Re: IPv6 Anycast has been killed by LINUX patch in 2016 - who cares?

Michael Tuexen <michael.tuexen@lurchi.franken.de> Mon, 09 August 2021 09:16 UTC

Return-Path: <michael.tuexen@lurchi.franken.de>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 722D43A0B10; Mon, 9 Aug 2021 02:16:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.489
X-Spam-Level:
X-Spam-Status: No, score=-1.489 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.399, SPF_NONE=0.001, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gV0MMJLcb_Gz; Mon, 9 Aug 2021 02:16:24 -0700 (PDT)
Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE3253A0B09; Mon, 9 Aug 2021 02:16:21 -0700 (PDT)
Received: from smtpclient.apple (ip1f100e9c.dynamic.kabel-deutschland.de [31.16.14.156]) (Authenticated sender: lurchi) by mail-n.franken.de (Postfix) with ESMTPSA id 2DA0F721E2828; Mon, 9 Aug 2021 11:16:12 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Subject: Re: IPv6 Anycast has been killed by LINUX patch in 2016 - who cares?
From: Michael Tuexen <michael.tuexen@lurchi.franken.de>
In-Reply-To: <CALx6S35-owqNLEyHUbQFukkFLz4sJPiRzcyv-k826-U6BOB1hA@mail.gmail.com>
Date: Mon, 09 Aug 2021 11:16:11 +0200
Cc: David Farmer <farmer@umn.edu>, 6man WG <ipv6@ietf.org>, IETF discussion list <ietf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <D795F834-13C3-41BF-AA1B-1C81449A814F@lurchi.franken.de>
References: <db8c1a5534e9412ebcfa37682d75f862@huawei.com> <C23D7023-B5B7-47C6-8AC5-65A98822A724@lurchi.franken.de> <CANMZLAZGawUjRhSSE_rA8AyqMx=mx1WFeJ_tZq0KVEXJd2XBfQ@mail.gmail.com> <20210807014730.GA28901@faui48f.informatik.uni-erlangen.de> <CAO42Z2yezZh5-B0PwCuNt2FUMAW-FjMK8QZ8uL4TsPhs26zziw@mail.gmail.com> <20210807151716.GA3098@faui48f.informatik.uni-erlangen.de> <CALZ3u+a_7XQ+R8mV+9KzwRwxa0riP-QD_2R69ycV0NL9jy_S3Q@mail.gmail.com> <20210807175410.GA63079@faui48f.informatik.uni-erlangen.de> <CALx6S36b33LD_hNFvptOJuny4g98=dhq3RtKsGeLx3ks-yYjFg@mail.gmail.com> <6F63D7FE-8768-4BD8-846E-61E50E44228F@lurchi.franken.de> <CALx6S36pbw2angEmDpu5DnX2nix9KgxFs7ExU17x+JXQFs23TA@mail.gmail.com> <CALZ3u+Yt2X3faSVW7K0eaxmaQy6iA6p4=f0c4E_F4CP0tfjHYw@mail.gmail.com> <CALx6S343sL0=5wUTRSXMnhSamjTTZU=DzA9Y+dbJ4NRTu0_83w@mail.gmail.com> <CALZ3u+ad6Cecp4T+wfuKVJ4ZmnQvaCSX2njFPCN8DuctrU6uew@mail.gmail.com> <CALx6S37u=y1wX8+6d8aX-6=N1MFEqO9RwxQN5zhZnS4DLM8DcA@mail.gmail.com> <CALZ3u+bHbsdzQsHOHx-6nEe6yQBbHMDhH9_PWB=WHTchB8tj5w@mail.gmail.com> <CAN-Dau3+e=g-ujo30hKidXfbD0EJZ8-Y8iz7pu+ez3Yakmgzvw@mail.gmail.com> <CALx6S35-owqNLEyHUbQFukkFLz4sJPiRzcyv-k826-U6BOB1hA@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/QITH9XjOch2w8WtUbWICeuHChvw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Aug 2021 09:16:29 -0000

> On 8. Aug 2021, at 21:23, Tom Herbert <tom@herbertland.com> wrote:
> 
> 
> 
> On Sun, Aug 8, 2021, 12:03 PM David Farmer <farmer@umn.edu> wrote:
> 
> 
> On Sun, Aug 8, 2021 at 02:27 Töma Gavrichenkov <ximaera@gmail.com> wrote:
> Peace,
> 
> On Sun, Aug 8, 2021, 5:20 AM Tom Herbert <tom@herbertland.com> wrote:
> 
> Using anycast as a
> mitigation to DDoS doesn't seem like a great idea considering the
> problems being discussed here.
> 
> It's quite the opposite: using anycast to mitigate DDoS is the only proper way to do it, because, basically, DDoS traffic, generated in thousands of locations on the globe, cannot be handled when accumulated in one place.
> 
> Either you have multiple traffic termination points on the net (a.k.a. anycast), each as close to some traffic generation point as possible, or you'll end up having capacity overload around your last mile.  This is the equation fundamental to the Internet, while the implementation issues discussed here are hardly more than just typical software engineering tasks.
> 
> Anycast is only one of several mitigation strategies for DDoS, yes, it is a good one for web type services, it might even be the best for that type of service, especially against large volumetric attacks. However, there are many other types of attacks to protect against and services that need protection and anycast is a lousy mitigation strategy for many of them, especially for client networks or peer to peer services. 
> 
> While I agree with you, anycast is an important capability in the Internet architecture, nevertheless it has many limitations, and is not the panacea you claim it to be, even for DDoS. 
> 
> Furthermore, I’m not sure what you or the original reporter of this problem expect the IETF to do to fix the problem that was reported. I’ll remind you of the well worn trope, “the IETF is not the protocol police.” Any fix to the problem reported is squarely in hands of Linux developers, not the IETF.
> 
> David,
> 
> That's true, however we, Linux developers, certainly value the input and discussion on IETF lists. IMO, the later patch that started to recompute the hash on each RTO probably is too aggressive to be the default behavior on the Internet. I plan to post a patch that makes default less aggressive by restoring the original default behavior to recompute hash only after multiple RTOs. The rehash behavior will be configurable by sysctl and also I'll add a socket option to allow the application to control the behavior per connection thereby resolving Brian's concern.
What about making the number of retransmission timeouts after which you change the flow label
configurable via a socket option, having the default value configurable via sysctl.

The value of 0 could mean that you don't change the flow label at all due to retransmission
timeouts.

Maybe use 0 as the default value.

Just to be crystal clear: the same behaviour applies to retransmissions of SYN/SYN-ACK segments
and to segments which have no the SYN bit set.

Best regards
Michael
> 
> Tom
> 
> 
> Thanks.
> -- 
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota   
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================