[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

32.1.0.0/16 and v6 collateral damage



(resending because I don't think this made it through last time, please ignore any duplicates)


While hopefully this was an isolated incident, I thought I'd share a really strange problem that came up this week.

We had an ISP contact us saying we were announcing 32.1.73.0/24 (part of AT&T's space) which was breaking something for them. In fact, random subnets in 32.1.0.0/16 were showing up in their routing table going to all sorts of ASNs, which was confusing to them.

I checked our config, and could find no reason we would be announcing that /24 anywhere. It wasn't in our table, our prefix filters wouldn't have allowed it anyway, nor would our upstreams' filters. They flapped their BGP sessions, reloaded their router, and kept seeing it come back. Finally I did a little mental math on that address. Our v6 /32 is 2001:4978::. 0x20 = 32. 0x01 = 1. 0x49 = 73. Somehow, a router translated our v6 address into a v4 address, and passed it through. After a lot of head scratching at various NOCs, we identified a router between the ISP that contacted us and our network that had converted v6 addresses in its table into v4 addresses, preserved their AS path and other attributes, then readvertised them to customers.

The breakage was pretty limited, and went away after a reload. But, it makes me a bit curious as to how often things like this will reoccur when routers/hosts/software that have had zero v6 testing start getting exposed to v6 addresses. I'm sure it's unlikely that most brokenness will result in an application still working, yet converting a v6 address into some kind of v4 address.

Has anyone else seen any breakage involving 32.1.0.0/16 (2001::) or 32.2.0.0/16 (2002::)? Does anyone know if McLeod suffered any problems from 3ffe:: breaking 63.254.0.0/16 ?

-- Kevin