[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

32.1.0.0/16 and v6 collateral damage



(resending because I don't think this made it through last time, please ignore any duplicates)

While hopefully this was an isolated incident, I thought I'd share a really strange problem that came up this week.
We had an ISP contact us saying we were announcing 32.1.73.0/24 (part  
of AT&T's space) which was breaking something for them. In fact,  
random subnets in 32.1.0.0/16 were showing up in their routing table  
going to all sorts of ASNs, which was confusing to them.
I checked our config, and could find no reason we would be announcing  
that /24 anywhere. It wasn't in our table, our prefix filters wouldn't  
have allowed it anyway, nor would our upstreams' filters. They flapped  
their BGP sessions, reloaded their router, and kept seeing it come  
back. Finally I did a little mental math on that address. Our v6 /32  
is 2001:4978::. 0x20 = 32. 0x01 = 1. 0x49 = 73. Somehow, a router  
translated our v6 address into a v4 address, and passed it through.  
After a lot of head scratching at various NOCs, we identified a router  
between the ISP that contacted us and our network that had converted  
v6 addresses in its table into v4 addresses, preserved their AS path  
and other attributes, then readvertised them to customers.
The breakage was pretty limited, and went away after a reload. But, it  
makes me a bit curious as to how often things like this will reoccur  
when routers/hosts/software that have had zero v6 testing start  
getting exposed to v6 addresses. I'm sure it's unlikely that most  
brokenness will result in an application still working, yet converting  
a v6 address into some kind of v4 address.
Has anyone else seen any breakage involving 32.1.0.0/16 (2001::) or  
32.2.0.0/16 (2002::)? Does anyone know if McLeod suffered any problems  
from 3ffe:: breaking 63.254.0.0/16 ?
-- Kevin