Re: Re udp port overload on ipv4 (was Re: V6 still not supported)

2022-03-10 Thread Grzegorz Janoszka

On 10/03/2022 21:03, Matthew Walster wrote:
If that was feasible, we would likely be using SCTP by now. TCP, UDP, 
and ICMP are likely to be the only reliable IP protocols for the 
foreseeable future on the internet. (As in, inter-domain)


But QUIC runs on UDP - it is not a new protocol, we are just using 
stupid UDP. UDP nat is as old as nat itself.
And anyway QUIC is dead and all the development goes now over its 
successor - HTTP/3.


--
Grzegorz Janoszka


Re: IPv6 and CDN's

2021-11-27 Thread Grzegorz Janoszka

On 26/11/2021 22:47, Jean St-Laurent via NANOG wrote:
"And when IPv6 is in use, the median connection setup is 1.4 times 
faster than IPv4. This is primarily due to reduced NAT usage and 
improved routing."


Oh I believe IPv6 is faster but because of completely different reasons.
Modern faster connections more likely have IPv6 while old low-bandwidth 
circuits may provide v4 only.


Some users may also use VPN which is almost always v4 only. Their VPN 
may do funny routing, hair-pinning and similar behavior thus impacting 
their performance.


--
Grzegorz Janoszka


Re: "Tactical" /24 announcements

2021-08-09 Thread Grzegorz Janoszka

On 2021-08-09 17:47, Billy Croan wrote:

How does the community feel about using /24 originations in BGP as a
tactical advantage against potential bgp hijackers?


RPKI is more effective than a competing /24. Unless they hijack you ASn 
as well.


--
Grzegorz Janoszka


Re: COVID-19 vs. our Networks

2020-03-17 Thread Grzegorz Janoszka

On 2020-03-16 15:04, Alexandre Petrescu wrote:
There is no other way to do that information filterning now. Nobody has 
any authority of knowing better than others.


There is a good word for information filtering. It is called 'censorship'.

Times like now are perfect opportunity to limit the remains of our freedom.

Please think twice before you complain for lack of information 
filtering. Because the government will surely make you happy.


--
Grzegorz Janoszka


Re: Equinix

2019-12-05 Thread Grzegorz Janoszka

On 05/12/2019 17:10, Martijn Schmidt via NANOG wrote:

You're probably best off ordering those crossconnects through the
Equinix portal, then you can choose the exact positions for the order
that goes to the facility rather than relying on a human to transcribe
them correctly from your PDF.


If only Equinix portal reflected how your patch panels really look like...

--
Grzegorz Janoszka


nanog@nanog.org

2019-10-15 Thread Grzegorz Janoszka



Hi,

Whenever I try to send something to emails in @att.net I get a reply:

host ff-ip4-mx-vip1.prodigy.net[144.160.159.21] said:
553 5.3.0 flph831 DNSBL:RBL 521< MY.IP4.ADD.RES >_is_blocked.For 
assistance

forward this error to abuse_...@abuse-att.net (in reply to MAIL FROM
command)

Of course emails to abuse_rbl go unanswered.

My IP turns clean on https://www.dnsbl.info/ (all green and one blue 
timeout).


Anyone had such issues? Any working contacts to AT&T email?

Any help appreciated.

--
Grzegorz Janoszka


Re: This DNS over HTTP thing

2019-10-01 Thread Grzegorz Janoszka

On 01/10/2019 09:22, Brandon Butterworth wrote:

Here are some UKNOF presentations on it -

Also very interesting from NLNOG (but in English):

https://www.youtube.com/watch?v=pjin3nv8jAo

--
Grzegorz Janoszka


Re: well-known Anycast prefixes

2019-03-19 Thread Grzegorz Janoszka

On 2019-03-19 21:04, Hansen, Christoffer wrote:

https://github.com/netravnen/well-known-anycast-prefixes/blob/master/list.txt
PR's and/or suggestions appreciated! (Can be turned into $lirDB friendly
format->style RPSL)


Most DNS root servers are anycasted.

--
Grzegorz Janoszka


Re: Rising sea levels are going to mess with the internet

2018-07-23 Thread Grzegorz Janoszka

On 23/07/2018 20:03, Owen DeLong wrote:

It shows China, the most heavy handed of the three economies in the graphic as 
having an accelerating growth in carbon emissions. It does show that the EU 
started a downward trend earlier than the US, but that the downward trend in 
the EU appears to be leveling off and the US downward trend looks to be steeper 
now and accelerating.

In addition, if you drill down to the individual EU countries, several of them 
are, in fact, headed up while the more market-based members of the EU seem to 
be headed down or having leveled off after a sharp decline earlier.


The data is flawed. The carbon emissions per country don't include 
import, so you can just import the most carbon-heavy product from China 
and you will see your country emissions falling and China's growing.


And the carbon emission of USA doesn't include Pentagon, while any other 
army is included in it's country numbers.


So we can' really compare such flawed data - these are just numbers for 
politicians but they have nothing in common with reality.


Regarding rising sea levels - I wonder why nobody mentioned submarine 
fiber landing stations. If something will be affected, it will be them.


--
Grzegorz Janoszka


Re: New Active Exploit: memcached on port 11211 UDP & TCP being exploited for reflection attacks

2018-02-28 Thread Grzegorz Janoszka

On 2018-02-28 13:42, Denys Fedoryshchenko wrote:
I want to add one software vendor, who is major contributor to ddos 
attacks.
Mikrotik till now shipping their quite popular routers, with wide open 
DNS recursor,
that don't have even mechanism for ACL in it. Significant part of DNS 
amplification attacks

are such Mikrotik recursors.
They don't care till now.


I have mixed experiences with Mikrotik, but I don't think they would do 
such a stupid thing. A friend of my has three offices and each one has 
mikrotik to form tunnels and one domain for all the company.


He is not too IP savvy, so he copy-pasted the VPN config from internet 
and left the rest as it was. His routers are not open DNS resolvers.


When I asked them I got no reply and their logs showed:

_drop input: in:ether1 out:(unknown 0), src-mac 00:AB:CD:81:c2:71, proto 
UDP, AAA.47.138.134:9082->BBB.146.251.103:53, len 51


His settings showed the DNS server ON with all the queries for the local 
network and he actually had a toggle "allow remote queries" on, but his 
routers were not open resolvers.


--
Grzegorz Janoszka


Re: Question about Customer Population by ASN for Canada

2017-10-02 Thread Grzegorz Janoszka

On 2017-10-02 21:57, Jacques Latour wrote:

The question I have is why does OVH come #6 with an estimated population of 
1,480,927 behind its ASN? Remember these are actual placement of ads.  Should I 
count those users as part of my stats?


I would say VPN - OVH has cheap servers and is quite popular in this 
industry. There are countries where many active users have to use a sort 
of VPN to access banned sites.


So they are users, but rather not from Canada.

--
Grzegorz Janoszka


Re: MTU

2016-07-22 Thread Grzegorz Janoszka

On 2016-07-22 20:20, Phil Rosenthal wrote:

On Jul 22, 2016, at 1:37 PM, Grzegorz Janoszka  wrote:
What I noticed a few years ago was that BGP convergence time was faster with 
higher MTU.
Full BGP table load took twice less time on MTU 9192 than on 1500.
Of course BGP has to be allowed to use higher MTU.

Anyone else observed something similar?


I have read about others experiencing this, and did some testing a few months 
back -- my experience was that for low latency links, there was a measurable 
but not huge difference. For high latency links, with Juniper anyway, there was 
a very negligible difference, because the TCP Window size is hard-coded at 
something small (16384?), so that ends up being the limit more than the tcp 
slow-start issues that MTU helps with.


I tested Cisco CRS-1 (or maybe already upgraded to CRS-3) to Juniper 
MX480 or MX960 on about 10 ms latency link. It was iBGP carrying 
internal routes plus full BGP table (both ways).
I think the bottleneck was CPU on the CRS side and maxing MSS helped a 
lot. I recall doing later on tests Juniper to Juniper and indeed the 
gain was not that big, but it was still visible.


Juniper command 'show system connections' showed MSS around 9kB. I 
haven't checked TCP Window size.


--
Grzegorz Janoszka


Re: MTU

2016-07-22 Thread Grzegorz Janoszka

On 2016-07-22 15:57, William Herrin wrote:

On a link containing only routers, you can safely increase the MTU to
any mutually agreed value with these caveats:


What I noticed a few years ago was that BGP convergence time was faster 
with higher MTU.

Full BGP table load took twice less time on MTU 9192 than on 1500.
Of course BGP has to be allowed to use higher MTU.

Anyone else observed something similar?

--
Grzegorz Janoszka


Re: Internet Exchanges supporting jumbo frames?

2016-03-09 Thread Grzegorz Janoszka

On 09/03/2016 15:26, Kurt Kraut via NANOG wrote:

Could anyone share with me Internet Exchanges you know that allow jumbo
frames (like https://www.gr-ix.gr/specs/ does) and how you notice benefit
from it?


Netnod does it in separate vlan's.

--
Grzegorz Janoszka


Re: How to force rapid ipv6 adoption

2015-10-02 Thread Grzegorz Janoszka

On 02/10/2015 04:52, Curtis Maurand wrote:

If Time Warner (my ISP) put up IPv6  tomorrow, my firewall would no longer 
work.  I could put up a pfsnse or vyatta  box pretty quickly, but my off the 
shelf Cisco/Linksys  home router has no ipv6 support hence the need to replace 
the hardware.  There's no firmware update for it supporting ipv6 either.  There 
would be millions of people in the same boat.


There should be a software for your box which supports IPv6 - DD-WRT or 
anything similar. However I agree that it is not a solutions for 
millions of Johnny Sixpacks.


--
Grzegorz Janoszka


Re: How to force rapid ipv6 adoption

2015-10-01 Thread Grzegorz Janoszka

On 2015-10-01 20:29, Owen DeLong wrote:

However, I think eventually the residential ISPs are going to start charging 
extra
for IPv4 service.


ISP's will not charge too much. With too expensive IPv4 many customers 
will migrate from v4/dual stack to v6-only and ISP's will be left with 
unused IPv4 addresses and less income.


Will ISP's still find other profitable usage for v4 addresses? If not, 
they will be probably be quite slowly rising IPv4 pricing, not wanting 
to overprice it.


Even with $1/IPv4/month - what will be the ROI of a brand new home router?

--
Grzegorz Janoszka


Route leak in Bangladesh

2015-06-30 Thread Grzegorz Janoszka


We have just received alert from bgpmon that AS58587 Fiber @ Home 
Limited has hijacked most of our (AS43996) prefixes and Hurricane 
Electric gladly accepted them.


Anybody see their prefixes hijacked as well?

--
Grzegorz Janoszka


Re: Open letter to Level3 concerning the global routing issues on June 12th

2015-06-13 Thread Grzegorz Janoszka

On 2015-06-13 12:34, Mark Tinka wrote:

I know the largest transit providers tend to be more relaxed for various
reasons. Some rely on filters generated by IRR entries, others don't.


Actually I had pretty good experiences with Level3 as it has been years 
as they could use IRR filters to update automatically your prefix list. 
I remember that Level3 was one of the first carriers to enable that 
feature and several years afterwards there were still global networks 
(tier1) that could only do static prefix-lists.


--
Grzegorz Janoszka


Re: Peering and Network Cost

2015-04-15 Thread Grzegorz Janoszka

On 2015-04-15 19:50, Max Tulyev wrote:

transit cost is lowering close to peering cost, so it is doubghtful
economy on small channels. If you don't live in
Amsterdam/Frankfurt/London - add the DWDM cost from you to one of major
IX. That's the magic.

In large scale peering is still efficient. It is efficient on local
traffic which is often huge.


Even in the three cities you mentioned peering on small scale is usually 
not cheaper at all or only very little.


Please keep in mind that some companies peer despite it offers no 
savings for them and at the end of the day it might be even more 
expensive. They do it because of performance and reliability reasons.


--
Grzegorz Janoszka


Re: AS6713 (aka IAM / MOROCCO TELECOMS) peering contact

2014-12-27 Thread Grzegorz Janoszka


Isn't it better actually to use they?

https://en.wikipedia.org/wiki/Singular_they

--
Grzegorz Janoszka


On 2014-12-27 20:35, Clayton Zekelman wrote:


That is why the better pronoun choice would have been 'you', not 'he' or 'she'.

Sent from my iPhone


On Dec 27, 2014, at 1:47 PM, Javier J  wrote:

What if they don't identify as a he or a she?


On Fri, Dec 26, 2014 at 6:46 PM, Clayton Zekelman  wrote:
What if the peering team member is a she?  Should she not contact you if so?

Sent from my iPhone


On Dec 26, 2014, at 5:48 PM, Youssef Bengelloun-Zahr  wrote:

Hello,

If someone from IAM peering team is watching, could he please get in touch
OFF-list please ?

Best regards.

--
Youssef BENGELLOUN-ZAHR




Re: Applications that break when not using /64

2014-06-18 Thread Grzegorz Janoszka

On 17/06/14 23:13 , Jeroen Massar wrote:

Thus, can you please identify these applications so that we can hammer
on the developers of those applications and fix that problem?


I haven't done extensive testing. I have just tried to divide a /64 into 
smaller subnets and to run Debian and Windows on it (as Matthew Petach 
did with his FreeBSD). I think I have tried /112 or /120. Debian was 
mostly fine, just one torrent or newsgroups client couldn't do v6 (can't 
recall which one), with Windows it was a different story and basically 
nothing really worked.


It was some time ago and I haven't tried Windows 7 SP1, maybe it has 
been fixed till now. Does anyone have Windows with IPv6 and netmask > /64?


--
Grzegorz Janoszka


Re: Credit to Digital Ocean for ipv6 offering

2014-06-17 Thread Grzegorz Janoszka

On 2014-06-17 22:13, David Conrad wrote:

On Jun 17, 2014, at 12:55 PM, Grzegorz Janoszka  wrote:

There are still applications that break with subnet smaller than /64, so all 
VPS providers probably have to use /64 addressing.


Wouldn't that argue for /64s?


/64 netmask, but not /64 for a customer. There are application which 
break if provided with /80 or /120, but I am not aware of an application 
requesting /64 for itself.



/64 for one customer seems to be too much,


In what way? What are you trying to protect against? It can't be address 
exhaustion (there are 2,305,843,009,213,693,952 possible /64s in the currently 
used format specifier. If there are 1,000,000,000 customer assignments every 
day of the year, the current format specifier will last over 6 million years).


Too much hassle, like too big config of your router. If you have 1000 
customers in a subnet, you would have to have 1000 separate gateway IP's 
on your router interface plus 1000 local /64 routes.


--
Grzegorz Janoszka


Re: Credit to Digital Ocean for ipv6 offering

2014-06-17 Thread Grzegorz Janoszka

On 2014-06-17 21:46, David Conrad wrote:

No, 8 individual IPv6 addresses.

Wow. Harsh.  I burn more than that just in my living room.

I don't think that is too harsh as all 8 are assigned to a single server. So if 
I have three VPS's, I have 24 total addresses.

In the case of my 3 VPS's, I've received /64s from both RootBSD.net and Arp 
Networks or 55,340,232,221,128,654,848 addresses. I'm not sure I see a 
rationale for assigning 8 addresses. That is, I could understand assigning a 
single address or a /64 but 8 addresses? I'd think that'd be more 
complicated/error prone than either the /128 or /64 options. A bit odd.


There are still applications that break with subnet smaller than /64, so 
all VPS providers probably have to use /64 addressing.


/64 for one customer seems to be too much, on the other side 8 IP's can 
be not enough in some cases. I think 65536 out of shared /64 for one 
server can be enough. You can easily automate provisioning and reverse 
DNS assuming you assign /112 for each server.
If you block SLAAC and provide connectivity to only the static IP's, 
your abuse folks should appreciate it (yes, I know you can spoof v6).


--
Grzegorz Janoszka


Re: Fundamental questions of backbone design

2013-10-18 Thread Grzegorz Janoszka

On 2013-10-18 20:03, Anurag Bhatia wrote:

1. As I understand it's (sort off) common practice to give highest
localpref to customer routes then peering and finally transit. Does this
works well or you see issues with people who have 10+ prepends on some
peering routes calling you to not send traffic via those circuits? Does it
makes sense to put a rule to avoid routes 2-3 AS path away when changing
local preference?


Hi,
You may try a different trick on peering routes. You rather don't peer 
with the tier 1 networks, so you may filter out (or assign a low 
localpref to) all prefixes received from peering partners which contain 
in as-path some well known asn's, like let's say 174, 1299, 3356 and so 
on. Such routes are most likely leaked and traffic via those paths will 
be either blackholed or, in the best case, going via not really optimal 
path.



2. If I have more peering capacity and relatively less capacity between
my own PoPs and I start injecting routes in my IGP then how to prevent
change of choking of backbone? Is it standard practice to have more
capacity on backbone then peering links? Or I have to inject less routes in
IGP - say a few % of total routes?


You may always prefer peering routes local to the PoP (giving them the 
highest localpref). This way you will not carry so much traffic on your 
backbone.


--
Grzegorz Janoszka




Re: BGPmon.net /32 hijack alerts

2013-07-26 Thread Grzegorz Janoszka
On 26-07-13 14:59, NetSecGuy wrote:
> BGPMon.net has alerted me to /32 hijacks.  Does anyone have thoughts on
> what this might be and if it's malicious or misconfiguration?
> My first thought is leaked null routes.Is this even worth alerting on?

We had similar cases. In most cases they appeared to be indeed leaked null 
routes.

-- 
Grzegorz Janoszka



Re: Google's QUIC

2013-06-29 Thread Grzegorz Janoszka

I am surprised nobody mentioned security issues. To minimize latency the
following would be best: the client sends one UDP packet and receives
stream of UDP packets with page code, styles, images and whatever else
could be needed. The waiting time is just RTT plus browser processing.

It is a great amplification tools, isn't it? There are pages which
require loading megabytes of data just for one request, so definitely
more than 1000 UDP packets (MTU 1500). Amplification factor 1:1000+ in
packets, 1:1+ in octets :)

Of course you can add to the protocol some small initial response, key
exchange, whatever, but then the page appears after N*RTT, which is
already happening with TCP now.

I am sure Google considered it, so I am really curious how they are
going to solve it.

-- 
Grzegorz Janoszka



Re: /25's prefixes announced into global routing table?

2013-06-22 Thread Grzegorz Janoszka
On 22-06-13 17:30, Owen DeLong wrote:
> Looking at the number of autonomous systems in the IPv6 routing table and the 
> total number of routes, it looks like it will shake out somewhere in the 
> neighborhood of 3-5 prefixes/ASN. Since there are ~35,000 unique ASNs in the 
> IPv4 table, I figured simple multiplication provided as good an estimate as 
> any at this early time.

Deaggregating of IPv4 announcements is done for traffic engineering and
to fight ddoses (just the attacked /24 stops being announced to
internet). I think some people will just copy their v4 habits into v6
and then we might have explosion of /48's.
I wouldn't be so sure about just 3-5 prefixes/ASN.

-- 
Grzegorz Janoszka



Re: /25's prefixes announced into global routing table?

2013-06-21 Thread Grzegorz Janoszka
On 21-06-13 21:56, Michael McConnell wrote:
> As the IPv4 space get smaller and smaller, does anyone think we'll see a time 
> when /25's will be accepted for global BGP prefix announcement. The current 
> smallest size is a /24 and generally ok for most people, but the crunch gets 
> tighter, routers continue to have more and more ram will it always be /24 the 
> smallest size?

As the fragmentation will progress and we will be closing to the magic
limit of 500.000, people will filter out /24 and then /23 and so on.
Back to static (default) routing!

-- 
Grzegorz Janoszka



Re: Color vision for network techs

2012-08-31 Thread Grzegorz Janoszka
On 31-08-12 16:15, Berry Mobley wrote:
> Do any of you do any color vision screening in your interview process?
> How do those of you with color vision impairments compensate? I'd never
> considered this until I was in one of our facilities with my son (who
> has limited color vision) and we had a discussion about the LEDs. He
> could only determine on/off - not amber/red/green on the equipment we
> had. I'm wondering if we need a color vision requirement (or test) as
> part of our hiring requirements.

I have troubles with orange-yellow-greenish colors. Red is fine, most of
greens as well. Already 15 years within the industry, several different
jobs. Nobody ever asked me, but I think I mentioned it to all potential
employers during interviews. For some of them it was funny or even
interesting but I don't think anybody considered it as my disadvantage.
Despite in most cases I cannot tell amber LED from yellow or orange one,
I don't think it affects my duties. Usually different colors have also
different luminosity, so shortly you learn characteristics of different
products, like that with Cisco amber is the "darker one".
I have also seen blades with broken LED's that had all the colors but
one (like 6704 port with green and no amber), so to be 100% sure one
should always check the console.

-- 
Grzegorz Janoszka



Re: Level 3 BGP Advertisements

2012-08-29 Thread Grzegorz Janoszka
On 29-08-12 22:55, STARNES, CURTIS wrote:
> We are announcing our /19 network as one block via BGP through AT&T, not 
> broken up into smaller announcements.
> Earlier in the year I started receiving complaints that some of our client 
> systems were having problems connecting to different web sites.
> After much troubleshooting I noticed that in every instance the xlate in our 
> Cisco ASA for the client's IP last octet was either a 0 or 255.
> Since I am announcing our network as a /19, the subnet mask is 255.255.224.0, 
> that would make our network address x.x.192.0 and the broadcast x.x.223.255.
> So somewhere the /24 boundary addresses were being dropped.
> 
> Just curious if anyone else has seen this before.

Yes, actually there are people over Internet blocking all IP's ending
with 0 or 255 as a kind of bogon or other old wives' tale.

-- 
Grzegorz Janoszka



Re: using "reserved" IPv6 space

2012-07-15 Thread Grzegorz Janoszka
On 2012-07-15 15:30, Scott Morris wrote:
>> There was also in the past fec0::/10. For BGP updates you should be safe
>> to filter out FC00::/6.
> Unless I've missed something, RFC4193 lays out FC00::/7, not the /6.  So
> while FE00::/7 may yet be unallocated, I don't think I'd set filters in
> that fashion.
> Reasonably, wouldn't it be more likely to permit BGP advertisements
> within the 2000::/3 range as that's the "active" space currently?

FF00::/8 are multicast, FE80::/10 are reserved for link-local. In the
past you had FEC0::/10 as a kind of private addresses.

Allowing 2000::/3 is fine as well. Btw - what are the estimates - how
long are we going to be within 2000::/3?

-- 
Grzegorz Janoszka





Re: using "reserved" IPv6 space

2012-07-15 Thread Grzegorz Janoszka
On 2012-07-15 00:45, Tony Hain wrote:
> There is no difference in the local filtering function, but *IF* all transit
> providers put FC00::/7 in bogon space and filter it at every border, there
> is a clear benefit when someone fat-fingers the config script and announces
> what should be a locally filtered prefix (don't we routinely see unintended
> announcements in the global BGP table).   I realize that is a big IF, but

There was also in the past fec0::/10. For BGP updates you should be safe
to filter out FC00::/6.

-- 
Grzegorz Janoszka





Re: IPv6 explicit BGP group configs

2012-02-08 Thread Grzegorz Janoszka
On 08-02-12 17:59, keith tokash wrote:
> I'm prepping an environment for v6 and I'm wondering what, if
>  any, benefit there is to splitting v4 and v6 into separate groups.  
> We're running Junipers and things are fairly neat and ordered; we have 
> multiple links to a few providers in many sites, so we group them and 
> apply the policies at the group level.  We could stick the new v6 
> neighbors into the same group and apply the policies at the neighbor 
> level, or create new groups (i.e. Level3 and Level3v6).

Sometimes we have the same group for v4 and v6, but in most cases we
have different ones. One of the basic reasons is different max-pref setting.

Most policies can be used in two address families, you can also match
prefixes, but you cannot have v4 and v6 prefixes in one term. So in your
policies you have to have at least two terms - one for v4 prefixes, one
for v6 prefixes.

-- 
Grzegorz Janoszka



Re: MD5 considered harmful

2012-01-27 Thread Grzegorz Janoszka
On 27-01-12 21:52, Patrick W. Gilmore wrote:
> Who would want to reset a BGP that will come back up in 30-90 seconds when 
> you can packet an entire router off the 'Net easier, more quickly, and for 
> longer a period?

+1

Actually, when you have lot of MD5 BGP session coming up at the same
time (a connection to internet exchanges went up), you have longer
convergence time because of higher cpu load. MD5 offers no security
advantages and in some cases it causes more downtime by slowing down
convergence.

-- 
Grzegorz Janoszka



Another internet depeering?

2011-09-09 Thread Grzegorz Janoszka

Telia (AS1299) stopped announce some prefixes to us, ie 83.8.0.0/13. Is
it another internet depeering? Do you also see it?

-- 
Grzegorz Janoszka



Re: Cogent IPv6

2011-06-09 Thread Grzegorz Janoszka
On 09-06-11 14:01, Chuck Anderson wrote:
> Please don't use /127:
> 
> Use of /127 Prefix Length Between Routers Considered Harmful
> http://tools.ietf.org/html/rfc3627

Well, this RFC says not to use PREFIX::/127. You are safe to use other
/127's within your prefix.

-- 
Grzegorz Janoszka



Re: IPv6: numbering of point-to-point-links

2011-01-24 Thread Grzegorz Janoszka
On 24-01-11 13:59, Carlos Friacas wrote:
> Using /126s or /127s (or even /120s) is a result of going with the v4
> mindset of conservation.

Not only, there are some other advantages of using /126's, like reducing
number of ND requests on the link and the size of neighbor tables.

-- 
Grzegorz Janoszka



Re: IPv6

2010-11-21 Thread Grzegorz Janoszka

On 21-11-10 22:31, Cameron Byrne wrote:

Yahoo just dropped in on the IPv6 content party
http://ipv6.weather.yahoo.com/
I just bookmarked it.  Well done Yahoos.


Well,

ipv6.ycpi.ops.yahoo.net has IPv6 address 2a00:1288:f006:1fe::1000
ipv6.ycpi.ops.yahoo.net has IPv6 address 2001:4998:f00b:1fe::1000
ipv6.ycpi.ops.yahoo.net has IPv6 address 2001:4998:f011:1fe::1000

In my bgp I see only the first address, I don't see any path to two 
others. Do you have the route to them?


--
Grzegorz Janoszka



Re: Did your BGP crash today?

2010-08-27 Thread Grzegorz Janoszka

On 27-08-10 20:41, Thomas Mangin wrote:

I think most of the impact was limited to Europe, especially Amsterdam area.

Yes, It had an effect on ISPs which are connected to RIS. 
http://www.ripe.net/ris/
AFAIK this mean ASes at LINX and AMS-IX . The LINX graph shows a similar (but 
smaller) dip of 50-60 GB.


Not only. We don't peer with RIS, but about 8-10 our peers announce to 
us RIS. The nasty update we got from completely different AS, not RIS.


You may just check whether you see AS12654 - it is RIS.

--
Grzegorz Janoszka



Re: Did your BGP crash today?

2010-08-27 Thread Grzegorz Janoszka

On 27-08-10 19:31, valdis.kletni...@vt.edu wrote:

On Fri, 27 Aug 2010 19:27:06 +0200, Kasper Adel said:

Havent seen a thread on this one so thought i'd start one.

Ripe tested a new attribute that crashed the internet, is that true?


If it in fact "crashed the internet", as opposed to "gave a few buggy routers
here and there indigestion", you wouldn't be posting to NANOG looking for
confirmation. :)


https://www.ams-ix.net/statistics/

Not whole internet, but a part. And the "few buggy routers here and 
there" were mostly Cisco CRS-1's which didn't understand the new 
attribute and sent a malformed message to all peers, causing them to 
close the BGP session.


I think most of the impact was limited to Europe, especially Amsterdam area.

--
Grzegorz Janoszka



Re: Mikrotik RouterOS

2010-04-12 Thread Grzegorz Janoszka

On 12-4-2010 21:44, Gustavo Santos wrote:

its was an old bug, that had been fixed for a while..


You should still keep in mind Mikrotik is just Linux, with all its 
(dis)advantages, plus some scripts and weird CLI.


--
Grzegorz Janoszka



Re: Peering Exchange Configurations

2010-04-08 Thread Grzegorz Janoszka

On 8-4-2010 18:02, Brad Fleming wrote:

1) Is a private AS typically used for the exchange side of the session?


No.


2) Are RFC1918 IPs typically used for the p2p links into the exchange?


No. In EU usually it is separate public /24, /23 or /22. The IPv6 range 
in RIPE region for exchanges is assigned from within special pool 
2001:7f8::/32 (each IX gets /48).



3) Do peering exchanges typically remove their AS from the path
advertised to exchange participants?


The direct peering is between participants AS'es, there is nothing in 
between, including IX AS. Route-servers based on Cisco box put their AS 
number in between, but Quagga/Bird usually remove the IX as, however it 
may be configured per peer not to do so.



3a) If no: Do participants typically preference exchange-learned routes
over other sources?


Most do.


4) Do exchanges typically support the following address families?
IPv4 Multicast


no


IPv6 Unicast


Almost all.


IPv6 Multicast


No.


In exchanges where a route server is employed:
4) Do participants have a p2p link into a simple routing environment
then multi-hop to a route server?


Route-server is just like one of the members of the exchange. You get 
/23 or similar prefix of the exchange. You may have a BGP session with 
the route-server, but you are also free to have direct BGP sessions with 
other parties. Route-servers are mostly used by peers with open peering 
policies, but you still may steer your announcements basing on BGP 
communities.



5) I see that Bird, OpenBDGd, and Quagga are all options for route
server software. Does one of those packages stand out as the clear
current choice for production peering exchanges?


Quagga was used most often, but recently most biggest EU exchanges 
replaced it with Bird and it is much more stable.


--
Grzegorz Janoszka



China prefix hijack

2010-04-08 Thread Grzegorz Janoszka


Just half an hour ago China Telecom hijacked one of our prefixes:

Your prefix:  X.Y.Z.0/19:
Prefix Description:   NETNAME
Update time:  2010-04-08 15:58 (UTC)
Detected by #peers:   1
Detected prefix:  X.Y.Z.0/19
Announced by: AS23724 (CHINANET-IDC-BJ-AP IDC, China 
Telecommunications Corporation)

Upstream AS:  AS4134 (CHINANET-BACKBONE No.31,Jin-rong Street)
ASpath:   39792 4134 23724 23724

Luckily it had to be limited as only one BGPmon peer saw it. Anyone else 
noticed it?


--
Grzegorz Janoszka



Re: DNS server software

2010-02-22 Thread Grzegorz Janoszka

On 22-2-2010 15:39, Phil Regnauld wrote:

PowerDNS also has an open source solution (www.powerdns.com). PowerDNS
is easily modified with custom backends (using a simple pipe interface).

All of the above support DNSSEC.


I do not think so:

http://en.wikipedia.org/wiki/Comparison_of_DNS_server_software

DNSSEC support in PowerDNS is currently restricted to being able to 
serve DNSSEC-related RRs. No further DNSSEC processing takes place.


I have reviewed all popular DNS software recently, PowerDNS was really 
OK, but eventually I have decided not to go with it due to lack of full 
DNSSEC support.


--
Grzegorz Janoszka



Re: Using /126 for IPv6 router links

2010-01-27 Thread Grzegorz Janoszka

On 27-1-2010 2:16, Steve Bertrand wrote:

  ip address x.x.x.x 255.255.255.252
  ipv6 address 2607:F118:x:x::/64 eui-64
  ipv6 nd suppress-ra
  ipv6 ospf 1 area 0.0.0.0
I've found that this setup, in conjunction with iBGP peering between
loopback /128's works well.


When OSPFv3 goes down and you are trying to debug, what IPv6 will you 
ping to check if the second side is accessible?


--
Grzegorz Janoszka



Re: Using /126 for IPv6 router links

2010-01-26 Thread Grzegorz Janoszka

On 26-1-2010 1:33, Owen DeLong wrote:

-   "Waste" of addresses
-   Peer address needs to be known, impossible to guess with 2^64 addresses

Most of us use ::1 for the assigning side and ::2 for the non-assigning side of
the connection.  On multipoints, such as exchanges, the popular alternative is
to use either the BCD of the ASN or the hex of the ASN for your first connection
and something like ::1:AS:N for subsequent connections.


If you have shared racks with different customers within, you can use 16 
or 32 bits out of 64 as customer ID, allowing the customer to use the 
rest, so in fact giving him trillions (possible) IP's for one server.
It can be use with autoconfiguration which always has FF:FE in the 
middle - you just use some other bits here for your customer 
assignments. Thus you identify a customer just by looking at the IP address.


--
Grzegorz Janoszka



Re: Minimum IPv6 size

2009-11-12 Thread Grzegorz Janoszka

Christian Seitz wrote:

There ist also a loose and a strict filter recommendation by Gert Doering [1],
but the strict filter is very strict at the moment. It allows only /48s from
RIPEs IPv6 PI space 2001:678::/29 for example, although RIPE currently also
assignes /47 or /46 from this range. Also there should be some deaggregation
allowed. When RIPE allocates a /32 to a LIR and LIR has to deaggregate it for
some reason, because he cannot get a second /32, he should be able to use (eg.)
4 bits for deaggreation. I don't want to see a /48 where RIPE allocates only /32
prefixes, but I would accept prefixes up to a /36.

[1] http://www.space.net/~gert/RIPE/ipv6-filters.html


I was thinking about such filters still for v4. Does anyone know if
there are any /8's which have no /24 prefixes assigned? I thought about
filtering out all deaggregated /24's from such /8's. (I care more about
memory of my routers than on a traffic profile of a small company on
another continent).

Another thing:

http://www.db.ripe.net/whois?form_type=simple&full_query_string=&searchtext=193.34.199.0&submit.x=0&submit.y=0&submit=Search 




This is a normal /25 assigned as PI with route record /25. Are they
assigned in any given /8 prefix? If yes, you could easily allow /25's
from given /8.

--
Grzegorz Janoszka




Re: Redundancy & Summarization

2009-08-21 Thread Grzegorz Janoszka

Gaynor, Jonathan wrote:

My institution has a single /16 spread across 2 sites: the lower /17 is
used at site A, the upper /17 at site B.  Sites A & B are connected
internally.  Currently both sites have their own ISPs and only advertise
their own /17's.  For redundancy we proposed that each site advertise
both their own /17 and the whole /16, so that an ISP failure at either
site would trigger traffic from both /17s to reconverge towards the
unaffected location.

My worry/question: will carriers down the line auto-summarize my
advertisements into a single /16, resulting in a 'load sharing' while
both sites are active?  If you're a backbone carrier and you saw x.x/16
and x.x/17 (or x.x/16 and x.x.128/17) being advertised from the same
peer would you drop the longer match?


No, BGP does not work this way. But you may force some carriers to have 
only /16. First, you may try to announce the /17's with the community 
no-export, so they will be seen only by your direct ISP, not by the rest 
of the world. Or you may try to use some other communities to limit 
announcements of your shorter prefixes, only to some part of the world.


--
Grzegorz Janoszka



Re: Google Over IPV6

2009-03-27 Thread Grzegorz Janoszka

Robert D. Scott wrote:

When I posted my original note, I was not really looking for end user
feedback, but rather is anyone peering V6 with them on either a public
fabric or private peer. Any idea if they have native V6 transit, or are
tunneling, and to where.


No tuneling I think. We have with them several peerings, IPv6 native 
together with IPv4.


--
Grzegorz Janoszka



Re: Google Over IPV6

2009-03-27 Thread Grzegorz Janoszka

Daniel Verlouw wrote:

yes. We participate in the Google IPv6 trial program so our recursors
get  records for www.google.com and so far it's been great, no
issues whatsoever.


Same experiences - it just works.

dan...@jun1> traceroute www.google.com
traceroute6 to www.l.google.com (2001:4860:a003::68) from

2001:7f8:1::a501:2859:2, 64 hops max, 12 byte packets
 1  pr61.ams04.net.google.com (2001:7f8:1::a501:5169:1)  2.388 ms  1.798
ms  1.712 ms
 2  2001:4860::23 (2001:4860::23)  8.664 ms  8.480 ms  8.364 ms
 3  2001:4860:a003::68 (2001:4860:a003::68)  8.624 ms  8.639 ms  8.719
ms


Yes, but only www records have  record, the domain (google.com 
without www prefix) is still IPv4 only.



--
Grzegorz Janoszka



Re: What is the most standard subnet length on internet

2008-12-23 Thread Grzegorz Janoszka

Nathan Ward wrote:

Let me rephrase; Are there people who are filtering /24s received from
eBGP peers who do not have a default route?


of course.


Curiously, it was really meant as a rhetorical question where the answer 
was "no".


Why are people doing this? Are they lacking clue, or, is there some 
reasonable purpose?


Memory mostly I think. /24 prefixes are ~ the half of all prefixes, but 
they cover only a small percent of the address space.
If your router has > 6 full BGP sessions, you can filter /24 on half of 
them, your memory usage will drop significantly.


--
Grzegorz Janoszka
Leaseweb