikt

-- 
 Business Grade IPv6
Consulting, Training, Projects

Benedikt Stockebrand, Dipl.-Inform.http://www.stepladder-it.com/


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Bjørn Mork
Benedikt Stockebrand b...@stepladder-it.com writes:

  On your side, maybe some further segmentation can help to spread the
 load over multiple routers (yes, I know that's frequently not an
 option on WiFi).

Interesting excercise for anyone with more time than TCAM:

Implement segmentation for IPv6, assuming that renumbering Just Works
for any WiFI device, while keeping the oversized L2 domain for IPv4.


Bjørn


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Phil Mayers

On 10/24/2013 08:18 AM, Benedikt Stockebrand wrote:

In my opintion the problem here is not so much Apple, but Cisco.  While


Well, I think there's more than one problem.

Certainly fixed-size (and relatively small) FIBs in Cisco-land are a 
problem. On devices where the FIB is a relatively fast-but-inflexible 
architecture - like TCAM - good sizing decisions at design time need to 
be married with smart algorithms at runtime (i.e. partition TCAM 
dynamically not statically at reboot!). Sup720 doesn't do well in both 
categories!


It is only relatively recently that TCAM-based platforms have started to 
grow in terms of FIB size - sup2T still comes in the same sizes as 
sup720, but the new 6880 has bigger.


But even if you forget completely about the FIB-size issue, I *still* 
assert that Apple's v6 privacy address behaviour is idiotic. For those 
of us who log v6-MAC mappings into SQL, it balloons the logging 
requirements. It loads IPv6 FHS implementations. And it provides 
negligible - perhaps zero - improvement in privacy.


I've observed Apple devices powering up, generating a random IPv6 
address, NEVER USING IT, then powering it down and losing it, at 
intervals of tens of seconds. That's just asinine.


I assert that rolling the address on a timer, not on power/link 
activity, is the intent of the RFCs, and the desired behaviour, and that 
Apple are doing the wrong thing here.



I understand that CAM/TCAM is painfully expensive in hardware, in the
long run increasing its size is the way to go.  On the Cisco side, the


In the long run, a move to RAM-based trie lookups seems to be the way to 
go for FIBs, for the superior power use characteristics if nothing else.



quick workaround may be a reliable expiration mechanism.  On your side,
maybe some further segmentation can help to spread the load over
multiple routers (yes, I know that's frequently not an option on WiFi).


...as is the case here. That said, we are pondering moving the wireless 
routing off onto dedicated devices - anyone got any recommendations? ;o)


Cheers.
Phil


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Benedikt Stockebrand
Oops...

Benedikt Stockebrand b...@stepladder-it.com writes:

 Hmm, I wonder how that scales.  CAM/TCAM is of AC(1) complexity, which
 is what RAM can't do---trees, tries and whatnot in RAM have AC(n)
 complexity.

make that AC(0) and AC(1), respectively.


Cheers,

Benedikt

-- 
 Business Grade IPv6
Consulting, Training, Projects

Benedikt Stockebrand, Dipl.-Inform.http://www.stepladder-it.com/


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Martin Millnert
 Anyway, the users will have to pay for that. Too bad users of !AAPL
 have to subsidize those decisions. Time for an AAPL user NAT tax? :)

Interesting idea.  Put AAPL-OUI's IPv4-traffic in lousy-queue in the
BNG? :}

Or generally, help IPv6 out a little by adding general
IPv4-(latency)-tax?

/M


signature.asc
Description: This is a digitally signed message part


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Daniel Roesen
On Thu, Oct 24, 2013 at 03:14:52PM +0200, Martin Millnert wrote:
  Anyway, the users will have to pay for that. Too bad users of !AAPL
  have to subsidize those decisions. Time for an AAPL user NAT tax? :)
 
 Interesting idea.  Put AAPL-OUI's IPv4-traffic in lousy-queue in the
 BNG? :}

Nah. The problem is that the AFTR doesn't see Ethernet MACs, so you
cannot really distinguish AAPL traffic from others. Otherwise you could
delay SYNs from AAPL devices by a certain amount.

 Or generally, help IPv6 out a little by adding general
 IPv4-(latency)-tax?

That would punish the innocent majority.

Anyway, we had this discussion before:
http://lists.cluenet.de/pipermail/ipv6-ops/2012-June/007060.html

Best regards,
Daniel

-- 
CLUE-RIPE -- Jabber: d...@cluenet.de -- dr@IRCnet -- PGP: 0xA85C8AA0


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Brandon Ross

On Thu, 24 Oct 2013, Tore Anderson wrote:


I'd like an option to rotate my privacy address for every TCP session.


Considering that DAD needs a couple of seconds to complete before a new
privacy address is usable, I bet you'd change your mind about pretty
quickly...

(Well, I suppose happy eyeballs might prevent the user experience from
becoming a total disaster.)


Nah, just pre-provision a number of privacy addresses and stay ahead of 
the demand.


--
Brandon Ross  Yahoo  AIM:  BrandonNRoss
+1-404-635-6667ICQ:  2269442
Schedule a meeting:  https://doodle.com/brossSkype:  brandonross


Re: Over-utilisation of v6 neighbour slots

2013-10-24 Thread Tim Chown
On 22 Oct 2013, at 06:03, Eric Vyncke (evyncke) evyn...@cisco.com wrote:

 IMHO iOS obviously implemented the first part but not the second part ;-)
 
 But, the rapid rate of new RFC 4941 addresses for iOS has another impact 
 because network devices cannot anymore limit the number of IPv6 addresses per 
 MAC address in order to prevent a local DoS.

Yes, thanks for breaking our IPv6 network with that one in your FHS 
implementation Eric :)

Tim

Re: Over-utilisation of v6 neighbour slots

2013-10-23 Thread Nick Hilliard
On 22/10/2013 17:18, Sam Wilson wrote:
 It's stuff like this that makes me think it's *still* not time to offer
 a general v6 service.

generally, the sup720 is not a good edge device for third party L3 services
due to rate limiter issues.

Nick



Re: Over-utilisation of v6 neighbour slots

2013-10-22 Thread Sam Wilson

On 22 Oct 2013, at 06:03, Eric Vyncke (evyncke) wrote:

 But, the rapid rate of new RFC 4941 addresses for iOS has another impact 
 because network devices cannot anymore limit the number of IPv6 addresses per 
 MAC address in order to prevent a local DoS.
 
 So, either you disable SLAAC and rely on stateful DHCPv6 (but then Android is 
 not happy) or use aggressive time to clean the ND cache...

... with the attendant difficulty in tracing systems that might be doing Bad 
Things.

We have a mixture of Sup2Ts and Sup720s and we don't (yet) have v6 enabled on 
most of them.  It's stuff like this that makes me think it's *still* not time 
to offer a general v6 service.

Sam
-- 
The University of Edinburgh is a charitable body, registered in
Scotland, with registration number SC005336.



Re: Over-utilisation of v6 neighbour slots

2013-10-22 Thread Phil Mayers

On 22/10/13 10:18, Sam Wilson wrote:


On 22 Oct 2013, at 06:03, Eric Vyncke (evyncke) wrote:


But, the rapid rate of new RFC 4941 addresses for iOS has another
impact because network devices cannot anymore limit the number of
IPv6 addresses per MAC address in order to prevent a local DoS.

So, either you disable SLAAC and rely on stateful DHCPv6 (but then
Android is not happy) or use aggressive time to clean the ND
cache...


... with the attendant difficulty in tracing systems that might be
doing Bad Things.

We have a mixture of Sup2Ts and Sup720s and we don't (yet) have v6
enabled on most of them.  It's stuff like this that makes me think
it's *still* not time to offer a general v6 service.


I disagree - and since I'm the one who posted about the problem, I call 
dibs on getting to decide how serious it is ;o)


We offer a general IPv6 service, and we've had very few real problems. 
It is NOT as hard as people make out, and if you wait until every last 
problem is solved, you'll be waiting forever.


You'll also be missing out on the opportunity to learn about issues 
early and influence your vendors and your own future purchases in 
appropriate ways.


Hold off on IPv6 is something I would recommend to my competitors...


Re: Over-utilisation of v6 neighbour slots

2013-10-22 Thread Matej Gregr
Hi Phil,

  1. Has anyone else run into this sort of thing (neighbour table
 exhaustion) and what kind of approach did you take to solving or
 ameliorating it? DHCPv6?

We run to the same problem as well. Not on wireless network, but on
large Ethernet campus. The problem is, that we are stacking several
switches to one virtual. The benefits are great, but the problem is that
the cache size is not combination of the physical switches size, but is
the size of one physical switch. This is understandable, but you will
face the same problem as on the wireless network - cache exhaustion.

Decreasing the exhaustion time was the first solution, but than we have
to move several VLANs to another switch, to load balance the caches.

  2. Does anyone know if Apple (and other vendors) understand the
 negative consequences of their aggressive rotation of IPv6 privacy
 addresses, and are going to address it?

Probably not, because Windows behaviour is the same. Not so aggresive,
but this is because of personal computers are used in different way than
mobile phones.

  3. Does anyone know if any equipment vendors have more intelligent
 strategies for handling this kind of situation - LRU expiry of v6
 neighbours at 90% util rather than self-destructing FIB overflow, for
 example ;o)

The HP/H3C we are using will deny creation of a new record which is also
quite bad. Everythink works for already connected clients but new
clients fail. It's great for throubleshooting.

 [We're aware the sup720 is old, but it seems like this could be an issue
 even for more recent devices at sufficient scale]

Absolutely, we tested switches of several vendors and the problem is the
same. The cache size for IPv6 is always smaller than IPv4 cache size and
this is a problem, because even in the perfect use case, you need twice
as big IPv6 cache as IPv4 - link local + global addresses.

Regards,
  Matej




smime.p7s
Description: S/MIME Cryptographic Signature


Re: Over-utilisation of v6 neighbour slots

2013-10-22 Thread David Barak
On Oct 22, 2013, at 3:18 AM, Phil Mayers p.may...@imperial.ac.uk wrote:

 On 10/22/2013 04:56 AM, Doug Barton wrote:
 Has anyone communicated directly with the Apple folks on this issue?
 
 How would one even *do* that?

I unicasted this offline to someone I know at Apple: hopefully she can get 
attention from the right people.

David Barak

Over-utilisation of v6 neighbour slots

2013-10-21 Thread Phil Mayers

All,

We ran into an interesting issue on our wireless network today, caused 
mainly by the known behaviour of Apple clients in generating fresh 
privacy addresses every time there's a power sleep/wake state change 
(i.e. a lot) combined with a non-default NS/ND config on our side.


Specifically, our Cisco 6500/sup720 ran out of IPv6 FIB slots, as 
num_routes + num_neighs exceeded 32k (the default IPv4/IPv6 TCAM split 
on this platform being 192k/32k).


This was probably exacerbated by longer-than-default NS cache timeouts 
on our part, recommended in response to CPU issues we faced as discussed 
here:


http://www.gossamer-threads.com/lists/cisco/nsp/161344

To combat the issue I cranked the nd reachable-time down from 900 to 
300 seconds and re-carved the TCAM to give 64k IPv6 and reloaded, but it 
was all most troubling. To give an idea why, some stats:


10576 distinct MAC addresses with 1+ global IPv6 addresses
29610 IPv6 addresses (not including LL)
25.3% of hosts with = 4 v6 address
17299 IPv6 addresses consumed by that 25.3%

That is, ~25% of hosts consuming ~59% of the addresses in-use. OUIs for 
the MAC addresses in question were almost entirely Apple. Distribution was:


frequencyrel. cum.

 14651 43.98%   43.98% ***
 22084 19.70%   63.68% ***
 31164 11.01%   74.69% ***
 4 729  6.89%   81.58% **
 5 560  5.30%   86.88% *
 6 387  3.66%   90.54% *
 7 276  2.61%   93.14%
 8 206  1.95%   95.09%
 9 177  1.67%   96.77%
10 120  1.13%   97.90%
11  70  0.66%   98.56%
12  50  0.47%   99.04%
13  26  0.25%   99.28%
14  29  0.27%   99.56%
15  16  0.15%   99.71%
16  13  0.12%   99.83%
17   9  0.09%   99.91%
18   5  0.05%   99.96%
19   1  0.01%   99.97%
20   2  0.02%   99.99%
24   1  0.01%  100.00%


Some questions:

 1. Has anyone else run into this sort of thing (neighbour table 
exhaustion) and what kind of approach did you take to solving or 
ameliorating it? DHCPv6?


 2. Does anyone know if Apple (and other vendors) understand the 
negative consequences of their aggressive rotation of IPv6 privacy 
addresses, and are going to address it?


 3. Does anyone know if any equipment vendors have more intelligent 
strategies for handling this kind of situation - LRU expiry of v6 
neighbours at 90% util rather than self-destructing FIB overflow, for 
example ;o)


[We're aware the sup720 is old, but it seems like this could be an issue 
even for more recent devices at sufficient scale]


Cheers,
Phil


Re: Over-utilisation of v6 neighbour slots

2013-10-21 Thread Cutler James R
On Oct 21, 2013, at 3:35 PM, Phil Mayers p.may...@imperial.ac.uk wrote:

 Some questions:


Another question:

  4.  Does Apple's approach to IPv6 privacy addresses properly support the 
intent of privacy addresses?

My tentative answer is, Yes, and we need to learn to cope. 

James R. Cutler
james.cut...@consultant.com






Re: Over-utilisation of v6 neighbour slots

2013-10-21 Thread Phil Mayers

On 21/10/2013 21:19, Cutler James R wrote:


4.  Does Apple's approach to IPv6 privacy addresses properly support
the intent of privacy addresses?

My tentative answer is, Yes, and we need to learn to cope.


The general approach perhaps, but the rollover timing is way, way too 
aggressive IMO. It should be on a timer, not driven by PHY wake events. 
Even 300 seconds would be an improvement over the behaviour we're seeing.


As to we need to learn to cope - lots of networks have huge amounts of 
capital investment which can't just be ripped out and replaced overnight 
because Apple have decided to be aggressive with address rollovers. If 
the main outcome is for FIB-pressured sites to disable IPv6 on OUIs 
registered to Apple, it's a retrograde step ;o)


Maybe we need a neigbour un-advert ICMPv6 message that the old 
addresses could be torn down with.


Re: Over-utilisation of v6 neighbour slots

2013-10-21 Thread Doug Barton

Has anyone communicated directly with the Apple folks on this issue?

Doug


On 10/21/2013 01:37 PM, Phil Mayers wrote:

On 21/10/2013 21:19, Cutler James R wrote:


4.  Does Apple's approach to IPv6 privacy addresses properly support
the intent of privacy addresses?

My tentative answer is, Yes, and we need to learn to cope.


The general approach perhaps, but the rollover timing is way, way too
aggressive IMO. It should be on a timer, not driven by PHY wake events.
Even 300 seconds would be an improvement over the behaviour we're seeing.

As to we need to learn to cope - lots of networks have huge amounts of
capital investment which can't just be ripped out and replaced overnight
because Apple have decided to be aggressive with address rollovers. If
the main outcome is for FIB-pressured sites to disable IPv6 on OUIs
registered to Apple, it's a retrograde step ;o)

Maybe we need a neigbour un-advert ICMPv6 message that the old
addresses could be torn down with.