Re: turning on comcast v6

2014-01-06 Thread Aled Morris
On 4 January 2014 06:06, Ricky Beam jfb...@gmail.com wrote:

 It'll **NEVER** be a default because it breaks too many clueless people's
 networks.  Just like, surprise, DHCP guard isn't on by default in any
 gear I'm aware of.


Spanning-tree portfast isn't on by default, and that breaks plenty of
clueless people's networks with client DHCP timeouts.  Just sayin'.


I appreciate the view that IPv6 was designed in a certain way, partly to
fix the problems and remove the kludges in IPv4; the reality is that IPv4
was wildly successful because it wasn't the proscriptive OSI.

Whilst I would prefer not to see the mistakes of IPv4 repeated (especially
NAT and RFC1918 addressing) trying to help people not shoot themselves in
the foot will simply retard deployment and maybe result in even worse
workarounds.

Come on people - Postel's Law applies, let's be liberal in what we accept
into the protocol design too.  If users want DHCP served default gateway,
fine.  Nobody's forcing you to enable it on your network if you don't want
to.

Aled


Re: turning on comcast v6

2014-01-06 Thread Leo Bicknell

On Jan 5, 2014, at 11:44 PM, valdis.kletni...@vt.edu wrote:

 If Joe Home User has a rogue device spewing RA's, he probably has a bigger
 problem than just not having RA Guard enabled.  He either has a badly
 misconfigured router (and one that's disobeying the mandate to not RA
 if you don't have an uplink), or he has a compromised malicious host.
 
 In either case, he's got bigger fish to fry.

mandate isn't the right description.

http://tools.ietf.org/html/rfc6059

There is a ~3 year old _proposed standard_ for the behavior you describe.

I have yet to see any compliant equipment at $LocalBigBox, but maybe I'm
not purchasing the right gear.

So yet again, the response I get to ra's are fragile is deploy this
brand new band-aid that can't be purchased yet.

Can we just have DHCPv6, please?  How many dozens of technologies are we
going to invent to try and avoid putting a default route in DHCP?

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/







signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: turning on comcast v6

2014-01-06 Thread Valdis . Kletnieks
On Mon, 06 Jan 2014 09:44:32 -0600, Leo Bicknell said:

 mandate isn't the right description.

 http://tools.ietf.org/html/rfc6059

 There is a ~3 year old _proposed standard_ for the behavior you describe.

I'll make the case that if a router becomes unable to forward packets
because it has lost its uplink or connection to another subnet (so it's now
homed on only one subnet), that's a router-to-host transition.

RFC2461, sections 6.2.4 and 6.2.5 discuss the case of a router becoming
a host - and it includes thou shalt cease blabbing the RAs after a
suitable amount of time.  And that's a heck of a lot older than 3 years.


pgpsRGivNv4uh.pgp
Description: PGP signature


10gbps peering subscriber switch recommendation

2014-01-06 Thread randal k
Good morning,
We're in the market to move our IX peering off of our core (too much
BGP/CPU :-/ ) and onto a dedicated switch.

Anybody have a recommendation on a switch that can do the following
without costing a fortune? I have scoured Cisco, and bang for the buck
is ... ASR9k (way over powered for handling zero-feature IX traffic),

3-8x 10gbps ports
64k routes minimum, preferably 128k
Must be able to speak BGP
Native/functional IPv6 would be sharp!
Basic QoS to police our ports

The prefix count seems to be the killer, as our exchange table is
getting pretty big (42k+ currently). I'm really tempted to build a
vyatta box or similar, but would rather do something off the shelf --
especially if it can be 1-2 gens old and cost effective.

I'm certain that this same situation is scratching many other folks as
exchanges become more important.

Thanks for your input in advance -- stay warm!
Randal



Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Adrian Minta

Good morning,
We're in the market to move our IX peering off of our core (too much
BGP/CPU :-/ ) and onto a dedicated switch.



Brocade ICX 7750 Switch seems to satisfy all the requirements.

--
Best regards,
Adrian Minta





Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Aled Morris
On 6 January 2014 17:57, randal k na...@data102.com wrote:

 Good morning,
 We're in the market to move our IX peering off of our core (too much
 BGP/CPU :-/ ) and onto a dedicated switch.

 Anybody have a recommendation on a switch that can do the following
 without costing a fortune? I have scoured Cisco, and bang for the buck
 is ... ASR9k (way over powered for handling zero-feature IX traffic),

 3-8x 10gbps ports
 64k routes minimum, preferably 128k
 Must be able to speak BGP
 Native/functional IPv6 would be sharp!
 Basic QoS to police our ports

 The prefix count seems to be the killer, as our exchange table is
 getting pretty big (42k+ currently). I'm really tempted to build a
 vyatta box or similar, but would rather do something off the shelf --
 especially if it can be 1-2 gens old and cost effective.


If you don't need to carry a full Internet table, the Cisco 4500-X has
plenty of features and the 32 port model can accommodate 256k IPv4 routes.
 It also does IPv6 in hardware (128k routes)

Aled


Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Nick Hilliard
On 06/01/2014 18:12, Adrian Minta wrote:
 Brocade ICX 7750 Switch seems to satisfy all the requirements.

except qos (which needs switch port buffer space).  There are no cheap 10G
boxes on the market at the moment which have reasonable numbers of 10G
ports and reasonable sized.  Plenty which have 2-4 10G ports with
reasonable buffers and lots more which have plenty of 10G ports with hardly
any buffer space.

Nick




Uverse Cleveland OH question

2014-01-06 Thread Jay Ashworth
If there's anyone with firsthand knowledge of that system, could you shoot
me a note off-list?

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA   #natog  +1 727 647 1274



Re: turning on comcast v6

2014-01-06 Thread Doug Barton

On 01/04/2014 05:42 AM, Baldur Norddahl wrote:

On Sat, Jan 4, 2014 at 2:12 AM, Doug Barton do...@dougbarton.us wrote:




If you did add default route to DHCPv6, what is then supposed to happen to
the other routes, that the client might discover?



You would configure the client not to do RS, and to ignore any RAs that it
receives. Simple.



If you are going to modify the client, you can use any method you like,


No, I can't, because the method I would like to use is not in the spec.


including having the client simply use fe80:: or prefix:: as default
gateway.

You want a secure way to configure the clients. That sounds more like
Secure NDP (SEND) than it sounds like DHCPv6 with default gateway.


Thank you for the textbook illustration of the anything but DHCP! 
mindset I was referring to earlier.


Doug




Re: turning on comcast v6

2014-01-06 Thread Owen DeLong

On Jan 6, 2014, at 10:37 , Doug Barton do...@dougbarton.us wrote:

 On 01/04/2014 05:42 AM, Baldur Norddahl wrote:
 On Sat, Jan 4, 2014 at 2:12 AM, Doug Barton do...@dougbarton.us wrote:
 
 
 If you did add default route to DHCPv6, what is then supposed to happen to
 the other routes, that the client might discover?
 
 
 You would configure the client not to do RS, and to ignore any RAs that it
 receives. Simple.
 
 
 If you are going to modify the client, you can use any method you like,
 
 No, I can't, because the method I would like to use is not in the spec.

Doesn't have to be... You can create any local DHCPv6 extension you like. That 
_IS_ in the spec.

Owen




Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Mark Tinka
On Monday, January 06, 2014 08:24:22 PM Nick Hilliard wrote:

 except qos (which needs switch port buffer space).  There
 are no cheap 10G boxes on the market at the moment which
 have reasonable numbers of 10G ports and reasonable
 sized.  Plenty which have 2-4 10G ports with reasonable
 buffers and lots more which have plenty of 10G ports
 with hardly any buffer space.

FIB space requirements in a switch are also going to limit 
your options.

Also, many non-service provider switches don't do egress 
policing (they might do shaping, but then if the buffers are 
small...).

Mark.


signature.asc
Description: This is a digitally signed message part.


IXP + government transparency report

2014-01-06 Thread Martin Hannigan
As well as being first to be open-ix certified, I think LINX hit a second
first that is as interesting;


https://www.linx.net/service/publicpeering/novafiles/nova-usgov-reports.html

Applause +LINX


Best,

-M


Re: IXP + government transparency report

2014-01-06 Thread Bill Woodcock

On Jan 6, 2014, at 11:52 AM, Martin Hannigan hanni...@gmail.com wrote:

 As well as being first to be open-ix certified, I think LINX hit a second
 first that is as interesting;
 
 
 https://www.linx.net/service/publicpeering/novafiles/nova-usgov-reports.html

…and is this function being conducted completely without dependencies inside 
the U.S.?

-Bill






signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: IXP + government transparency report

2014-01-06 Thread Martin Hannigan
On Mon, Jan 6, 2014 at 2:57 PM, Bill Woodcock wo...@pch.net wrote:


 On Jan 6, 2014, at 11:52 AM, Martin Hannigan hanni...@gmail.com wrote:

  As well as being first to be open-ix certified, I think LINX hit a second
  first that is as interesting;
 
 
 
 https://www.linx.net/service/publicpeering/novafiles/nova-usgov-reports.html

 …and is this function being conducted completely without dependencies
 inside the U.S.?



Bill,

 OIX certified organizations must provide an accurate and monthly report on
Government Information Requests and actions taken related to the requests.
You can see an example here http://xmission.com/transparency

With regards to Patriot 215 and FISA 701, there are recommendations for
warrant canaries. Obviously, much trickier.

I think the point is about leadership and taking small, but giant, steps. I
hope that everyone in the infrastructure follows this lead and does exactly
the same thing.


Best,

-M


Re: NANOG Digest, Vol 72, Issue 17

2014-01-06 Thread Ralph Droms (rdroms)
 Date: Mon, 6 Jan 2014 11:40:29 -0800
 From: Owen DeLong o...@delong.com
 To: Doug Barton do...@dougbarton.us
 Cc: nanog@nanog.org nanog@nanog.org
 Subject: Re: turning on comcast v6
 Message-ID: 741b5a5f-3d87-4ba2-9349-f5bb94a8b...@delong.com
 Content-Type: text/plain; charset=iso-8859-1
 
 
 [...]
 Doesn't have to be... You can create any local DHCPv6 extension you like. 
 That _IS_ in the spec.
 
 Owen

Well, not exactly.  The authors of RFC 3315, smarting (if I recall correctly) 
from the local options debacle in DHCPv4, didn't set aside any experimental 
option codes for DHCPv6.  Oops and mea culpa.

Having said that, I suppose I can't formally recommend that an implementor use 
an option code somewhere near the top of the range and implement a quick 
extension to a client and server for the default router option, which would 
result in some running code to point at.

But running code isn't enough.  The last time I took the default router option 
to the IETF, it died (in the 6man WG, again trusting to memory) for lack of 
support.  More or less the same thing more recently in the mif WG (more support 
in mif, but it was the wrong WG).  So, someone will have to do the hard work of 
shepherding and supporting the document through publication in the right WG.  I 
understand Nick Hilliard may be undertaking that effort; those interested in 
the new option might want to lend Nick a hand (apologies to Nick if I've got 
that wrong).

- Ralph




Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Nitzan Tzelniker
A little bit overkill in term of number of ports but you can consider the
new Trident 2 switches Juniper EX-5100, Cisco Nexus 3100 .
They have unified TCAM that can store 128K v4 routes

Nitzan


On Mon, Jan 6, 2014 at 9:43 PM, Mark Tinka mark.ti...@seacom.mu wrote:

 On Monday, January 06, 2014 08:24:22 PM Nick Hilliard wrote:

  except qos (which needs switch port buffer space).  There
  are no cheap 10G boxes on the market at the moment which
  have reasonable numbers of 10G ports and reasonable
  sized.  Plenty which have 2-4 10G ports with reasonable
  buffers and lots more which have plenty of 10G ports
  with hardly any buffer space.

 FIB space requirements in a switch are also going to limit
 your options.

 Also, many non-service provider switches don't do egress
 policing (they might do shaping, but then if the buffers are
 small...).

 Mark.



Re: turning on comcast v6

2014-01-06 Thread Ricky Beam

On Sat, 04 Jan 2014 14:03:21 -0500, Owen DeLong o...@delong.com wrote:
A router, yes. THE router, not unless the network is very stupidly put  
together.


Like every win7 and win8 machine on the planet?  (IPv6 is installed and  
enabled by default. Few places have IPv6 enabled on their LAN, so a single  
RA would, indeed, 0wn3z those machines instantly.)


I disagree. Unlike with DHCP guard, RA guard can make reasonable  
predictions in most cases. Switches with “uplink” ports designated, for  
example, could easily default to permitting RAs only from those ports.


One cannot **GUESS** the security for a network. You must either *know* or  
*not know* what's on a port.  What makes a port uplink (read:  
trusted)? The only way to know for sure, without creating surprises or  
exploitable holes, is make the ADMIN explicitly SET EACH PORT.  That's the  
way DHCP Guard works.  That's the way spanning-tree portfast, bpdu guard,  
root guard, etc., etc. works.  That's the way port security works.  And  
that's the way RA Guard WILL be done.




Re: turning on comcast v6

2014-01-06 Thread Owen DeLong

On Jan 6, 2014, at 12:57 , Ricky Beam jfb...@gmail.com wrote:

 On Sat, 04 Jan 2014 14:03:21 -0500, Owen DeLong o...@delong.com wrote:
 A router, yes. THE router, not unless the network is very stupidly put 
 together.
 
 Like every win7 and win8 machine on the planet?  (IPv6 is installed and 
 enabled by default. Few places have IPv6 enabled on their LAN, so a single RA 
 would, indeed, 0wn3z those machines instantly.)
 
The obvious solution to that is to install real IPv6 routers.

 I disagree. Unlike with DHCP guard, RA guard can make reasonable predictions 
 in most cases. Switches with “uplink” ports designated, for example, could 
 easily default to permitting RAs only from those ports.
 
 One cannot **GUESS** the security for a network. You must either *know* or 
 *not know* what's on a port.  What makes a port uplink (read: trusted)? 
 The only way to know for sure, without creating surprises or exploitable 
 holes, is make the ADMIN explicitly SET EACH PORT.  That's the way DHCP Guard 
 works.  That's the way spanning-tree portfast, bpdu guard, root guard, etc., 
 etc. works.  That's the way port security works.  And that's the way RA Guard 
 WILL be done.

The port isn't particularly trusted, but it is allowed to send RAs which are 
forwarded to the network by default.
Obviously a sane switch would allow this configuration to be changed. We're not 
talking about the security model for a network, we're talking about the default 
behavior of a switch.

Defaults are, inherently guesses to some extent. Nonetheless, a switch must 
have some default behavior.

It seems to me that in the case of switches which have otherwise designated 
uplink ports, it is logical to make those ports default to RA allowed while 
defaulting to not allowing RAs from other ports by default.

Owen




Re: turning on comcast v6

2014-01-06 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 1/6/2014 1:08 PM, Owen DeLong wrote:

 The port isn't particularly trusted, but it is allowed to send RAs
 which are forwarded to the network by default. Obviously a sane
 switch would allow this configuration to be changed. We're not
 talking about the security model for a network, we're talking about
 the default behavior of a switch.
 
 Defaults are, inherently guesses to some extent. Nonetheless, a
 switch must have some default behavior.
 
 It seems to me that in the case of switches which have otherwise
 designated uplink ports, it is logical to make those ports default
 to RA allowed while defaulting to not allowing RAs from other ports
 by default.

Some people do not want switches making IP address assignments. That's
all. :-)

- - ferg

- -- 
Paul Ferguson
PGP Public Key ID: 0x54DC85B2

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iF4EAREIAAYFAlLLHpMACgkQKJasdVTchbL6+gEApBli/t4RF4Eq3XroJkqrRmgn
9WYSy2ReVwo7Bx9l+PMA/16zyzwOgG4fdNc9zgt0A4Pb+dGpMBx8LkRY6Kj71F5t
=J8uY
-END PGP SIGNATURE-



Re: Comcast/Level3 issues

2014-01-06 Thread Paul WALL
Kevin,

Thank you for the info.  Can you say how many quarters or years until
Comcast is resolved?

I've seen references to that obscure whitepaper (co-authored,
ironically, by Patrick Gilmore) before on the broadbandreports forums,
by someone with a lot of knowledge on Comcast's network and internal
politics/peering discussions.  Do you know who the poster is?

https://encrypted.google.com/search?q=28619103+dslreports+site:www.dslreports.combiw=1000bih=1000

Drive Slow,
Paul WALL

On Sun, Jan 5, 2014 at 6:17 PM, McElearney, Kevin
kevin_mcelear...@cable.comcast.com wrote:
 FWIW, we work with each issue and try to fix them as best we can.  Several
 are underway.  Much of the ³traffic shifting² is happening external to
 Comcast with very large traffic swings congesting AND uncongesting paths.
 The beauty of adaptive routing via CDN and text book ³Creating Incentives
 to Peer² - feel free to google that...

 - Kevin

 On 1/5/14, 1:22 AM, Paul WALL pauldotw...@gmail.com wrote:

The people pushing this policy are not without a face and name.  They read
this mailing list, and attend our conferences.  You'll want to talk to
John
Schanz, Kevin McElearney, and Barry Tishgart.

Drive Slow (like a Comcast peering port),
Paul Wall


On Fri, Jan 3, 2014 at 10:55 AM, Scott Berkman sc...@sberkman.net wrote:

 Comcast having saturated links to other providers is a common and
 frequently discussed issue.  Here is one previous NANOG thread on the
topic:

 http://mailman.nanog.org/pipermail/nanog/2010-December/029251.html

 And a related article:
 http://www.dslreports.com/shownews/Claims-Resurface-
 Concerning-Congested-Comcast-TATA-Links-111818

 There are debates back and forth on the validity of the graphs from the
 NANOG post, but it is a fact that at that time Comcast was heavily
 pre-pending their Level BGP advertisements to force traffic over to
Tata,
 and many many people noticed congestion at those links in a variety of
 markets.

 I wish you luck, but my personal opinion is that your fastest resolution
 would be to move to another provider.  Comcast is a residential ISP that
 lives on extreme over-subscription and not actually being able to
deliver
 what customers believe they have. You'll notice a lot of recent news
about
 increased and more strict data caps for their subscribers, and that is
the
 only thing they will likely be doing to relieve these types of recurring
 issues.

   -Scott



 On 01/02/2014 11:18 PM, R W wrote:

 I'm seeing the same as well. Can anyone from Comcast/Level(3) reach out
 to me or provide comment. We're seeing heavy jitter and some packet
loss
 most noticeable in NYC area connections between Level(3) and Comcast.
 -Rob

  Date: Tue, 31 Dec 2013 09:45:00 -0800
 Subject: Comcast/Level3 issues
 From: dwh...@gmail.com
 To: nanog@nanog.org

 Looking for a networking contact at comcast and/or level3.  I've been
 having some slow speed issues with hitting some sites that's going
 through
 level3 and I think there might be some congestion.

 Doug









Re: turning on comcast v6

2014-01-06 Thread Owen DeLong

On Jan 6, 2014, at 13:22 , Paul Ferguson fergdawgs...@mykolab.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256
 
 On 1/6/2014 1:08 PM, Owen DeLong wrote:
 
 The port isn't particularly trusted, but it is allowed to send RAs
 which are forwarded to the network by default. Obviously a sane
 switch would allow this configuration to be changed. We're not
 talking about the security model for a network, we're talking about
 the default behavior of a switch.
 
 Defaults are, inherently guesses to some extent. Nonetheless, a
 switch must have some default behavior.
 
 It seems to me that in the case of switches which have otherwise
 designated uplink ports, it is logical to make those ports default
 to RA allowed while defaulting to not allowing RAs from other ports
 by default.
 
 Some people do not want switches making IP address assignments. That's
 all. :-)
 

Huh???

I don't think I said anything even remotely like that.

Owen




Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Randy Bush
 A little bit overkill in term of number of ports but you can consider
 the new Trident 2 switches Juniper EX-5100, Cisco Nexus 3100 .
 They have unified TCAM that can store 128K v4 routes

the nice thing about buying bgp devices that can not hold a full table
is that you can expense them in the year of purchase as opposed to
amortizing them over 5 years or so.

randy

pgpPLsvpMF7Lh.pgp
Description: PGP signature


Re: Comcast/Level3 issues

2014-01-06 Thread McElearney, Kevin
³Paul²,

I don¹t read this list often, and rarely have seen a private message
reposted as you did, but at the risk of DFTT, give me some time to think
through a discussion topic for this list which touches on some of these
issues.

- Kevin

DISCLOSURE: On DSLR, I am ccneteng when I visit there.
http://www.dslreports.com/profile?find=ccneteng





Re: Open source hardware

2014-01-06 Thread TGLASSEY
Arnd - the German Government is most likely a partner meaning 
overloading the NSA is pointless if you could.


Todd

On 1/5/2014 1:15 AM, Arnd Vehling wrote:

Hi,

On 04.01.2014 21:07, Daniël W. Crompton wrote:

To my surprise I am seeing a theme fatalistic acceptance in this thread,


thats not really suprising. Then most poeple dont understand the 
implications this has.



A number have mentioned that if you are targeted there is little you can
do, and this is something that I agree with to a certain extent.


Here i agree too. But i think it should be in possible to overload 
them by mass-creating fake data and honey pots. They dont have endless 
resources especially when it comes to decrypting. So, if just 10% of 
the aware persons start firing up NSA honeypots they get a 
resource problem and will fail at selecting targets.


// Arnd





--
-

Personal Email - Disclaimers Apply