Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 06:51, Saku Ytti wrote:

>  Every HW designer
> has sighed in relief when I've said I don't care about it, because
> it's also very HW unfriendly, like IPv6 generally. Unfortunately SRv6
> is somewhat easy to market with the whole 'it's simple, just IP'
> spiel.

Mine have sighed in disbelief that I don't share their vision of an
SR(v6) world :-).

What's funny is that the ASR920 does not support SRv6, which I think is
more due to hardware limitations than a lack of coding kiddies.
Conversely, you don't need new bits of hardware to support LDPv6.

Today, there is no box that supports LDPv4 that cannot support LDPv6, by
just extending the code. No further hardware needed.

Instead, I'm being asked to "upgrade" to the NCS540 so that I can get
LDPv6. You, sometimes, have to wonder in what world these folk live.

It's a Coronavirus era now - people want to hold on to all the $$ they
don't have, and only spend it where they will extract the most value.
Boeing and Airbus are struggling to reach customers that have pending
deliveries; now isn't the time for vendors to posture. We need value,
not product.

Mark.



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 10:37, Mark Tinka  wrote:

> Mine have sighed in disbelief that I don't share their vision of an
> SR(v6) world :-).

I don't like to conflate these two; SR is great, SRv6 is horrible
abomination. SR is what MPLS should have been day1, but it probably
was easier to market LDP than to say 'we need to change all IGP
protocols'.

-- 
  ++ytti


Re: LDPv6 Census Check

2020-06-11 Thread Radu-Adrian Feurdean
On Wed, Jun 10, 2020, at 20:51, Mark Tinka wrote:
> Well, according to them, SRv6 is winning customers over, and nobody
> wants LDPv6. Then again, they have LDPv6 in IOS XR; figures.

Well, given their (Cisco's) braindead policy regarding non-implementation of 
LDPv6 on XE, no wonder people are looking for alternatives, and SRv6 is one of 
them. And don't forget SRv6 is also heavily associated (marketing-wise) with 
5G

Back to our friends and their policy: It happens that in certain regions of the 
world, if you want to be an ISP other than the "establishment" (== incumbent + 
"first alternatives" that started 20-25 years ago), you MUST have LNS (if you 
want to stay in business). If like many, you are kind of stuck with Cisco 
because it's Cisco, the only decent solution to have LNS is ASR1K (running XE). 
Also add ASR920 which has a number of uses. Also, in order to stay in business, 
you may want to offer L3VPN services, which brings you to doing MPLS. You say 
MPLS, you say LDP, and there you go, your backbone remains v4-based for the 
next eternity.

There also seems to be a lack of global vision. Tyry to ask your favourite 
vendor what do you need in order to be able to offer IPv4-L3VPN, IPv6-L3VPN and 
L2VPN (mainly point-to-point - NO MAC learning) over a backbone that does NOT 
use any single IPv4 address (backbone-side). Because you can do it on a 
backbone that does not use any single IPv*6* address, but you may want to go 
forwards, not backwards. Add a LNS in the mix (the v4 addresses for the LNS go 
in VRFs - that's not backbone). Add a money, rack space and power needed 
constraints in the mix. This exercise looks challenging with other vendors too, 
but with Cisco it's just impossible.

Of course, Cisco says there is no demand for one simple reason : the people 
talking with Cisco account managers (or whatever they are called) are only 
rarely those that care about technical stuff. They may want some features on 
the CPEs (like "ui uant SDWAN"), but for anything else (including backbone 
equipment) they only want lower prices. You end up with everybody having to 
deal with a specific platform in real life to dream about a specific feature, 
yet the vendor to consider that "nobody wants it".


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 09:42, Saku Ytti wrote:

>
> I don't like to conflate these two; SR is great, SRv6 is horrible
> abomination. SR is what MPLS should have been day1, but it probably
> was easier to market LDP than to say 'we need to change all IGP
> protocols'.

Fair point.

Mark.


RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> Mark Tinka
> Sent: Wednesday, June 10, 2020 6:19 PM
> 
> Hi all.
> 
> Just want to sample the room and find out if anyone here - especially
those
> running an LDP-based BGPv4-free core (or something close to it) - would be
> interested in LDPv6, in order to achieve the same for BGPv6?
> 
> A discussion I've been having with Cisco on the matter is that they do not
> "see any demand" for LDPv6, and thus, won't develop it (on IOS XE).
> Meanwhile, it is actively developed, supported and maintained on IOS XR
> since 5.3.0, with new features being added to it as currently as 7.1.1.
> 
> Needless to say, a bunch of other vendors have been supporting it for a
> while now - Juniper, Nokia/ALU, Huawei, even HP.
> 
> IOS XR supporting LDPv6 notwithstanding, Cisco's argument is that "the
> world" is heavily focused on deploying SRv6 (Segment Routing). While I
know
> of one or two questionable deployments, I'm not entirely sure much of the
> world is clamouring to deploy SR, based on all the polls we've done at
various
> NOG meetings and within the general list-based operator community
> 
> So I just wanted to hear from this operator community on whether you
> would be interested in having LDPv6 support to go alongside your LDPv4
> deployments, especially if you run native dual-stack backbones. Or if your
> focus is totally on SRv6. Or if you don't care either way :-). Thanks.
> 
Hey Mark,
My stance is that should I go with anything "new" for label distribution the
MPLS SR/SPRING is getting to a point where it might be mature enough.
Also "BGP free core" means internet won't talk to your core -i.e. free to
use private addressing -so no need for v6 at all in the "underlay" (as
hipsters call it these days).
Alternatively using public "infrastructure subnet" (i.e. not advertised to
the Internet) for a "BGP free core", the aim is to make money of the core
-what additional revenue stream am I getting by enabling v6 in the
underlay/management plane that would offset the pain of dealing with the
increased bug surface?  

And with regards to the XE/XR discrepancies, I mentioned my prophecy a
number of times, I think XE future in SP products portfolio is next to none.



adam 



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Nick Hilliard

Saku Ytti wrote on 11/06/2020 05:51:

Unfortunately SRv6 is somewhat easy to market with the whole 'it's
simple, just IP' spiel.
it's not "just IP": it's ipv6 with per-router push / pop operations on 
ipv6 extension headers, i.e. high touch in areas which are known to be 
deeply troublesome on hardware.


In this regard alone, the specification is problematic enough that it's 
unearthed a bug in the IPv6 standard (rfc8200).


Nick


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka


On 11/Jun/20 10:32, adamv0...@netconsultings.com wrote:

> Hey Mark,
> My stance is that should I go with anything "new" for label distribution the
> MPLS SR/SPRING is getting to a point where it might be mature enough.

"Getting to a point" doesn't really work if you are actively running a
network today :-).

While I do agree that going with the new thing is always a good plan,
one has to truly consider the overall gain vs. labour required to get there.

Going from static routing to an IGP + BGP makes sense when you scale up.

Switching from Distribute Lists to Prefix Lists makes sense when you
scale up.

Route summarization after you dump your old Cisco 2501 for an ASR9901
doesn't add value any longer.

You get the idea.

The position about not needing a label distribution protocol in SR is
actually quite sexy. But considering how powerful router control planes
are nowadays, especially when they are being virtualized on or off
chassis, I just don't see the gains expected by removing LDP and going
SR, on a box and code that supports both. Yes, if you are talking about
dumping a spaghetti of RSVP tunnels, that makes sense as there is a gain
in day-to-day network administration. But in this case, we are just
speaking about LDP.

10 years ago, we worried about how well an IP network would scale
running OSPF or IS-IS. With control planes what they are today, who
really cares anymore? You may recall we've been running CSR1000v for
route reflection since 2014 - millions of routes being carried everyday,
converging in seconds. We've never had to think about those boxes until
last year when we did the server hardware refresh as a matter of course,
not because anything was struggling.

What I'm saying is not all new tech. NEEDS to get deployed just because
it's new. If that was the case, we'd all be running Inter-AS DSCP over
IPoDWDM :-).


> Also "BGP free core" means internet won't talk to your core -i.e. free to
> use private addressing -so no need for v6 at all in the "underlay" (as
> hipsters call it these days).

Careful with that one - Cisco's proposal to me was to run my IPv6
network on link-local :-). Don't encourage them, hehe.


> Alternatively using public "infrastructure subnet" (i.e. not advertised to
> the Internet) for a "BGP free core", the aim is to make money of the core
> -what additional revenue stream am I getting by enabling v6 in the
> underlay/management plane that would offset the pain of dealing with the
> increased bug surface?  

I don't know about you, but my BGP-free core is inaccessible from the
world even if it lives in public-IPv4 land. That's how pure MPLS
forwarding works. You'd have be "inside" to reach it (IGP).

Also, if you link every feature to a revenue stream, you'll never deploy
RPKI or DNSSEC :-).


>
> And with regards to the XE/XR discrepancies, I mentioned my prophecy a
> number of times, I think XE future in SP products portfolio is next to none.

Which is fine - but customers are spending real money and need to keep
real networks running with real costs for real years. If Cisco want to
kick IOS XE to the side, let customers know so we can make informed
decisions about where to purchase gear.

The current state-of-the-art is that kit you buy today is probably good
years after standard depreciation policies, probably longer. If Cisco's
model is to throw boxes away sooner than that like they did in the old
days, that is not consistent with where the tech. has gotten to in the
past 2 decades.

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 09:58, Radu-Adrian FEURDEAN wrote:

> Well, given their (Cisco's) braindead policy regarding non-implementation of 
> LDPv6 on XE, no wonder people are looking for alternatives, and SRv6 is one 
> of them.

Which doesn't track because there are a number of IOS XE boxes that do
not support SRv6, and probably never will. Meanwhile, no issue with
those boxes supporting LDPv6, as they already support LDPv4.


>  And don't forget SRv6 is also heavily associated (marketing-wise) with 5G

Well, we all know the farce that is 5G.

Also, not all of us run mobile networks, and even for those that do,
there are probably a few that don't buy into the snake oil, especially
those that offer native IPv6 to their mobile customers :-).


> Back to our friends and their policy: It happens that in certain regions of 
> the world, if you want to be an ISP other than the "establishment" (== 
> incumbent + "first alternatives" that started 20-25 years ago), you MUST have 
> LNS (if you want to stay in business). If like many, you are kind of stuck 
> with Cisco because it's Cisco, the only decent solution to have LNS is ASR1K 
> (running XE). Also add ASR920 which has a number of uses. Also, in order to 
> stay in business, you may want to offer L3VPN services, which brings you to 
> doing MPLS. You say MPLS, you say LDP, and there you go, your backbone 
> remains v4-based for the next eternity.

Which I would understand if Cisco's strategy, as a company, was anti-LDP.

But when you have the IOS XR team actively supporting LDP and adding new
features with each major release, the split brain is obvious. You can't
come to me under a "unified" organizational banner, and then tell me you
are a-thousand companies internally. If you choose to fork code into
IOS, IOS XE, IOS XR, NX OS, or whatever new flavour of the decade, don't
make that my problem. Customers don't buy code; they buy boxes that are
built for the task. The code that comes with it is the code that comes
with it.

Moreover, IOS XE also has its own split BU's. So getting IOS XE fixed
for the ASR920 doesn't necessarily mean you get it fixed for the
ASR1000. I mean, how much more complicated does a business have to be?


>
> There also seems to be a lack of global vision. Tyry to ask your favourite 
> vendor what do you need in order to be able to offer IPv4-L3VPN, IPv6-L3VPN 
> and L2VPN (mainly point-to-point - NO MAC learning) over a backbone that does 
> NOT use any single IPv4 address (backbone-side). Because you can do it on a 
> backbone that does not use any single IPv*6* address, but you may want to go 
> forwards, not backwards. Add a LNS in the mix (the v4 addresses for the LNS 
> go in VRFs - that's not backbone). Add a money, rack space and power needed 
> constraints in the mix. This exercise looks challenging with other vendors 
> too, but with Cisco it's just impossible.

That's because it's not about l3vpn6 or l2vpn6; it's about IPv6. And you
can't business-case IPv6.

Some vendors fail to understand that IPv6 is not the money-maker. IPv6
is what attracts the customer to the network so that the money can flow.
It's a means to an end, not the end in itself.


>
> Of course, Cisco says there is no demand for one simple reason : the people 
> talking with Cisco account managers (or whatever they are called) are only 
> rarely those that care about technical stuff. They may want some features on 
> the CPEs (like "ui uant SDWAN"), but for anything else (including backbone 
> equipment) they only want lower prices. You end up with everybody having to 
> deal with a specific platform in real life to dream about a specific feature, 
> yet the vendor to consider that "nobody wants it".

One of the reasons I've never been keen on working for a vendor is
tunnel vision becomes easy. As an operator, you have a much wider view
of what's happening in the real world. When a vendor decides to home-in
on EoMPLS and VPLS being better signaled by LDP vs. BGP, you end up with
situations where they track user-demand through the number of TAC cases
the feature caused. The fewer the TAC cases, the lower the demand. Very
scientific.

Nobody is going to demand LDPv6 because the over-arching problem is a
lack of IPv6 deployment at global scale. If folk don't deploy IPv6, they
will not think about LDPv6, RSVPv6, e.t.c. But to make it worse, if the
vendors keep encouraging the "big-spending" mobile operators to maintain
IPv4 by selling CGN licenses, it's kind of back-to-front, isn't it? No
operator unwilling to deploy IPv6 but favours CGN is ever going to ask a
vendor about LDPv6, especially if the vendor is in charge of building
and operating that backbone as a "professional, managed service".

Ultimately, we are not asking for an ASIC re-spin. We are not asking for
a doubling of forwarding capacity. We are not asking for a greener
chassis. We are not asking for 100Gbps ports. All of which are
physically impossible. We are asking for LDP to extended to support
IP

Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Nick Hilliard

Mark Tinka wrote on 11/06/2020 10:48:

We are asking for LDP to extended to support IPv6. Really, how hard
is that?

Nearly impossible, apparently.

It would require a change of mindset.

Nick


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 11:58, Nick Hilliard wrote:

> Nearly impossible, apparently.
>
> It would require a change of mindset.

I'll leave that to the Coronavirus - it will open eyes.

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka


On 11/Jun/20 11:57, Robert Raszuk wrote:

>
> Nope that was not the main reason. 
>
> Main reason was the belief that labels MUST be locally significant -
> and not domain wide unique. Just look at Juniper's SRm6 or now SRH ...
> they keep this notion of locally significant SIDs. It is deep in their
> DNA ... still. 
>
> We argued about it a lot in cisco back in TDP days - and we lost.

I get this for VLAN's, being only 4,096 per broadcast domain and all.

But are we struggling with scaling label space?

Just my 1+1, since I may be over-simplifying the issue.


>
> - - -
>
> Now to your runt that MPLS is great because of exact match perhaps you
> missed it but number of solutions on the table (including RbR[**] I
> recently proposed) use exact match 4B locator based lookup in the v6
> packets to get from segment end to segment end. 
>
> On the other hand your comments about greatness of MPLS ... simplified
> data plane and depending on the hardware difference in jitter (in sub
> ms ranges - if that even matters) comes up with a lot of control plane
> complexity when you want to build a network across all continents, yet
> keep it scoped from IGP to areas or levels. No summarization in MPLS
> in FECs is something we should not sweep under the carpet.

I found multi-level IS-IS to be useless in an MPLS network because you
still need to leak routes between L2 and L1 in order to form MPLS FEC's.
So you simplify the network by having a single L2 (or just Area 0 in
OSPF), because today's control planes can handle it. And yes, some are
brave enough to run RFC 3107 if it becomes a problem, but if you can
afford to string a network together across all continents, I doubt an
x86-based control plane with 64GB of RAM is topping the list of your
problems.

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 12:57, Robert Raszuk  wrote:

> Nope that was not the main reason.
>
> Main reason was the belief that labels MUST be locally significant - and not 
> domain wide unique. Just look at Juniper's SRm6 or now SRH ... they keep this 
> notion of locally significant SIDs. It is deep in their DNA ... still.

Seems weird, because neither LDP or SR implies globally significant
labels, implementation choice. What SR does imply is a continuous
block of labels of equal size in domain.

> Now to your runt that MPLS is great because of exact match perhaps you missed 
> it but number of solutions on the table (including RbR[**] I recently 
> proposed) use exact match 4B locator based lookup in the v6 packets to get 
> from segment end to segment end.

Which is making a simple thing a complex thing.

> On the other hand your comments about greatness of MPLS ... simplified data 
> plane and depending on the hardware difference in jitter (in sub ms ranges - 
> if that even matters) comes up with a lot of control plane complexity when 
> you want to build a network across all continents, yet keep it scoped from 
> IGP to areas or levels. No summarization in MPLS in FECs is something we 
> should not sweep under the carpet.

MPLS complexity is trivial in control-plane and forwarding-plane
compared to IPV6 or SRv6 or RbR[**]. I'm not saying we can't do better
than MPLS, but the proposal here is blatantly worse.

-- 
  ++ytti


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 13:03, Drikus Brits wrote:
> We're deploying some new POPs with a mix of IOS-XR as borders, BNG and
> PEs and IOS-XE for LNSs. LDPv6 would be awesome to have availabke on
> IOS-XE alongside LDPv4. We're being pushed by Cisco to go one flavour
> or another of SR as well by Cisco, but i'd much prefer to have LDPv4 &
> LDPv6 right now.
>
> We have some buying power with Cisco at the moment, so let me know how
> I can help from the land 'down under'.

Thanks, Drikus.

If you can get your AM to get in touch with the ASR920 and ASR1000 BU's
to ask for LDPv6, that will help a great deal. Cisco are saying "no one"
is asking for LDPv6, forgetting that it's more about IPv6, than other
lower/higher-level services it can support, LDPv6 included.

As with you, they are trying to shove SRv6 down our throats, which can
only come on an NCS540 for the moment, which is odd since that runs IOS
XR, which supports LDPv6. So basically, swap out tons of boxes to get a
feature that can easily be coded for in existing hardware... makes you
wonder about the thought-process;

It's been a crazy two weeks with our Cisco AM's and the platform TME's
on heated calls about this that it's almost old testament biblical :-).
It's at the stage where it's going up the chain to the BU's who will
make the final call. So if they can get some noise from you as well, it
certainly won't hurt.

You don't need new hardware features on the ASR920 or ASR1000 to support
LDPv6. You might do for SRv6. Either way, both platforms would need both
features developed in code, and I think it's safe to assume which one
will be practically easier to build and roll-out to the entire MPLS
customer base, today.

Mark.



RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> From: Mark Tinka  
> Sent: Thursday, June 11, 2020 10:21 AM
>
>> -what additional revenue stream am I getting by enabling v6 in the
>> underlay/management plane that would offset the pain of dealing with the
>> increased bug surface?  
>
> Also, if you link every feature to a revenue stream, you'll never deploy 
> RPKI or DNSSEC :-).
>
Well RPKI or DNSSEC is at least adding a value, even something you can brag 
about to your customers (we are part of the solution not part of the problem 
etc...).

But running MPLS over IPv6 in addition to already running it over IPv4, gaining 
new functionality or features in the process that could be ultimately monetized 
in providing better service to customers? -maybe even exposing the network to a 
new set of bugs?  -I don't know, that doesn’t sound like a good use of company 
resources especially in these uncertain times . Maybe I'm being overly harsh 
here maybe if you could please explain the drivers or expected net value out of 
this exercise please?  


adam



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 14:17, adamv0...@netconsultings.com wrote:

> Well RPKI or DNSSEC is at least adding a value, even something you can brag 
> about to your customers (we are part of the solution not part of the problem 
> etc...).

Bragging doesn't bring in income, it's just PR :-).


>
> But running MPLS over IPv6 in addition to already running it over IPv4, 
> gaining new functionality or features in the process that could be ultimately 
> monetized in providing better service to customers? -maybe even exposing the 
> network to a new set of bugs?  -I don't know, that doesn’t sound like a good 
> use of company resources especially in these uncertain times . Maybe I'm 
> being overly harsh here maybe if you could please explain the drivers or 
> expected net value out of this exercise please?  

Oh dear, you sound like our Finance department now; "drivers" and "net
value" :-).

If I take your line of reasoning, deploying SRv6 likely requires new
hardware, which means $$. How much money will I charge customers for my
shiny new SRv6?

LDPv6 builds on LDPv4. Just like IPv6 builds on IPv4. At best, you can
remove BGPv6 from your core, which lowers your administration costs in
that part of the network even further, costing you less in human time
running it, resources you can otherwise re-deploy to other time- and
money-saving activities. At worst, you get IPv4/IPv6 feature parity, and
who doesn't like that :-).

And how much money did LDPv6 cost you to deploy? $0.

Mark.



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka


On 11/Jun/20 14:43, Gert Doering wrote:

>
> Not "in addition to" but "to throw out the IPv4 part" :-)

That's another view-point, yes.

There are plenty of networks that can't afford to keep buying IPv4 on
the open market. They want to go single-stack IPv6.

Today, you would need to build a 6PE network if you want MPLS support in
your IPv6-only network, which still requires IPv4. Private IPv4 address
space works, but some people like it, some don't, and more importantly,
you still carry around IPv4.

You could try the SRv6 gravy, but now you probably need new kit. What's
the SRv6 business-case? Well, one would say you save millions of $$ not
buying IPv4, but now you've spent money supporting SRv6.

LDPv6 can be supported by any platform that supports MPLS today. No
money out the door. Cisco would need to develop code for both LDPv6 and
SRv6 anyway, so no harm done on that side.

As we used to say in Vladivostok, "It's simple physics :-)".


> (If I had LDPv6 today, I wouldn't actually change the existing network
> today.  But for the next round of rebuilding things, it would be something
> to consider...)

Give your favorite Cisco AM a shout-out. I promise, they are probably
too young to remember your 6500/7600 tickets :-).

Mark.



signature.asc
Description: OpenPGP digital signature


Re: Partial vs Full tables

2020-06-11 Thread Brian Johnson



> On Jun 10, 2020, at 3:05 PM, William Herrin  wrote:
> 
> On Wed, Jun 10, 2020 at 11:20 AM Brian Johnson  
> wrote:
>> Disagree with Bill here. It will depend on the complexity of the network as 
>> to use of uRPF in any mode (loose or strict). In general, I never use uRPF 
>> on transit links and use pure filters to ensure accurate filters are in 
>> place. uRPF may be used internally in either mode to great advantage and 
>> I’ve done it both ways.
> 
> 
> Hi Brian,
> 
> Do you know and understand what you broke? It's one thing to make a
> judgement call. Quite another to wave your hands and say, "Oh well,
> nobody complained so it must be OK."
> 

Hi Bill,

I fully understand that I have not “broken” anything. If I run uRPF in loose 
mode on my internal links, I will not forward packets from a source that 
doesn’t exist in my routing tables to the rest of the internet. Just say thank 
you and we can stop this silliness.

> 
>> If you are looking for corner cases, avoid networking. I do not know of a 
>> protocol or a technique that I cannot find a corner case for.
> 
> Not sure what you're saying here. Corner cases aren't a bad thing.
> They're just the point where a technology or technique is most likely
> to break. If you want reliability, you're supposed to identify the
> corner cases and then you're supposed to game out what happens in
> those corner cases. A result will be acceptable or unacceptable and if
> it's unacceptable you don't do that. If you haven't identified and
> gamed the corner cases then (A) you can't prove your stuff is reliable
> and (B) it probably isn't.

Actually corner cases are the exception to any rule. You will never solve for 
all of the corner cases unless you have dictatorial control of the entire 
system. I can only control what I send. I can say that sending packets from 
unknown sources from a network I do control is a no-no, ICMP response or not.

> With RPF, the corner cases you're looking for are: what situations
> would cause a packet to come from the wrong interface? For example, if
> you had some sort of routing loop where router A thought it could get
> to a destination via router B but router B thinks that destination
> unreachable so it returns the packet to its default route at router A.
> RPF then drops the packet because router B isn't an acceptable source.
> That's a corner case for RPF but it's an acceptable case because the
> packet would be dropped regardless.

So a non-problem corner-case. Interesting... I never thought of a non-problem 
as a problem.

> Another corner case with strict RPF is that your best route to a
> destination is transit C but a packet with that source arrives from
> transit D. That's broken, it causes significant problems for the
> network and as a result it constrains you to not use strict RPF in
> network scenarios where that's possible.

See my original response where I say not to use it in that scenario.

> Loose mode RPF tries to overcome the limitation by saying: as long as
> there's a route announced from D we'll accept packets from D even if C
> is the best route.

Saying that a route to the source has to be in the routing table on an internal 
network, something I can control, is a valid way to stop spoofing. uRPF cannot, 
and should never be used to, make routing decisions and does not do that anyway.

The rest of your comments are not reasonable since I already said to not use 
uRPF on TRANSIT LINKS. Happy to expand that to PEERING LINKS. For internal 
networking, you CAN use uRPF to great effect, corner case arguments 
notwithstanding.

Not everyone runs a large multi-national tier-1/2 network. Some of us run the 
thousands of eye-ball networks and just say thank you when we don’t allow 
spoofing.

BTW... RPF and uRPF are significantly different things. :)



> 
> Regards,
> Bill Herrin
> 
> -- 
> William Herrin
> b...@herrin.us
> https://bill.herrin.us/



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 15:58, Mark Tinka  wrote:

> > Well RPKI or DNSSEC is at least adding a value, even something you can brag 
> > about to your customers (we are part of the solution not part of the 
> > problem etc...).
>
> Bragging doesn't bring in income, it's just PR :-).

Unsure of others, but we didn't implement RPKI for shit and giggles,
we implemented it, because customers wanted us to do RPKI.

-- 
  ++ytti


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 15:34, Saku Ytti wrote:

>
> Unsure of others, but we didn't implement RPKI for shit and giggles,
> we implemented it, because customers wanted us to do RPKI.

I'll be honest, none of our customers ever asked us to deploy RPKI and
ROV. Will they benefit from it, sure? Is it about to become part of an
RFP requirements document? Probably not.

Then again, the typical NTT customer probably has an engineering
department that understands and demands RPKI, because they are a
sizeable operator themselves. We only have a handful of customers that
technically appreciate that we've deployed RPKI. For the rest, it
doesn't register.

Not sure if beating up on Job for months qualifies as "a customer
wanting RPKI from NTT" :-).

Mark.




RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> From: Mark Tinka 
> Sent: Thursday, June 11, 2020 1:56 PM
> 
> On 11/Jun/20 14:17, adamv0...@netconsultings.com wrote:
> 
> > Well RPKI or DNSSEC is at least adding a value, even something you can
> brag about to your customers (we are part of the solution not part of the
> problem etc...).
> 
> Bragging doesn't bring in income, it's just PR :-).
> 
Good PR might ;)

> 
> >
> > But running MPLS over IPv6 in addition to already running it over IPv4,
> gaining new functionality or features in the process that could be ultimately
> monetized in providing better service to customers? -maybe even exposing
> the network to a new set of bugs?  -I don't know, that doesn’t sound like a
> good use of company resources especially in these uncertain times . Maybe
> I'm being overly harsh here maybe if you could please explain the drivers or
> expected net value out of this exercise please?
> 
> Oh dear, you sound like our Finance department now; "drivers" and "net
> value" :-).
> 
I thought I sound like a network architect :( 

> If I take your line of reasoning, deploying SRv6 likely requires new hardware,
> which means $$. How much money will I charge customers for my shiny new
> SRv6?
> 
No, my line of reasoning is if you have MPLS LSPs signalled over v4 I see no 
point having them signalled also over v6 in parallel.
Or if your full-mesh RSVP-TE is killing your RSVP-TE or you're in need of TE, 
then might want to look at SR MPLS. 

> LDPv6 builds on LDPv4. Just like IPv6 builds on IPv4. At best, you can remove
> BGPv6 from your core, 
I'm using VPNv6 & VPNv4 so not sure I follow how LDPv6 allows for removal of 
BGPv6 (is it BGPv6 over v4 NHs/transport?) but then again if it works over v4...

> which lowers your administration costs in that part of
> the network even further, costing you less in human time running it,
> resources you can otherwise re-deploy to other time- and money-saving
> activities. At worst, you get IPv4/IPv6 feature parity, and who doesn't like
> that :-).
> 
I knew there's a bit of OCD hidden in this at some level :)

> And how much money did LDPv6 cost you to deploy? $0.
> 
Apart from X months worth of functionality, performance, scalability and 
interworking testing -network wide code upgrades to address the bugs found 
during the testing process and then finally rollout across the core and 
possibly even migration from LDPv4 to LDPv6, involving dozens of people from 
Arch, Design, OPS, Project management, etc... with potential for things to 
break while making changes in live network. 

   
adam



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 16:45, Mark Tinka  wrote:

> Not sure if beating up on Job for months qualifies as "a customer
> wanting RPKI from NTT" :-).

I'm sure we can blame Job for this, why not. But probably because of
his lobbying some customers are _requiring_, i.e. flat out told they
will stop accepting transit offers from providers who don't do RPKI.

-- 
  ++ytti


RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> From: Saku Ytti 
> Sent: Thursday, June 11, 2020 3:29 PM
> 
> On Thu, 11 Jun 2020 at 16:45, Mark Tinka  wrote:
> 
> > Not sure if beating up on Job for months qualifies as "a customer
> > wanting RPKI from NTT" :-).
> 
> I'm sure we can blame Job for this, why not. But probably because of his
> lobbying some customers are _requiring_, i.e. flat out told they will stop
> accepting transit offers from providers who don't do RPKI.
> 
Case in point. 

On the other hand not sure if any of the customers would care whether LSPs are 
signalled over v4 as opposed to v6. 

adam 




Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 16:28, Saku Ytti wrote:

> I'm sure we can blame Job for this, why not. But probably because of
> his lobbying some customers are _requiring_, i.e. flat out told they
> will stop accepting transit offers from providers who don't do RPKI.

As my Chad friend would say, "I like the sound of this".

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 16:36, adamv0...@netconsultings.com wrote:

> Case in point. 
>
> On the other hand not sure if any of the customers would care whether LSPs 
> are signalled over v4 as opposed to v6. 

They care if your core router CPU doesn't struggle from dealing with
churning BGP routes at scale, taking the network down.

Not every bit of good network operation can be attributed to direct
revenue. BCP-38 is a great example, and that is still poorly deployed
despite being supported.

Mark.


Re: Partial vs Full tables

2020-06-11 Thread William Herrin
On Thu, Jun 11, 2020 at 6:25 AM Brian Johnson  wrote:
> I fully understand that I have not “broken” anything.

Handwaving, la la la, only sunshine in the sky. Got it.

-Bill



-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka


On 11/Jun/20 16:25, adamv0...@netconsultings.com wrote:

> Good PR might ;)

I'm old school - build something customers want to use, and the money
follows.

Care to guess how much PR Tik Tok do :-)? But I digress.


> No, my line of reasoning is if you have MPLS LSPs signalled over v4 I see no 
> point having them signalled also over v6 in parallel.

It's not about signaling IPv4 LSP's over IPv6.

LDPv4 creates IPv4 FEC's.

LDPv6 creates IPv6 FEC's.

The idea is to create IPv6 FEC's so that IPv6 traffic can be
label-switched in the network natively, allowing you to remove BGPv6 in
a native dual-stack core.


> Or if your full-mesh RSVP-TE is killing your RSVP-TE or you're in need of TE, 
> then might want to look at SR MPLS. 

No RSVP-TE here, thank the Lord :-).


> I'm using VPNv6 & VPNv4 so not sure I follow how LDPv6 allows for removal of 
> BGPv6 (is it BGPv6 over v4 NHs/transport?) but then again if it works over 
> v4...

Nothing like the real thing:

In IPv4-land, you get this:

24005  49017   105.16.Y.Z/32 Te0/0/0/2    105.16.A.B    8614773
    49017   105.16.Y.Z/32 Te0/1/0/0    105.16.C.D   8121753
    49017   105.16.Y.Z/32 Te0/7/0/5    105.16.E.F    9964543

In IPv6-land, you get this:

2c0f:feb0:X:Y::Z/128 25071   25458  BE1  Link-local
          25458 
BE2  Link-local


In Junos land, it looks like this:

7967   *[LDP/9] 1w5d 01:21:05, metric 1
    >  to fe80::de38:e1ff:fe15:dc02 via ae2.0, Swap
145674

If I run an IPv6 traceroute toward a host that sits behind a router
doing LDPv6, this is what happens:

run traceroute 2c0f:feb0:2f:ff00::::
traceroute6 to 2c0f:feb0:2f:ff00::::
(2c0f:feb0:2f:ff00::::) from 2c0f:feb0:1:2::112, 64 hops
max, 12 byte packets
 1  ae-5-0.er6-01-fra.de.seacomnet.com (2c0f:feb0:1:2::111)  165.567 ms 
166.158 ms  166.924 ms
 MPLS Label=145786 CoS=0 TTL=1 S=1
 2  xe-0-0-0-0.cr6-02-mrs.fr.seacomnet.com (2c0f:feb0:1:2::f9)  165.682
ms 2c0f:feb0:1:2::279 (2c0f:feb0:1:2::279)  165.817 ms  168.123 ms
 MPLS Label=25494 CoS=0 TTL=1 S=1


As you can see, just as with IPv4, IPv6 packets are now being
MPLS-switched in the core, allowing you to remove BGPv6 in the core and
simplify operations in that area of the network.

So this is native MPLSv6. It's not 6PE or 6VPE.

Your IPv4 domain could fall over and your MPLSv6 network will still be
alive, because it's neither 6PE nor 6VPE. And vice versa - your IPv6
network could die, and your MPLSv4 will be unaffected.


> I knew there's a bit of OCD hidden in this at some level :)

Safe to say the Internet is one big OCD project :-).

My OCD is sleeping at 3AM, in peace, lockdown or not, hehe.


> Apart from X months worth of functionality, performance, scalability and 
> interworking testing -network wide code upgrades to address the bugs found 
> during the testing process and then finally rollout across the core and 
> possibly even migration from LDPv4 to LDPv6, involving dozens of people from 
> Arch, Design, OPS, Project management, etc... with potential for things to 
> break while making changes in live network.

Which you wouldn't have to do with SRv6, because you trust the vendors?

And no, LDPv6 does not call for one to migrate from LDPv4. They can live
together, side-by-side, just as native dual-stack IPv4/IPv6 does.

We are running LDPv4 and LDPv6 side-by-side, with no problems, between
IOS XR and Junos, as you can see above. This is a live network, carrying
revenue-generating, production traffic. It's not a fantasy.

Mark.


Re: Partial vs Full tables

2020-06-11 Thread Robert Blayzor
On 6/10/20 6:01 PM, Baldur Norddahl wrote:
> Am I correct in assuming loose mode RPF only drops packets from
> unannounced address space in the global routing table? And the downside
> of doing so is that sometimes we do receive packets from that address
> space, usually back scatter from traceroute or other ICMP messages.
> 
> Currently about 25% of the routable address space is not advertised in
> the DFZ. Loose mode RPF could filter this. Is there any data on how much
> traffic actually arrives from this space?
> 


Loose mode RPF will essentially drop traffic received on the interface
if the router does not have any route for. (will not match a default or
a discard route, at least in IOS-XR)

As Bill has pointed out, this may drop traffic from some peering
networks that are not in the global routing table. Though one could
argue that if a packet needs to be fragged it's typically closer to the
edges rather than the transit/peering links.

-- 
inoc.net!rblayzor
XMPP: rblayzor.AT.inoc.net
PGP:  https://pgp.inoc.net/rblayzor/


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 18:32, David Sinn  wrote:

> However if you move away from large multi-chip systems, which hide internal 
> links which can only be debugged and monitored if you know the the obscure, 
> often different ways in which they are partially exposed to the operator, and 
> to a system of fixed form-factor, single chip systems, labels fall apart at 
> scale with high ECMP. Needing to enumerate every possible path within the 
> network or having to have a super-deep label stack removes all of the 
> perceived benefits of cheap and simple. The arguments about IP lookups being 
> slow is one best left to the 1990's when it was true. Fixed pipeline systems 
> have proven this to be false.

It continues to be very much true. IP lookups require external memory,
which takes SERDES, which could be used for revenue otherwise. IP
lookups are slow, expensive and complex, fundamentally, no amount of
advancement will change this fundamental nature.
Sure we can come up with all kind of implementations which bridge the
gap, but the gap is there.

If we take say JNPR MX, your lookup speed isn't limited by the
instruction count on the PPE, the PPE spends most of its time
sleeping, when the platform is fully PPS congested, the PPE is waiting
for the memory to return!

-- 
  ++ytti


Re: Partial vs Full tables

2020-06-11 Thread brad dreisbach

On Thu, Jun 11, 2020 at 12:01:38AM +0200, Baldur Norddahl wrote:

Am I correct in assuming loose mode RPF only drops packets from unannounced
address space in the global routing table? And the downside of doing so is
that sometimes we do receive packets from that address space, usually back
scatter from traceroute or other ICMP messages.


uRPF absolutely kills the pps performance or your hardware due to the packet
having to be recirculated to do the check(at least this is the case on every
platform that ive ever tested it on). use acl's to protect your edge.

-b


Re: Update your ARIN IRR data access methods (was: Fwd: [arin-announce] New Internet Routing Registry Release)

2020-06-11 Thread Mitchell Kuch
Hello -

The 'whois.radb.net' IRR instance and the RADb services have been
updated to reflect ARIN's IRR updates.

- - Mitchell

Mitchell Kuch
and the RADb Team

On Wed, Jun 10, 2020 at 2:54 PM John Curran  wrote:
>
> NANOGers -
>
> ARIN has released its updated IRR system - if you are relying on ARIN’s IRR 
> data, please refer to details below and update access methods accordingly.
>
> Thanks!
> /John
>
> John Curran
> President and CEO
> American Registry for Internet Numbers
>


> Begin forwarded message:
>
> From: ARIN 
> Subject: [arin-announce] New Internet Routing Registry Release
> Date: 10 June 2020 at 2:34:55 PM EDT
> To: 
>
> ARIN is pleased to announce the release of new and updated Internet Routing 
> Registry (IRR) features. Full release notes are included below this message.
>
> ARIN systems are operating normally. If you have questions, comments, or 
> issues, please submit an Ask ARIN ticket using your ARIN Online account, or 
> contact the Registration Services Help Desk by phone Monday through Friday, 
> 7:00 AM to 7:00 PM ET at +1.703.227.0660.
>
> Regards,
>
> Mark Kosters
> Chief Technology Officer
> American Registry for Internet Numbers (ARIN)
>
> Release Notes
>
> This release consists of IRR additions and improvements. The following 
> information is provided to assist you in using ARIN’s IRR.
>
> Obtaining Routing Information from ARIN’s IRR
>
> Using FTP
>
> ARIN’s IRR information can be obtained from ftp://ftp.arin.net/pub/rr/. The 
> FTP site provides two sources that have been migrated from ARIN’s IRR: one 
> for authorized objects and one for nonauthorized objects. Authorized objects 
> have been verified that the organization is authorized to create the record 
> and that the registration associated with the object is under an (L)RSA.
>
> What do I need to change after this IRR deployment to use FTP?
>
> * If you are obtaining IRR information via FTP, to get all ARIN objects, 
> you’ll need to access two separate sources: ARIN (arin.db.gz) and 
> ARIN-NONAUTH (arin-nonauth.db.gz). Note that the source files are in a new, 
> zipped format (.gz).
>
> Using Near Real-Time Monitoring (NRTM)
>
> ARIN provides two NRTM streams: ARIN (which contains authorized objects, as 
> previously described) and ARIN-NONAUTH (which contains nonauthorized objects).
>
> What do I need to change after this IRR deployment to use NRTM?
>
> * Add the new NONAUTH stream to your monitoring. The serial number for this 
> stream is found at https://ftp.arin.net/pub/rr/ARIN-NONAUTH.CURRENTSERIAL
> * Update the current ARIN (authorized) stream serial number; this number is 
> found at https://ftp.arin.net/pub/rr/ARIN.CURRENTSERIAL
>
> Whois Port 43: You can access ARIN’s IRR database for both ARIN and 
> ARIN-NONAUTH sources (which is running IRR Daemon, or IRRd) by entering 
> commands from a terminal window. There are no changes to this functionality 
> after the deployment.
>
> Managing Routing Information in ARIN’s IRR
>
> ARIN now provides a new method to manage IRR data directly in ARIN Online by 
> selecting IRR Object Records from the main navigation menu. Organizations who 
> currently use ARIN’s email-template based system (IRR-email) can continue to 
> use that system, but no new organizations will be added to the IRR-email 
> system. Your data from the IRR-email system has been migrated and is 
> available for viewing in ARIN Online, but migrated IRR objects cannot be 
> modified in ARIN Online. (Only IRR objects created in ARIN Online can be 
> modified in ARIN Online.)
>
> What do I need to do as a result of these changes?
>
> - If you are currently using IRR-email and you want to continue to use that 
> system, no action is needed. (You cannot use both IRR-email and ARIN Online 
> to manage your IRR data.)
> - If you are currently using IRR-email and you want to start using ARIN 
> Online to manage your IRR data, upon your first use of IRR in ARIN Online, 
> you’ll be asked to confirm that you want to switch to ARIN Online to manage 
> your IRR data. You’ll have to agree to this change before proceeding. If you 
> start using IRR-online, you will no longer have access to IRR-email.


Re: Partial vs Full tables

2020-06-11 Thread William Herrin
On Thu, Jun 11, 2020 at 9:08 AM brad dreisbach  wrote:
> uRPF absolutely kills the pps performance or your hardware due to the packet
> having to be recirculated to do the check(at least this is the case on every
> platform that ive ever tested it on). use acl's to protect your edge.

Hi Brad,

Don't the ACLs generally live in a partition of the TCAM too? So
you're going from two constant-time TCAM lookups per packet (route,
acls) to three (route, urpf, acls)? Not rhetorical; getting close to
the edge of my knowledge here.

Regards,
Bill Herrin


-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: Partial vs Full tables

2020-06-11 Thread Brian Johnson
You are a dismissive little twit aren’t you. :/

> On Jun 11, 2020, at 9:56 AM, William Herrin  wrote:
> 
> On Thu, Jun 11, 2020 at 6:25 AM Brian Johnson  
> wrote:
>> I fully understand that I have not “broken” anything.
> 
> Handwaving, la la la, only sunshine in the sky. Got it.
> 
> -Bill
> 
> 
> 
> -- 
> William Herrin
> b...@herrin.us
> https://bill.herrin.us/



Re: Partial vs Full tables

2020-06-11 Thread Brian Johnson



> On Jun 10, 2020, at 6:40 PM, brad dreisbach  wrote:
> 
> On Thu, Jun 11, 2020 at 12:01:38AM +0200, Baldur Norddahl wrote:
>> Am I correct in assuming loose mode RPF only drops packets from unannounced
>> address space in the global routing table? And the downside of doing so is
>> that sometimes we do receive packets from that address space, usually back
>> scatter from traceroute or other ICMP messages.
> 
> uRPF absolutely kills the pps performance or your hardware due to the packet
> having to be recirculated to do the check(at least this is the case on every
> platform that ive ever tested it on). use acl's to protect your edge.
> 
> -b


Completely agree for edge scenario 100%.

And now for Bill to talk down to me…. :/

Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Phil Bedard
Just to clarify the only routers who potentially need to inspect or do anything 
with those headers are endpoints who require information in the extension 
header or hops in an explicit path.  In the simple example I gave, there are no 
extension headers at all.  

I'm pretty agnostic to IPv6 SR-MPLS and SRv6, but just want to clarify that.  

I'm not going to claim inserting/swapping v6 extension headers is what all 
routers made in the last 20 years are especially good at.  (  But it's not 
impossible to do it in some shipping devices today at wire rate with 
deterministic latency.  

As for normal v6 forwarding, the way most higher speed routers made recently 
work there is little difference in latency since the encapsulation for the 
packet is done in a common function at the end of the pipeline and the lookups 
are often in the same memory space.  NPUs are also being built today with 
enough on-package memory to hold larger routing tables.   Whether a packet has 
to be buffered on-chip vs. off-chip has a much larger impact on latency/PDV 
than a forwarding lookup.  

Thanks, 
Phil 

On 6/11/20, 5:07 AM, "NANOG on behalf of Nick Hilliard" 
 wrote:

Saku Ytti wrote on 11/06/2020 05:51:
> Unfortunately SRv6 is somewhat easy to market with the whole 'it's
> simple, just IP' spiel.
it's not "just IP": it's ipv6 with per-router push / pop operations on 
ipv6 extension headers, i.e. high touch in areas which are known to be 
deeply troublesome on hardware.

In this regard alone, the specification is problematic enough that it's 
unearthed a bug in the IPv6 standard (rfc8200).

Nick




Re: Partial vs Full tables

2020-06-11 Thread Mark Tinka



On 10/Jun/20 19:31, William Herrin wrote:

>
> Sorry, it'd be pre-coffee if I drank coffee and I was overly harsh
> here. Let me back up:
>
> The most basic spoofing protection is: don't accept remote packets
> pretending to be from my IP address.
>
> Strict mode URPF extends this to networks: don't accept packets on
> interfaces where I know for sure the source host isn't in that
> direction. It works fine in network segments whose structure requires
> routes to be perfectly symmetrical: on every interface, the packet for
> every source can only have been from one particular next hop, the same
> one that advertises acceptance of packets with that destination. The
> use of BGP breaks the symmetry requirement so close to always that you
> may as well think of it as always. Even with a single transit or a
> partial table. Don't use strict mode URPF on BGP speakers.
>
> Loose mode URPF is... broken. It was a valiant attempt to extend
> reverse path filtering into networks with asymmetry but I've yet to
> discover a use where there wasn't some faulty corner case. If you
> think you want to use loose mode RPF, trust me: you've already passed
> the point where any RPF was going to be helpful to you. Time to set it
> aside and solve the problem a different way.

We don't run Loose Mode on peering routers because they don't carry a
full table. If anyone sent the wrong packets that way, they wouldn't be
able to leave the box anyway.

We do run Loose Mode on transit routers, no issues thus far.

We do run Strict Mode on customer-facing links that are stub-homed to us
(DIA). We also run Loose Mode on customer-facing links that buy transit
(BGP).

But mostly, BCP-38 deployed at the edge (peering, transit and customer
routers) also goes a long way in protecting the network.

Mark.


Re: Partial vs Full tables

2020-06-11 Thread Mark Tinka



On 11/Jun/20 00:41, Job Snijders wrote:

>
> Back to basics: as Ytti suggested earlier in the thread, it might be more 
> sensible to generate your own default route based on a 'stable anchor prefix' 
> coming from the ISP rather than accepting the default your ISP originates 
> towards you.

This, for me, makes a bit more sense. Especially when the number of
customers asking for default far outweighs those that don't, for a large
network where designing this can be quite tricky.

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 19:49, Phil Bedard  wrote:

> As for normal v6 forwarding, the way most higher speed routers made recently 
> work there is little difference in latency since the encapsulation for the 
> packet is done in a common function at the end of the pipeline and the 
> lookups are often in the same memory space.  NPUs are also being built today 
> with enough on-package memory to hold larger routing tables.   Whether a 
> packet has to be buffered on-chip vs. off-chip has a much larger impact on 
> latency/PDV than a forwarding lookup.

On-package is not important, on-chip or off-chip is what matters, i.e.
do you eat SERDES to connect memory or not.

Of course you could always implement a software feature that says
these 32b/32 or 128b/128 addresses are blessed and need to live on
tiny on-chip memory and from this CIDR we guarantee all are host
routes. To achieve similar-to-MPLS performance, with few more bytes
per number.

The demand is, we need tunneling, then the question is what are the
metrics of a good tunneling solution. By answering this honestly, MPLS
is better. We could do better surely, but IP is not that.

-- 
  ++ytti


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Nick Hilliard

Phil Bedard wrote on 11/06/2020 17:49:

Just to clarify the only routers who potentially need to inspect or
do anything with those headers are endpoints who require information
in the extension header or hops in an explicit path.  In the simple
example I gave, there are no extension headers at all.


perhaps, but no-one planning to use srv6 is going to invest in kit which 
can handle srv6 but not the TE component.  Or deploy srv6 on existing 
kit which can't handle TE.


Nick


Re: Partial vs Full tables

2020-06-11 Thread William Herrin
On Thu, Jun 11, 2020 at 9:35 AM Brian Johnson  wrote:
> You are a dismissive little twit aren’t you. :/

Someone stood up and said, "Nope, nothing I did could possibly have
broken anything." I'm pretty sure that someone was you but feel free
to call me on it if I'm mistaken.

Look, at the risk of doing further offense, it's like I said: it's one
thing to educate yourself about a topic and then make a judgement call
about what's acceptable. It's quite another to remain willfully
ignorant in service of your preferred view. I just got through
describing specific scenarios where loose urpf fails when you
responded that no, it doesn't break anything. If you'd said, "no, that
breakage is a small price worth paying," I'd have debated the merits
with you or simply let it stand as a contrary opinion. Refusing to
acknowledge the breakage is worth only dismissal.

Regards,
Bill

--
William Herrin
b...@herrin.us
https://bill.herrin.us/


IPv4 Broker / Service -

2020-06-11 Thread edwin.mallette
Hi Nanog,

 

I have need of a reputable IPv4 broker or service  - personal experience
with said broker would be preferred.  These would be for small blocks - /23,
24s - in the US, so ARIN.  I know, I know, IPv6 for life and all that and I
agree, but . you know, the business.  I'm happy to take responses off-list,
but I would really appreciate any recommendations. 

 

Thanks!

 

Ed



Re: IPv4 Broker / Service -

2020-06-11 Thread Eric Dugas via NANOG
Replied off-list

Eric
On Jun 11 2020, at 2:27 pm, edwin.malle...@gmail.com wrote:
> Hi Nanog,
>
>
> I have need of a reputable IPv4 broker or service – personal experience with 
> said broker would be preferred. These would be for small blocks - /23, 24s – 
> in the US, so ARIN. I know, I know, IPv6 for life and all that and I agree, 
> but … you know, the business. I’m happy to take responses off-list, but I 
> would really appreciate any recommendations.
>
> Thanks!
>
> Ed

Re: Partial vs Full tables

2020-06-11 Thread Brian Johnson
Wow. Full distorted vision of reality mode here…

uRPF doesn’t “break” anything. I stand by that. It’s not a religious position. 
It’s an operational experience. One that I have multitudes of real world 
examples of it working to SOLVE issues.

You seem to be willfully ignorant about how real networks use tools that you 
dislike to solve problems. This is way more of a problem with you disliking 
uRPF than me telling you that I like it for some applications.

Now I remember why I usually never post on this list now. I will just dismiss 
your opinions going forward instead of trying to point out that you aren’t the 
only measure of a network.

Thanks Bill.


> On Jun 11, 2020, at 1:11 PM, William Herrin  wrote:
> 
> On Thu, Jun 11, 2020 at 9:35 AM Brian Johnson  
> wrote:
>> You are a dismissive little twit aren’t you. :/
> 
> Someone stood up and said, "Nope, nothing I did could possibly have
> broken anything." I'm pretty sure that someone was you but feel free
> to call me on it if I'm mistaken.
> 
> Look, at the risk of doing further offense, it's like I said: it's one
> thing to educate yourself about a topic and then make a judgement call
> about what's acceptable. It's quite another to remain willfully
> ignorant in service of your preferred view. I just got through
> describing specific scenarios where loose urpf fails when you
> responded that no, it doesn't break anything. If you'd said, "no, that
> breakage is a small price worth paying," I'd have debated the merits
> with you or simply let it stand as a contrary opinion. Refusing to
> acknowledge the breakage is worth only dismissal.
> 
> Regards,
> Bill
> 
> --
> William Herrin
> b...@herrin.us
> https://bill.herrin.us/



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Phil Bedard
On 6/11/20, 1:19 PM, "Saku Ytti"  wrote:

On Thu, 11 Jun 2020 at 19:49, Phil Bedard  wrote:

> As for normal v6 forwarding, the way most higher speed routers made 
recently work there is little difference in latency since the encapsulation for 
the packet is done in a common function at the end of the pipeline and the 
lookups are often in the same memory space.  NPUs are also being built today 
with enough on-package memory to hold larger routing tables.   Whether a packet 
has to be buffered on-chip vs. off-chip has a much larger impact on latency/PDV 
than a forwarding lookup.

On-package is not important, on-chip or off-chip is what matters, i.e.
do you eat SERDES to connect memory or not.

[pmb] 
Sorry meant to say on-die, not on-package.  

Typically the time it takes to do those lookups are built into the system specs 
to attain the performance you need with deterministic latency within a certain 
bounds.  There are certainly corner cases where you make tradeoffs, especially 
now that single NPUs are 10+ Tbps, but it's not really an MPLS vs. IPv4 vs. 
IPv6 thing.  The other key is to do those types of accesses in a single pass, 
not traverse multiple hierarchy levels or do multiple operations.  If you are 
tunneling then the table for any of those types is going to small on a 
mid-point router.  




Re: IPv4 Broker / Service -

2020-06-11 Thread Martin Hannigan
For small needs? Honestly, don’t waste too much time. Overhead is expense.

The market is competitive. You care about if it is clean, chain of custody
and can it legitimately transfer to you. BTW, IPV6? ARIN v6 NAT block? Make
sure you exhaust all options before paying.

I have never used it. However, I find the people at Hilco reputable.

   https://ipv4auction.com


Good luck!

-M<


On Thu, Jun 11, 2020 at 14:29  wrote:

> Hi Nanog,
>
>
>
> I have need of a reputable IPv4 broker or service  – personal experience
> with said broker would be preferred.  These would be for small blocks -
> /23, 24s – in the US, so ARIN.  I know, I know, IPv6 for life and all that
> and I agree, but … you know, the business.  I’m happy to take responses
> off-list, but I would really appreciate any recommendations.
>
>
>
> Thanks!
>
>
>
> Ed
>


Re: IPv4 Broker / Service -

2020-06-11 Thread Pierre LANCASTRE
Hi

+1 for Hilco. I've made 2 deals with them, no problem, people are
professional,

Cheers

Pierre


Le jeu. 11 juin 2020 à 20:54, Martin Hannigan  a écrit :

>
> For small needs? Honestly, don’t waste too much time. Overhead is expense.
>
> The market is competitive. You care about if it is clean, chain of custody
> and can it legitimately transfer to you. BTW, IPV6? ARIN v6 NAT block? Make
> sure you exhaust all options before paying.
>
> I have never used it. However, I find the people at Hilco reputable.
>
>https://ipv4auction.com
>
>
> Good luck!
>
> -M<
>
>
> On Thu, Jun 11, 2020 at 14:29  wrote:
>
>> Hi Nanog,
>>
>>
>>
>> I have need of a reputable IPv4 broker or service  – personal experience
>> with said broker would be preferred.  These would be for small blocks -
>> /23, 24s – in the US, so ARIN.  I know, I know, IPv6 for life and all that
>> and I agree, but … you know, the business.  I’m happy to take responses
>> off-list, but I would really appreciate any recommendations.
>>
>>
>>
>> Thanks!
>>
>>
>>
>> Ed
>>
>


Re: IPv4 Broker / Service -

2020-06-11 Thread bzs


Addrex.net

I know some of the principles personally and would vouch for them.


On June 11, 2020 at 14:27 edwin.malle...@gmail.com (edwin.malle...@gmail.com) 
wrote:
 > Hi Nanog,
 > 
 >  
 > 
 > I have need of a reputable IPv4 broker or service  ? personal experience with
 > said broker would be preferred.  These would be for small blocks - /23, 24s ?
 > in the US, so ARIN.  I know, I know, IPv6 for life and all that and I agree,
 > but ? you know, the business.  I?m happy to take responses off-list, but I
 > would really appreciate any recommendations.
 > 
 >  
 > 
 > Thanks!
 > 
 >  
 > 
 > Ed
 > 

-- 
-Barry Shein

Software Tool & Die| b...@theworld.com | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD   | 800-THE-WRLD
The World: Since 1989  | A Public Information Utility | *oo*


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Saku Ytti
On Thu, 11 Jun 2020 at 21:04, David Sinn  wrote:

> You've made my point for me. If you are building the core of your network out 
> of MX's, to turn a phrase, in a past life "I fully support my competitors to 
> do so". Large numbers of small boxes, as they have already shown in the 
> data-center, have major cost, control and operational advantages over a small 
> number of large ones. They also expose the inherent problems of 
> label-switching and where IP has it's merits.

Except this implementation does not exist, but we can argue that is
missing feature. We can argue we should be able to tell the lookup
engine this CIDR is on-chip and it's host routes only. This is
certainly doable, and would make IP tunnels like MPLS tunnels for
lookup cost, just larger lookup key, which is not significant cost.

But even if we had this (we don't, we have for MPLS) IP would be still
inferior, it is more tunneling overhead, i.e. I need more overspeed.
Technically MPLS is just better tunneling header. I can understand
sentimental arguments for IPv4 and market seems to appreciate those
arguments particularly well.

-- 
  ++ytti


RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> From: David Sinn
> Sent: Thursday, June 11, 2020 4:32 PM
> 
> However if you move away from large multi-chip systems, 
> to a system of fixed form-factor, single chip systems, labels fall
> apart at scale with high ECMP. Needing to enumerate every possible path
> within the network or having to have a super-deep label stack removes all
of
> the perceived benefits of cheap and simple. 
>
Looks like the deployments you describe are large DC Clos/Benes fabric, then
the potentially deep label imposition would be done by the VMs right?
On transit nodes the 64x ECMP or super-deep labels is no problem for
NPU/lookup process as it's always just top label lookup and resolving to a
single egress interface.

adam 



Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 17:32, David Sinn wrote:

> Respectfully, that is deployment dependent. In a traditional SP topology that 
> focuses on large do everything boxes, where the topology is fairly 
> point-to-point and you only have a small handful of nodes at a PoP, labels 
> can be fast, cheap and easy. Given the lack of ECMP/WECMP, they remain fairly 
> efficient within the hardware.
>
> However if you move away from large multi-chip systems, which hide internal 
> links which can only be debugged and monitored if you know the the obscure, 
> often different ways in which they are partially exposed to the operator, and 
> to a system of fixed form-factor, single chip systems, labels fall apart at 
> scale with high ECMP.

I'm curious about this statement - have you hit practical ECMP issues
with label switching at scale?

We have ECMP'ed label switch paths with multiple paths for a single FEC
all over the place, and those work fine both on Cisco and Junos (of all
sizes), both for IPv4 and IPv6 FEC's. Have done for years.

Unless I misunderstand your concern.

Mark.


RE: [c-nsp] LDPv6 Census Check

2020-06-11 Thread adamv0025
> From: Mark Tinka 
> Sent: Thursday, June 11, 2020 3:59 PM
> 
> > No, my line of reasoning is if you have MPLS LSPs signalled over v4 I see no
> point having them signalled also over v6 in parallel.
> 
> It's not about signaling IPv4 LSP's over IPv6.
> LDPv4 creates IPv4 FEC's.
> LDPv6 creates IPv6 FEC's.
> 
> The idea is to create IPv6 FEC's so that IPv6 traffic can be label-switched in
> the network natively, allowing you to remove BGPv6 in a native dual-stack
> core.
> 
Right I see what you are striving to achieve is migrate from BGP in a core to a 
BGP free core but not leveraging 6PE or 6VPE? 

> 
> As you can see, just as with IPv4, IPv6 packets are now being MPLS-switched
> in the core, allowing you to remove BGPv6 in the core and simplify
> operations in that area of the network.
> 
> So this is native MPLSv6. It's not 6PE or 6VPE.
> 
So considering you already had v4 FECs wouldn't it be simpler to do 6PE/6VPE, 
what do you see as drawbacks of these compared to native MPLSv6 please?
 
> > Apart from X months worth of functionality, performance, scalability and
> interworking testing -network wide code upgrades to address the bugs
> found during the testing process and then finally rollout across the core and
> possibly even migration from LDPv4 to LDPv6, involving dozens of people
> from Arch, Design, OPS, Project management, etc... with potential for things
> to break while making changes in live network.
> 
> Which you wouldn't have to do with SRv6, because you trust the vendors?
> 
Well my point was that if v4 FECs would be enough to carry v6 traffic then I 
wouldn't need SRv6 nor LDPv6, hence I'm curious to hear from you about the 
benefits of v6 FEC over v4 FEC (or in other words MPLSv6 vs 6PE/6VPE). 

adam



RE: Partial vs Full tables

2020-06-11 Thread Michael Hare via NANOG
Mark (and others),

I used to run loose uRPF on peering/transit links for AS3128 because I used to 
think that tightening the screws was always the "right thing to do".   

I instrumented at 60s granularity with vendor J uRPF drop counters on these 
links.  Drops during steady state [bgp converged] were few [Kbps].  Drops 
during planned maintenance were at much rates for a few minutes.

What was happening: I advertise a handful of routes to transit/peers from 
multiple ASBR.  Typically my ASBR sees 800K FIB and a few million RIB routes  
We all know this takes a good amount of time to churn..   

For planned maintenance of ASBR A [cold boot upgrades], if recovery didn't 
include converging my inbound routes before doing eBGP advertising, I'd be 
tossing packets due to loose uRPF.  

Remember during this time 'ASBR B'  in my AS is happy egressing traffic as soon 
as 'ASBR A' advertises my dozen or so prefixes via eBGP, I start to see return 
traffic much sooner than before 'ASBR A' has converged.  No more specific 
return route yet other than maybe default for a few minutes if unlucky..  The 
result is bit bucket networkwide despite ASBR B functioning just fine.

Maybe everyone already convergences inbound before advertising eBGP and I made 
a rookie mistake, but what about unplanned events?

For me the summary is that I was causing more collateral damage than good 
[verified by time series data], so I turned off loose URPF.  YMMV.

-Michael

> -Original Message-
> From: NANOG  On Behalf Of Mark Tinka
> Sent: Thursday, June 11, 2020 12:14 PM
> To: nanog@nanog.org
> Subject: Re: Partial vs Full tables
> 
> 
> 
> On 10/Jun/20 19:31, William Herrin wrote:
> 
> >
> > Sorry, it'd be pre-coffee if I drank coffee and I was overly harsh
> > here. Let me back up:
> >
> > The most basic spoofing protection is: don't accept remote packets
> > pretending to be from my IP address.
> >
> > Strict mode URPF extends this to networks: don't accept packets on
> > interfaces where I know for sure the source host isn't in that
> > direction. It works fine in network segments whose structure requires
> > routes to be perfectly symmetrical: on every interface, the packet for
> > every source can only have been from one particular next hop, the same
> > one that advertises acceptance of packets with that destination. The
> > use of BGP breaks the symmetry requirement so close to always that you
> > may as well think of it as always. Even with a single transit or a
> > partial table. Don't use strict mode URPF on BGP speakers.
> >
> > Loose mode URPF is... broken. It was a valiant attempt to extend
> > reverse path filtering into networks with asymmetry but I've yet to
> > discover a use where there wasn't some faulty corner case. If you
> > think you want to use loose mode RPF, trust me: you've already passed
> > the point where any RPF was going to be helpful to you. Time to set it
> > aside and solve the problem a different way.
> 
> We don't run Loose Mode on peering routers because they don't carry a
> full table. If anyone sent the wrong packets that way, they wouldn't be
> able to leave the box anyway.
> 
> We do run Loose Mode on transit routers, no issues thus far.
> 
> We do run Strict Mode on customer-facing links that are stub-homed to us
> (DIA). We also run Loose Mode on customer-facing links that buy transit
> (BGP).
> 
> But mostly, BCP-38 deployed at the edge (peering, transit and customer
> routers) also goes a long way in protecting the network.
> 
> Mark.


Re: Partial vs Full tables

2020-06-11 Thread Mark Tinka



On 12/Jun/20 04:01, Michael Hare wrote:
> Mark (and others),
>
> I used to run loose uRPF on peering/transit links for AS3128 because I used 
> to think that tightening the screws was always the "right thing to do".   
>
> I instrumented at 60s granularity with vendor J uRPF drop counters on these 
> links.  Drops during steady state [bgp converged] were few [Kbps].  Drops 
> during planned maintenance were at much rates for a few minutes.
>
> What was happening: I advertise a handful of routes to transit/peers from 
> multiple ASBR.  Typically my ASBR sees 800K FIB and a few million RIB routes  
> We all know this takes a good amount of time to churn..   
>
> For planned maintenance of ASBR A [cold boot upgrades], if recovery didn't 
> include converging my inbound routes before doing eBGP advertising, I'd be 
> tossing packets due to loose uRPF.  
>
> Remember during this time 'ASBR B'  in my AS is happy egressing traffic as 
> soon as 'ASBR A' advertises my dozen or so prefixes via eBGP, I start to see 
> return traffic much sooner than before 'ASBR A' has converged.  No more 
> specific return route yet other than maybe default for a few minutes if 
> unlucky..  The result is bit bucket networkwide despite ASBR B functioning 
> just fine.
>
> Maybe everyone already convergences inbound before advertising eBGP and I 
> made a rookie mistake, but what about unplanned events?
>
> For me the summary is that I was causing more collateral damage than good 
> [verified by time series data], so I turned off loose URPF.  YMMV.

To be honest, we haven't seen this.

We've got plenty of peering and transit exit/entry points, each just
about dedicated to its own router, across multiple cities in Africa
(peering) and Europe (peering + transit).

We also only do about 10% - 15% of traffic via transit (remember, we
don't run any kind of uRPF on our peering routers).

We originate our aggregates from deep within the core, never from the
transit, peering or edge routers.

We did experience some slowness with the ASR9001 some years back during
convergence for the transit network that was connected to that router in
Amsterdam, but it had been slowing down for years. Since swapping it out
for MX480's and/or MX204's, that problem has since gone away.

Mark.


Re: [c-nsp] LDPv6 Census Check

2020-06-11 Thread Mark Tinka



On 11/Jun/20 23:45, adamv0...@netconsultings.com wrote:

> Right I see what you are striving to achieve is migrate from BGP in a core to 
> a BGP free core but not leveraging 6PE or 6VPE? 

Yes sir.


> So considering you already had v4 FECs wouldn't it be simpler to do 6PE/6VPE, 
> what do you see as drawbacks of these compared to native MPLSv6 please?

Because 6PE, for us, adds a lot more complexity in how we design the
network.

But most importantly, it creates a dependency for the success of IPv6 on
IPv4. If my IPv4 network were to break, for whatever reason, it would
take my IPv6 network down with it.

Years back, there was a nasty bug in the ASR920 that set an upper limit
on the MPLS label space it created FEC's for. Since Juniper sometimes
uses higher label numbers than Cisco, traffic between that ASR920 and
our Juniper network was blackholed. It took weeks to troubleshoot, Cisco
sent some engineering code, I confirmed it fixed the issue, and it was
rolled out generally. During that time when the ASR920 was unavailable
on IPv4, it was still reachable on IPv6.

Other issues are also with the ASR920 and ME3600X/3800X routers, where
0/0 and ::/0 are the last routes to be programmed into FIB when you run
BGP-SD. It can be a while until those boxes can reach the rest of the
world via default. IPv6 will get there faster.

I also remember another issue, back in 2015, where a badly-written IPv4
ACL kicked one of our engineers out of the box. Thankfully, he got back
in via IPv6.

I guess what I'm saying is we don't want to fate-share. IPv4 and IPv6
can operate independently. A failure mode in one of them does not
necessarily propagate to the other, in a native, dual-stack network. You
can deploy something in your IPv6 control/data plane without impacting
IPv4, and vice versa, if you want to roll out gracefully, without
impacting the other protocol.

6PE simply has too many moving parts to setup, comparing to just adding
an IPv6 address to a router interface and updating your IGP. Slap on
LDPv6 for good measure, and you've achieved MPLSv6 forwarding without
all the 6PE faffing.


> Well my point was that if v4 FECs would be enough to carry v6 traffic then I 
> wouldn't need SRv6 nor LDPv6, hence I'm curious to hear from you about the 
> benefits of v6 FEC over v4 FEC (or in other words MPLSv6 vs 6PE/6VPE). 

No need for 6PE deployment and day-to-day operation complexity.

A simplified and more native tunneling for IPv6-in-MPLSv6, rather than
IPv6-in-MPLSv4-on-IPv4.

No inter-dependence between IPv6 and IPv4.

Easier troubleshooting if one of the protocols is misbehaving, because
then you are working on just one protocol, and not trying to figure if
IPv4 or MPLSv4 are breaking IPv6, or vice versa.

For me, those 4 simple points help me sleep well at 3AM, meaning I can
stay up longer having more wine, in peace :-).

Mark.