[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: RIR bashing, was: Routing table size?



On zondag, okt 12, 2003, at 17:02 Europe/Amsterdam, Jeroen Massar wrote:

If you want to be 'visible' with a smaller block you are an
enduser

Or a root nameserver...

Which get /32's too but for an obvious reason.

Not so obvious... They need one address. What are the other 79228162514264337593543950335 for?


It's a shame really that people as a rule still don't get it. In the old days, the root servers had an address, and we used the named.root file (wasn't it called something else back then or am I confused with named.boot?) to find them. But we're doing so many routing tricks with these addresses now that it makes much more sense to group all the address blocks for all the roots together in a special range. Bonus: we get to hardcode the root addresses now too, as we're now no longer modifying the root addresses when something changes, but keep the addresses and change the routing.

(Do some traces for www.bgpexpert.com.)

traceroute6 2001:888:1DDE:2:0:0:0:1

7 ipv6tb.xs4all.nl (2001:888:0:3::4242) 11.033 ms 10.373 ms 10.962 ms
8 tunnel3550.ipv6.xs4all.nl (2001:888:10:dde::2) 35.457 ms 43.098 ms 35.897 ms
9 3ffe:2500:310:1:200:cff:fe3e:6052 (3ffe:2500:310:1:200:cff:fe3e:6052) 36.448 ms 35.899 ms *
10 sequoia.muada.com (2001:888:1dde:2::1) 57.616 ms 50.246 ms 56.188 ms

I wonder where hop 9's packets came from and how the flow to me.

gw#trace Protocol [ip]: ipv6 Target IPv6 address: 3ffe:8114:2000:240:290:27ff:fe24:c19f

  1 2001:888:1DDE:1:204:27FF:FEFE:249F 4 msec 4 msec 4 msec
  2 2001:888:0:3::4242 36 msec 36 msec 48 msec
[...]

And:

gw#trace
Protocol [ip]:
Target IP address: www.unfix.org

  1 loopback.rhadamanthus.pine.nl (213.156.3.144) 12 msec 12 msec 8 msec
  2 fa0-0.rtr0002.asmr.pine.nl (213.156.0.29) 12 msec 12 msec 12 msec
  3 fa3-0-4-asd8ro2.enertel.nl (195.7.144.85) 16 msec 16 msec 16 msec
  4 fa0-0-0-asd8ro1.enertel.nl (195.7.144.149) 12 msec 12 msec 20 msec
  5 po11-1-0-asd7ro1.enertel.nl (195.7.144.2) 16 msec 12 msec 16 msec
  6 ams-ix.intouch.net (195.69.144.93) 16 msec 12 msec 20 msec
  7 217.8.101.250 16 msec 12 msec 16 msec

But this is a bit confusing as this router connects to ISP#1, which is also where its IPv4 default points to but its IPv6 default points to the router that connects to ISP#2, which has both its v4 and v6 defaults point to ISP#2 (I also have box that has a full v6 table but never mind (and I gave this router a 6bone address that belongs to the tunnel over ISP#1 to see if RIPng works if two routers don't share a subnet)):

hpromatem#trace
Protocol [ip]:
Target IP address: www.unfix.org

1 195.190.241.114 188 msec 96 msec 116 msec
2 32.ge-0-0-0.xr2.pbw.xs4all.net (194.109.5.201) 20 msec 160 msec 28 msec
3 0.ge-1-3-0.xr1.tc2.xs4all.net (194.109.5.6) 36 msec 12 msec 120 msec
4 telecity.ams-ix.intouch.net (195.69.144.175) 300 msec 276 msec 236 msec
5 217.8.101.250 244 msec 116 msec 156 msec


But indeed this is a case of multiple independent links
even though they are going over the same physical IPv4 path

Nope. One is over a "dark copper" pair with "vooroorlogse" 144 kbps baseband modems, the other over ADSL.


and are being tunneled.

Yup, in both cases the router terminating the line at the other side doesn't grok v6.


I personally see the situation where I would get two
independent ISP's, eg a cable and ADSL provider. They don't
have to know anything about eachother. The only thing they do
is that they each route a prefix from and to me as delegated out
of their TLA. My boxes thus would get 2 prefixes.

That's my current setup for my box in the colo room at ISP#1. It has a tunnel over the regular ISP#1 v4 connectivity (which is of course multihomed in its own right) and one to my house and then to ISP#2 over ADSL.


For routing
packets they will pick either prefix and send out packets.
Now if one link goes down TCP connections terminate. If there
would be a server type application on the box it would then
not be reachable.

Actually for incoming traffic this wouldn't be a huge problem as clients retry until they hit a working address (this actually works fairly well today). The trouble is the source address selection, and in the case of tunnels, seeing which one works and which one doesn't. And even when all of this works it still breaks existing connections.


Conclusion we need a way of notifying with
some trust/authentication that the IP of a certain host changed.

Actually that's not the hard part. Finding out the new address (assuming the internet protocol remains the same...) in such a way that an attacker can't get in the middle is harder.


IMHO the best solution would be a id/loc seperation thus only
using the ISP's prefixes in transit, the hosts would use the
ID prefixes and never know anything about the routing prefixes.

Hm, yes, not so simple...