Re: VDSL

2019-10-18 Thread Colton Conor
We bond 8 VDSL2 pairs together, so getting 500Mbps is easily possible if
they are close to the DSLAM.

On Fri, Oct 18, 2019 at 5:28 PM Ryland Kremeier 
wrote:

> We provide between 250Mb/s and 1Gb/s fiber-to-the-home services to all our
> subscribers. We do not use VDSL.
>
> I personally do not have our services in my area yet as I live at the
> furthest possible point to which we will expand. So until then I use
> Centurylink.
>
>
>
> *From:* Matt Harris 
> *Sent:* Friday, October 18, 2019 9:08 AM
> *To:* Ryland Kremeier 
> *Cc:* Rod Beck ; Nanog@nanog.org
> *Subject:* Re: VDSL
>
>
>
> On Fri, Oct 18, 2019 at 8:46 AM Ryland Kremeier <
> rkreme...@barryelectric.com> wrote:
>
> Can confirm. Currently on VDSL in rural Missouri, speed is capped at
> 5Mb/s, but has the capability of 7.5Mb/s. All customers from the provider
> here are on VDSL.
>
>
>
> I'm guessing from your email address that you get that from your electric
> coop, too? At the state fair a couple of months ago, I had the opportunity
> to speak to the guy who architected and implemented the FTTH rollout for
> Ralls County electric coop, up north of StL along the IL border. They did,
> from what I could tell from my conversation, everything right and were
> providing gigabit services to their users even in relatively rural areas.
> Hopefully you guys will get something like that going at some point soon as
> well!
>
>
>


RE: VDSL

2019-10-18 Thread Ryland Kremeier
We provide between 250Mb/s and 1Gb/s fiber-to-the-home services to all our 
subscribers. We do not use VDSL.
I personally do not have our services in my area yet as I live at the furthest 
possible point to which we will expand. So until then I use Centurylink.

From: Matt Harris 
Sent: Friday, October 18, 2019 9:08 AM
To: Ryland Kremeier 
Cc: Rod Beck ; Nanog@nanog.org
Subject: Re: VDSL

On Fri, Oct 18, 2019 at 8:46 AM Ryland Kremeier 
mailto:rkreme...@barryelectric.com>> wrote:
Can confirm. Currently on VDSL in rural Missouri, speed is capped at 5Mb/s, but 
has the capability of 7.5Mb/s. All customers from the provider here are on VDSL.

I'm guessing from your email address that you get that from your electric coop, 
too? At the state fair a couple of months ago, I had the opportunity to speak 
to the guy who architected and implemented the FTTH rollout for Ralls County 
electric coop, up north of StL along the IL border. They did, from what I could 
tell from my conversation, everything right and were providing gigabit services 
to their users even in relatively rural areas. Hopefully you guys will get 
something like that going at some point soon as well!



RE: VDSL

2019-10-18 Thread Ryland Kremeier
Can confirm. Currently on VDSL in rural Missouri, speed is capped at 5Mb/s, but 
has the capability of 7.5Mb/s. All customers from the provider here are on VDSL.

From: NANOG  On Behalf Of Matt Harris
Sent: Tuesday, October 15, 2019 12:38 PM
To: Rod Beck 
Cc: Nanog@nanog.org
Subject: Re: VDSL

On Tue, Oct 15, 2019 at 12:25 PM Rod Beck 
mailto:rod.b...@unitedcablecompany.com>> wrote:
Hi,

I discovered that the Budapest cable company was using VDLS to provide services 
up to 500 megs into the buildings where my flats are located. VDSL is a pretty 
old standard. I recollect people talking about it back in 1998.

Is it being heavily deployed in Last Mile networks state side?

Hey Rod,
Are you sure they're using VDSL (I'm assuming you mean VDSL2 which is still in 
fairly wide use around the world)? 500mbit VDSL2 would have a very short run 
limitation afaik. It wouldn't be last mile, more like last meter. :)

It's not super-widely used in the US today since Verizon and others have built 
out increasing FTTH networks and always had to compete with DOCSIS based 
services which are very widespread here, though I wouldn't be surprised if it 
was still frequently the "better than satellite!" service available in some 
rural areas that aren't too hard to reach with cabling. A decade ago, you 
would've seen a lot more VDSL2 deployments here in the US, though usually no 
more than 25 or 50 mbit capacity for the end-user.

https://en.wikipedia.org/wiki/List_of_VDSL_and_VDSL2_deployments has a bunch of 
interesting details though I can attest to some of them being fairly out of 
date.



Re: Request comment: list of IPs to block outbound

2019-10-18 Thread Lukas Tribus
Hello,

On Fri, Oct 18, 2019 at 7:40 PM Saku Ytti  wrote:
> It's interesting to also think, when is good time to break things.
>
> CustomerA buys transit from ProviderB and ProviderA
>
> CustomerA gets new prefix, but does not appropriately register it.
>
> ProviderB doesn't filter anything, so it works. ProviderA does filter
> and does not accept this new prefix. Neither Provider has ACL.
>
>
> Some time passes, and ProviderB connection goes down, the new prefix,
> which is now old prefix experiences total outage. CustomerA is not
> happy.
>
>
> Would it have been better, if ProviderA would have ACLd the traffic
> from CustomerA? Forcing the problem to be evident when the prefix is
> young and not in production. Or was it better that it broke later on?

That's an orthogonal problem and it's solution hopefully doesn't
require a traffic impacting ingress ACL.

I'm saying this breaks valid configurations because even with textbook
IRR registrations there is a race condition between the IRR
registration (not a route-object, but a new AS in the AS-MACRO), the
ACL update and the BGP turn-up of a new customer (on AS further down).


Here's a environment for the examples below:

Customer C1 uses existing transits Provider P11 and P12 (meaning C1 is
actually a production network; dropping traffic sourced by it in the
DFZ is very bad; P11 and P12 is otherwise irrelevant).
Customer C1 is about to turn-up a BGP session to Provider P13.
Provider P13 is a Tier2 and buys transit from Tier1 Providers P1 and P2
Provider P2 deploys ingress ACLs depending on IRR data, based on P13's AS-MACRO.


Example 1:

P13's AS-MACRO is updated last-minute because:

- provisioning was last minute OR
- provisioning was wrong initially OR
- it's an emergency turn-up
- whatever the case IRR records are corrected only 60 minutes before the turn up
- and C1 is aware traffic towards C1 will completely converge only
after additional 24 hours (but that's accepted, because $reasons;
maybe C1 just needs TX bandwidth - in a hypothetical emergency turn-up
for example)

At the turn-up of C1_P13, traffic with as-path C1_P13_P2 is dropped,
because the ingress ACL at P2 wasn't updated yet (updated only once
every night). P13 expected prefixes not getting accepted at P2 on the
BGP session, but never would have imagined that traffic sourced from
valid prefixes present in the DFZ would be dropped.


Example 2:

Just as in example 1, C1 turns up BGP with P13, but the provisoning
was "normal". P13 AS-MACRO was updated correctly 36 hours before the
turn-up.

However, at P2 the nightly cronjob for IRR updates (prefix-lists and
ACL ingress filters) failed. It's is monitored and a ticket about the
failing cronjob was raised, however they either:

- the did not recognize the severity, because "worst-case some new
prefixes are not allowed in ingress tomorrow"
- where unable to fix it in just a few hours
- did fix it, but did not trigger a subsequent full rerun ("it will
run next time", or "it could not complete anyway before the next run")
- maybe the node was actually just unreachable for a regular
maintenance, so automation could not connect this time around
- or maybe automation just couldn't connect to the $node, because
someone regenerated the SSH key by mistake this morning

Whatever the case, the point is: for internal problems at P2, the ACL
wasn't updated during the night like it usually does. And at turn-up
of C1_P13, C1_P13_P2 traffic is again dropped on the floor.



When you reject a BGP prefix, you don't blackhole traffic, with an
ingress ACL you do. That is a big difference and because of this, you
*but more importantly every single downstream ASN* need to account for
race conditions and failures in the entire process, that includes the
immediate resolution thereof, which is not required for BGP strict
prefix-lists and uRPF loose mode.


Is this deployed like this in a production transit network? How does
this network handle a failure like in example 2? How does it
downstream customers handle the race conditions like in example 1?


For the record: I'm imagining myself operating P13 getting blamed in
both examples for partially blackholing C1's traffic at the turn-up.



Thanks,
Lukas


Re: Request comment: list of IPs to block outbound

2019-10-18 Thread Lukas Tribus
Hello!

On Tue, Oct 15, 2019 at 12:46 PM Saku Ytti  wrote:
>
> On Mon, 14 Oct 2019 at 09:30, Vincent Bernat  wrote:
>
> > How much performance impact should we expect with uRPF?
>
> Depends on the platform, but often it's 2nd lookup. So potentially 50%
> decrease in performance. Some platforms it means FIB duplication. And
> ultimately it doesn't really offer anything over ACL, which is, in
> comparison, much cheaper feature.
> I would encourage people to toolise this, then the ACL generation is
> no cost or complexity. And you can use ACL for many BGP customers too,
> as you create 'perfect' prefix-list for customer, you can reference to
> same prefix-list in ACL, without actually needing customer to announce
> that prefix, as it's entirely valid to originate traffic from
> allowable prefix without advertising the prefix (to you).

This has the potential to brake things, because it requires symmetry
and perfect IRR accuracy. Just because the prefix would be rejected by
BGP does not mean there is not a legitimate announcement for it in the
DFZ (which is the exact difference between uRPF loose mode and the ACL
approach).

For BGP customers where I control the announced IP space (it's mine,
the customer has a private ASN and the only reason for BGP is so he
can multi-home to different nodes of my network), sure.

For real "IP Transit" where the customers may itself have multiple
downstream ASNs, there is no guarantee that everyone in the chain will
update the IRR records 24 - 48 hours before actually sourcing traffic
from a new prefix (or enabling that new downstream as-path). Some
other transit may just allow prefixes "manually" (for example, because
of LOA's or inetnum objects, as opposed to route objects), so *a valid
announcement is in the DFZ*, you are just not accepting it on your
customers BGP session.

In fact, maybe my downstream customer just wants to send traffic to my
network, but not receive any, so I don't actually have to include that
customer in my AS-macro (an exotic use-case for sure, just trying to
point out that there will always be asymmetry).

Routing, BGP and the IRR data is asymmetric by definition and neither
real-time nor 100% accurate. That's not a problem for BGP and strict
ingress prefix-lists, but it is a problem for ingress ACL'ing, because
the latter effectively blackholes traffic, while uRPF loose mode does
not (if there is a announcement for it in the DFZ).

So I don't think ACL's can replace uRPF loose mode in the DFZ and
frankly I find this proposal to be a bit dangerous.


If my transit provider would do this without telling me, I'm turning
up a new transit customer with an incomplete IRR record, causing an
immediate partial outage for them, I would be *very* surprised (along
with some other emotions).


cheers,
lukas


Re: Request comment: list of IPs to block outbound

2019-10-18 Thread Chris Jones


> On 19 Oct 2019, at 04:42, Saku Ytti  wrote:
> 
> On Fri, 18 Oct 2019 at 20:15, Lukas Tribus  wrote:
> 
>> This has the potential to brake things, because it requires symmetry
>> and perfect IRR accuracy. Just because the prefix would be rejected by
>> BGP does not mean there is not a legitimate announcement for it in the
>> DFZ (which is the exact difference between uRPF loose mode and the ACL
>> approach).
> 
> It's interesting to also think, when is good time to break things.
> 
> CustomerA buys transit from ProviderB and ProviderA
> 
> CustomerA gets new prefix, but does not appropriately register it.
> 
> ProviderB doesn't filter anything, so it works. ProviderA does filter
> and does not accept this new prefix. Neither Provider has ACL.
> 
> 
> Some time passes, and ProviderB connection goes down, the new prefix,
> which is now old prefix experiences total outage. CustomerA is not
> happy.
> 
> 
> Would it have been better, if ProviderA would have ACLd the traffic
> from CustomerA? Forcing the problem to be evident when the prefix is
> young and not in production. Or was it better that it broke later on?

Having been through this exact situation recently (made worse by the fact that 
it was caused by provider b’s upstreams not having updated their filters and 
not provider b itself), I would suggest its 100 times better for it to happen 
right at the start rather than randomly down the track

> 
> -- 
>  ++ytti


Weekly Routing Table Report

2019-10-18 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith .

Routing Table Report   04:00 +10GMT Sat 19 Oct, 2019

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  779749
Prefixes after maximum aggregation (per Origin AS):  297110
Deaggregation factor:  2.62
Unique aggregates announced (without unneeded subnets):  374872
Total ASes present in the Internet Routing Table: 65913
Prefixes per ASN: 11.83
Origin-only ASes present in the Internet Routing Table:   56659
Origin ASes announcing only one prefix:   24237
Transit ASes present in the Internet Routing Table:9254
Transit-only ASes present in the Internet Routing Table:277
Average AS path length visible in the Internet Routing Table:   4.5
Max AS path length visible:  42
Max AS path prepend of ASN ( 27978)  31
Prefixes from unregistered ASNs in the Routing Table:30
Number of instances of unregistered ASNs:30
Number of 32-bit ASNs allocated by the RIRs:  29125
Number of 32-bit ASNs visible in the Routing Table:   23851
Prefixes from 32-bit ASNs in the Routing Table:  108145
Number of bogon 32-bit ASNs visible in the Routing Table:16
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:323
Number of addresses announced to Internet:   2841942656
Equivalent to 169 /8s, 100 /16s and 154 /24s
Percentage of available address space announced:   76.8
Percentage of allocated address space announced:   76.8
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   99.4
Total number of prefixes smaller than registry allocations:  260164

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   209506
Total APNIC prefixes after maximum aggregation:   60778
APNIC Deaggregation factor:3.45
Prefixes being announced from the APNIC address blocks:  203864
Unique aggregates announced from the APNIC address blocks:84786
APNIC Region origin ASes present in the Internet Routing Table:   10095
APNIC Prefixes per ASN:   20.19
APNIC Region origin ASes announcing only one prefix:   2808
APNIC Region transit ASes present in the Internet Routing Table:   1506
Average APNIC Region AS path length visible:4.6
Max APNIC Region AS path length visible: 25
Number of APNIC region 32-bit ASNs visible in the Routing Table:   5126
Number of APNIC addresses announced to Internet:  771040896
Equivalent to 45 /8s, 245 /16s and 38 /24s
APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-64098, 64297-64395, 131072-141625
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:229089
Total ARIN prefixes after maximum aggregation:   106880
ARIN Deaggregation factor: 2.14
Prefixes being announced from the ARIN address blocks:   227231
Unique aggregates announced from the ARIN address blocks:108281
ARIN Region origin ASes present in the Internet Routing Table:18626
ARIN Prefixes per ASN:12.20
ARIN 

Re: Request comment: list of IPs to block outbound

2019-10-18 Thread Saku Ytti
On Fri, 18 Oct 2019 at 20:15, Lukas Tribus  wrote:

> This has the potential to brake things, because it requires symmetry
> and perfect IRR accuracy. Just because the prefix would be rejected by
> BGP does not mean there is not a legitimate announcement for it in the
> DFZ (which is the exact difference between uRPF loose mode and the ACL
> approach).

It's interesting to also think, when is good time to break things.

CustomerA buys transit from ProviderB and ProviderA

CustomerA gets new prefix, but does not appropriately register it.

ProviderB doesn't filter anything, so it works. ProviderA does filter
and does not accept this new prefix. Neither Provider has ACL.


Some time passes, and ProviderB connection goes down, the new prefix,
which is now old prefix experiences total outage. CustomerA is not
happy.


Would it have been better, if ProviderA would have ACLd the traffic
from CustomerA? Forcing the problem to be evident when the prefix is
young and not in production. Or was it better that it broke later on?


-- 
  ++ytti


Re: Best components for a full mvno core network?

2019-10-18 Thread Javier J
This is interesting but so many variables to unpack to determin what the
right solution is. What are the main goals of your org? What exact pain
points are you trying to fix?



On Wed, Oct 16, 2019, 8:28 AM Dario Renaud  wrote:

> Hello,
>
> At my day job, we are considering going Full MVNO. Which means building a
> mobile core network.
>
> I was wondering if some of you would have feedback or advices on the
> solutions currently available?
>
> We would like to avoid the big providers (Ericsson & such).
> Ideally, something opensource, or, if proprietary, a company maybe willing
> to license access to the code (one can dream).
>
> There seems to be a lot of bits and pieces available out there, with a mix
> of full, fullish or partial solutions. This makes for quite the puzzle.
>
> Among the ones I found most interesting:
>
> nextEPC, covering, well, the EPC… (https://github.com/nextepc/nextepc).
> It looks like the more active open EPC implementation out there.
>
> And it seems that Yate people have a commercial product covering basically
> everything needed (
> https://yatebts.com/solutions_and_technology/mobile_virtual_network_operator/).
>
>
> What do you think?
>
> Regards
>
> Dario Renaud
>


Re: VDSL

2019-10-18 Thread Matt Harris
On Fri, Oct 18, 2019 at 8:46 AM Ryland Kremeier 
wrote:

> Can confirm. Currently on VDSL in rural Missouri, speed is capped at
> 5Mb/s, but has the capability of 7.5Mb/s. All customers from the provider
> here are on VDSL.
>

I'm guessing from your email address that you get that from your electric
coop, too? At the state fair a couple of months ago, I had the opportunity
to speak to the guy who architected and implemented the FTTH rollout for
Ralls County electric coop, up north of StL along the IL border. They did,
from what I could tell from my conversation, everything right and were
providing gigabit services to their users even in relatively rural areas.
Hopefully you guys will get something like that going at some point soon as
well!


Re: Friendly contact at Comcast about possible RF leaks

2019-10-18 Thread Christopher Morrow
In the general case, I think, the FCC's enforcement branch actually
takes care of being a clearinghouse for this sort of problem...
according to my friend who used to do this for the FCC anyway.

On Fri, Oct 18, 2019 at 1:32 AM Brandon Martin  wrote:
>
> On 9/30/19 10:38 PM, Brandon Martin wrote:
> > Anyone know a friendly contact at Comcast regarding possible RF leaks on 
> > their HFC plant?  I'm not a Comcast customer, so I can't get in via front 
> > line support (not that it would probably do me much good, anyway), and I'm 
> > not looking to lodge a formal complaint or anything.  I just want to give a 
> > heads-up about some issues I've noticed locally that haven't been addressed 
> > for a while and hopefully let things get addressed.
> >
> > I'm in Central Indiana, if anyone wants to try to route me directly to the 
> > right people.  A general contact is fine, too.
>
> This has been taken care of and the leak apparently corrected.  Thanks for 
> all those who reached out to me!
> --
> Brandon Martin


RE: Viability of GNS3 network simulation for testing features/configurations.

2019-10-18 Thread adamv0025
> problem I've run into is our IOS isn't supported

Not sure what you mean, like you can’t find the same exact version of IOS XRv 
9000?

Surely going with similar XRv version to your production one would be much 
closer than going with IOSv

 

adam 

 

From: NANOG  On Behalf Of rylandkremeier
Sent: Wednesday, October 16, 2019 6:12 PM
To: Yan Filyurin ; Jason Kuehl 
Cc:  
Subject: Re: Viability of GNS3 network simulation for testing 
features/configurations.

 

We have 9 ASR's so I don't think it would be too hard to host them in the GNS3 
vm insurance we're using. The main problem I've run into is our IOS isn't 
supported, which is where Cisco IOSv comes in, hoping it could be configured in 
a way to act very closely like our deployed hardware. 

 

I'm not so much worried about hardware faults, more so network configurations 
and testing of new methods. In a perfect world I would be able to copy the 
running configs from deployed hardware into GNS3. At least that's how closely I 
would like GNS3 running. 

 

Not a ton of info out there on IOSv, so I'm curious as to how it's configured. 
If it's the "universal" IOS that I would imagine it should be, then it could 
work. 

 

Thanks for the links, those are both things I didn't run across during initial 
research.

 

-- 

Ryland Kremeier



RE: Viability of GNS3 network simulation for testing features/configurations.

2019-10-18 Thread adamv0025
> From: Saku Ytti 
> Sent: Thursday, October 17, 2019 3:41 PM
> 
> On Thu, 17 Oct 2019 at 15:15,  wrote:
> 
> > But as you can see A) and B) can easily be tested with a single DUT (or some
> small topology around it) using actual HW plugged in a loop with IXIA/Spirent
> testers.
> 
> Snake topology does conserve IXIA/Spirent ports but will not allow you to
> test everything. I see no practical way of just having bunch of IXIA/Spirent
> ports to verify behaviour under various types of congestion. Unfortunately
> the 'bunch' is getting rather large, since even the smallest atom of a modern
> networking chip may contain dozens of 100GE ports.
> 
More IXIA/Spirent ports is your answer we use the "dumb" IXIA cards for NPU/PFE 
and fabric fairness testing as those are much cheaper.

adam 



Re: Friendly contact at Comcast about possible RF leaks

2019-10-18 Thread Brandon Martin
On 9/30/19 10:38 PM, Brandon Martin wrote:
> Anyone know a friendly contact at Comcast regarding possible RF leaks on 
> their HFC plant?  I'm not a Comcast customer, so I can't get in via front 
> line support (not that it would probably do me much good, anyway), and I'm 
> not looking to lodge a formal complaint or anything.  I just want to give a 
> heads-up about some issues I've noticed locally that haven't been addressed 
> for a while and hopefully let things get addressed.
> 
> I'm in Central Indiana, if anyone wants to try to route me directly to the 
> right people.  A general contact is fine, too.

This has been taken care of and the leak apparently corrected.  Thanks for all 
those who reached out to me!
-- 
Brandon Martin


Re: asymmetric routing issue on microsoft torix ix

2019-10-18 Thread Randy Bush
>> So you are left with your regular inbound influence bag of tricks,
>> e.g. prepending towards Shaw.
> 
> the primary inbound steering tool is selective advertisement of
> sub-prefixes
> 
> i was shocked that the prepending presentation at ripe79 was blind to
> this

btw the ripe79 preso,
https://ripe79.ripe.net/wp-content/uploads/presentations/64-prepending_madory2.pdf,
did a good job of showing how prepending presents an attack surface.

randy