Re: [OSPF] OSPF Digest, Vol 126, Issue 40

Tony Przygienda <tonysietf@gmail.com> Wed, 24 August 2016 22:58 UTC

Return-Path: <tonysietf@gmail.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6C8612D797 for <ospf@ietfa.amsl.com>; Wed, 24 Aug 2016 15:58:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IlqARqkqZxjc for <ospf@ietfa.amsl.com>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
Received: from mail-it0-x22f.google.com (mail-it0-x22f.google.com [IPv6:2607:f8b0:4001:c0b::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CD5C12D780 for <ospf@ietf.org>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
Received: by mail-it0-x22f.google.com with SMTP id x131so239576841ite.0 for <ospf@ietf.org>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=92AZ0L7IjVNKve2wweXBDka+JFE/cZgb4nWKHDG+82g=; b=e2rsTpMFBnqO/zllGF4LAzY4I/1Og2XDQGom12s6jfOZAp2X2hUZRDAm48l9fqiD+V r9Fj6zHKMAdu2xbr7q4Rr4Nj8tm0Y015VG4uDl1RcnkfrwFcalkz4iiCSdXCUvbfCbDr tKnh8q+hAlmUy+FTlynL+U7Iu5Khwpg19ta3V6NdjNI26gAiY4mIz12ML/BuFscmnz4i ihXmcg+h6XqXN6M0naMfDyskhcrIs8t4gD4ZDQTGwpEMgfbBIaRMlhFUKcAnDyrNKNEt tw+P5/yqHbQ7aGQGa9MMyvD9CkrkvWl6R9FBH3O8aplJLqAw0oo8LY/PpuBKot2etAAv SNpw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=92AZ0L7IjVNKve2wweXBDka+JFE/cZgb4nWKHDG+82g=; b=NY83oPyCrXmrSgdFLHgnV8rO+/nBCBuOxE/HqLxCKJxuRQ+daPbHh8lXgFhpEA2QJv kGUib87wEddMnDwMs5lsynqFvqlmQH5FX0LAqshNPf9xlDou/iJSbjsBB4WyibWh9o7X k4nGEmklbJ7rgSyBajkZYIhhWojNI4njVzHibGefbZZWp+fgVk77TQWLw+FUc0jAnK0b ZnlZgR0b/oaW6uffFGuSvlkZLXadxhN/Xayzq9IXynV+K9jzhrwq+ZNBsw+ER6l8trPJ OC9sBubfAUztcOJpLVSG+f+CkxdR6CJnT1QHx8K8HDUEy0ErSPdI9Tii4E5laN6AYMEN acpQ==
X-Gm-Message-State: AE9vXwPVy47zpY7xoiJiCUSUhhMrombMI2hRO3Qhiyt6aaX+M5b0sfptoTOeoFms7N8RIEF2hb15IrrMPh5b0g==
X-Received: by 10.36.19.209 with SMTP id 200mr1454890itz.83.1472079479265; Wed, 24 Aug 2016 15:57:59 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.158.82 with HTTP; Wed, 24 Aug 2016 15:57:18 -0700 (PDT)
In-Reply-To: <mailman.600.1472070107.3902.ospf@ietf.org>
References: <mailman.600.1472070107.3902.ospf@ietf.org>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Wed, 24 Aug 2016 15:57:18 -0700
Message-ID: <CA+wi2hOibgT0Sv+a+OKf868CXvoLjs-VMKxHph+npxzaCbgKWw@mail.gmail.com>
To: ospf@ietf.org
Content-Type: multipart/alternative; boundary="001a11446d6271608e053ad93696"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ospf/TdPZtPciJujCtIMECH3mwqRB9dI>
Subject: Re: [OSPF] OSPF Digest, Vol 126, Issue 40
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 22:58:01 -0000

What's the saying? When you start to build Byzantine security or Petri net
libraries you ran out of real problems ;-)

On the other hand, 777 control software, DCs, BitCoin use tons of BFT these
days. Though it's probably easier to run well-implemented protocols as Dave
says rather than install yet-another-abandoned-github-attempt ;-) into your
network and make the protocol spec eye-watering complex trying to protect
against it. Not that I think the cost of building Quorums in IGPs would be
viable unless you have some insane amount of memory & parallel cycles to
burn ...

-1 to adoption ...

--- tony

On Wed, Aug 24, 2016 at 1:21 PM, <ospf-request@ietf.org> wrote:

>
>
>
> ---------- Forwarded message ----------
> From: Dave Katz <dkatz@juniper.net>
> To: "Acee Lindem (acee)" <acee@cisco.com>
> Cc: "Zhangxudong (zhangxudong, VRP)" <zhangxudong@huawei.com>, "
> ospf@ietf.org" <ospf@ietf.org>, "lizhenqiang@chinamobile.com" <
> lizhenqiang@chinamobile.com>
> Date: Wed, 24 Aug 2016 20:21:19 +0000
> Subject: Re: [OSPF] Solicit feedbacks on
> draft-dong-ospf-maxage-flush-problem-statement
> Speaking as a long time implementor of OSPF, IS-IS, et al, I agree.  While
> making protocols as robust as we can is a good thing, there are rapidly
> diminishing returns in trying to make protocol changes to help detect
> one-off bugs, especially if the protocol is not friendly to changes and
> extensions.  The number of possible bugs is essentially infinite.
>
> I’ve seen a number of bugs in other implementations that have made it into
> production implementations, especially as I have had a tendency to
> “stretch” the specs in ways that are guaranteed to work so long as other
> implementations are following the spec.  These have been few and far
> between, however.
>
> Classic example:  the 30 minute “architectural constant” refresh time.
> This is *not* an architectural constant (defined as “must be true or things
> won’t work”);  the refresh just needs to happen often enough to keep the
> LSA from being maxaged anywhere.  So I made a one-line change to change the
> refresh time to 50 minutes, reducing the refresh load by 40% (not really
> “scaling” but it was easy, cheap, and guaranteed to work properly <cough>.)
>  This was fine for several years until someone introduced a router from a
> small, now long-dead vendor, at which point things started flapping
> weirdly.  Turns out that an engineer at said company got carried away
> jittering timers, and jittered the LSA age timer by 25% (very very bad).
> So the LSA maxage timeout would fire after a random interval between 45 and
> 60 minutes.  Of course, if you were refreshing at 30 minute intervals,
> you’d never notice, but at 50 you get 1/3 of your LSAs being purged by said
> broken router.  I initially refused to change it, but then an engineer at a
> Very Large Router Company made exactly the same mistake.  Sigh.
> ...
>