Re: IPv6 Anycast has been killed by LINUX patch in 2016 - who cares?

Warren Kumari <warren@kumari.net> Mon, 09 August 2021 20:13 UTC

Return-Path: <warren@kumari.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13FF53A158D for <ipv6@ietfa.amsl.com>; Mon, 9 Aug 2021 13:13:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TdEh8hPPUCep for <ipv6@ietfa.amsl.com>; Mon, 9 Aug 2021 13:13:23 -0700 (PDT)
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 031F83A158F for <ipv6@ietf.org>; Mon, 9 Aug 2021 13:13:22 -0700 (PDT)
Received: by mail-lf1-x12f.google.com with SMTP id c24so9749319lfi.11 for <ipv6@ietf.org>; Mon, 09 Aug 2021 13:13:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WNgDjPU+1ezgaKWUWL4G3+3wrXaipbiL8uJSzMCxsaU=; b=BD06WrzxqgFFXhh0vnk/NHK3Lef1puNM3Jf1oVgZa2KBFgh0kCaOmT0umSe3yFPvuw QZWd6e8Mxst9sV911uBvPwXZ+YwFJ46aJ6hEVUYbfkM+ziVGc245HkCiQiZ6eFTmM4K/ v0eZxNyFeac5vOGFEPg2Ia39rCv7c6cy5jd7AtBqEqyCkeDsNB42kcfm04Re1l7I1eq7 61qc4UVk2/UsbHf8qZxhuTPh4VSyzPNgz5zIoQPyBxC+xkQY65qJ6a/SwTCPUcOqFjay wKgrfqsLgnBKfsi7j7jpvTbOJ5dS+pMT6a5d2O2Zj3iciA3BN+pLP3q/CoYzqw5o7Cd2 CWOw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WNgDjPU+1ezgaKWUWL4G3+3wrXaipbiL8uJSzMCxsaU=; b=l908+FoODDQ3pR8SECAEn2HEWQg1fY1BZvgxAZIXY39RxvEqwrXC2qi7ZmBEHX59q3 VOzDkqjuRF77Aw8HJBlkKBFXHawvNMSuVABWGSETsOSe8YqW7YFGVTHeouoJTySzeOyi 8FlQR/5sicTumtAD5+wb570oedzwA6ePSPSK6+VozHK7HueGt70Y5bhAnkPjHSnkdhpG Vbth0BTUAKZn/lKqb6jMjeaAZHt5TzDwWlBfcpj+Q6XUAD/YhwBsR/hvd9ICccIwEnyp 2pzMWuh0aO6WdVS1oTDmJnAvbkxoU2WvAK1eOkWyTTAb5PnxqKQC7LKn40QuqMNuNiLV PxtQ==
X-Gm-Message-State: AOAM530rY1AsbalVfeuQwpZJDvkb7z1zQihRDtXqe+63k5VrVe4F6FlG FbU9s4lUWlJAqLHvYqIomL3ExYmAib42nFhoBKZycA==
X-Google-Smtp-Source: ABdhPJx9D3TtH/8cBs+nQsZkSVWa5m1RQVN+ZigXeKRDR4g8Wcbn4No5smLBAab7xZl/qf5i4s2cHKJT2PrTXVbQHXA=
X-Received: by 2002:a19:5e15:: with SMTP id s21mr12158998lfb.459.1628539999207; Mon, 09 Aug 2021 13:13:19 -0700 (PDT)
MIME-Version: 1.0
References: <CALx6S36pbw2angEmDpu5DnX2nix9KgxFs7ExU17x+JXQFs23TA@mail.gmail.com> <CALx6S37u=y1wX8+6d8aX-6=N1MFEqO9RwxQN5zhZnS4DLM8DcA@mail.gmail.com> <CALZ3u+bHbsdzQsHOHx-6nEe6yQBbHMDhH9_PWB=WHTchB8tj5w@mail.gmail.com> <CALx6S36MpCOh2mR+cfM__ASTdn9c4CuhxUrCnUgEv1WhORLyRg@mail.gmail.com> <CALZ3u+ZyQKUJc__HWu6drNyLSCJJ8bOsLfg1B18xwB9+HMe8GA@mail.gmail.com> <CALx6S366bXkCsyEkWCONBX5kcB9JzHU=aNF9hd+wT9FcTdShFw@mail.gmail.com> <CALZ3u+aP=v_1=w1xqfEKof7Cc6Ba3pwOYV3O=0b=NxS4hRWhiA@mail.gmail.com> <YRBdZrKV+MrrhUCG@mit.edu> <CALZ3u+aBdE3Bw3_ry+CuV4tS016c4mWewJFpr0aCbBnwj70Vzg@mail.gmail.com> <a3833e04-c123-ef52-95f9-cae80a1390e7@foobar.org> <CAMm+LwiAbiK618+kY9JTLr7_mQd-E5TKyNsGqOLrGQoLzjJo=A@mail.gmail.com> <CALZ3u+bLVUZf1fTHQvAVzOnToiPcsXEyTNt56hNAXz4=-G5-6w@mail.gmail.com> <CAHw9_i+k9x1g3bcst6rHcXpesEVwnPtV6DzsFAxi8dC6CRMZPw@mail.gmail.com> <CALx6S346mqNaE+s1DH7S7RutTpzfrC5oX1No5Jb72sTvVQjtpQ@mail.gmail.com> <CAHw9_i+ELJS_xqcEHM4raq+f=PZ5yw1ptfG3a6VypZmWTo11-A@mail.gmail.com> <0154c564-fd1c-3b5c-b95c-7fab5d6dab8e@huitema.net>
In-Reply-To: <0154c564-fd1c-3b5c-b95c-7fab5d6dab8e@huitema.net>
From: Warren Kumari <warren@kumari.net>
Date: Mon, 09 Aug 2021 16:12:43 -0400
Message-ID: <CAHw9_iJTr8ugTid-NizToj0ZzsvGeyzPi3pdhDFZUNJiu0EnuA@mail.gmail.com>
Subject: Re: IPv6 Anycast has been killed by LINUX patch in 2016 - who cares?
To: Christian Huitema <huitema@huitema.net>
Cc: Tom Herbert <tom@herbertland.com>, Theodore Ts'o <tytso@mit.edu>, Phillip Hallam-Baker <phill@hallambaker.com>, 6man WG <ipv6@ietf.org>, IETF discussion list <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000027d5cd05c92604a2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/QzpU14DrPXBeTEk_ROqpF73FKWo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Aug 2021 20:13:29 -0000

On Mon, Aug 9, 2021 at 3:40 PM Christian Huitema <huitema@huitema.net>
wrote:

> On 8/9/2021 11:54 AM, Warren Kumari wrote:
>
> > There are dire proclamations that IPv6 TCP anycast cannot work.... And
> yet
> > there are a bunch of existing implementations where it is clearly
> working,
> > and people have built their business models around it, showing that it is
> > working fine.
>
> Or something in between. Whether TCP anycast works or not depends on how
> long one needs the TCP connection to last. If the connection lasts long
> enough, route flaps end up happening, and then the TCP connection
> breaks. How long that lasts also depends on how long the route is. If
> the anycast destination is just one AS hop away from the TCP source,
> then you can expect BGP paths to be fairly stable. If the anycast target
> is multiple ASes away, the frequency of route flaps is going to increase
> markedly.
>
> For big CDN deployments, or for the edge servers of big tech companies,
> there are many servers and the AS paths are quite short. TCP sessions
> will mostly work.


Yup. In many cases the traffic to/from CDN is also HTTP/similar, and the
application layer either expects to have short lived connections, and / or
handles retries gracefully.
If the path changes while my browser is fetching
https://www.example.com/favicon.ico, no-harm, no-foul -- my browser gets
the RST and tries again.


> On the other hand, if you start a deployment with just
> a couple servers, say one per continent, the AS paths will be long and
> the rate of TCP failure will be high.
>

Yup, or if I were, for example, doing SSH over TCP over IPv6 over Anycast
IP (for some weird convoluted reason :-)). But, that would be silly, and I
wouldn't try and do it in v4 either...

W

>
> -- Christian Huitema
>
>
>

-- 
The computing scientist’s main challenge is not to get confused by the
complexities of his own making.
  -- E. W. Dijkstra