Re: [OSPF] OSPF Digest, Vol 126, Issue 40
Tony Przygienda <tonysietf@gmail.com> Wed, 24 August 2016 22:58 UTC
Return-Path: <tonysietf@gmail.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6C8612D797 for <ospf@ietfa.amsl.com>; Wed, 24 Aug 2016 15:58:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IlqARqkqZxjc for <ospf@ietfa.amsl.com>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
Received: from mail-it0-x22f.google.com (mail-it0-x22f.google.com [IPv6:2607:f8b0:4001:c0b::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CD5C12D780 for <ospf@ietf.org>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
Received: by mail-it0-x22f.google.com with SMTP id x131so239576841ite.0 for <ospf@ietf.org>; Wed, 24 Aug 2016 15:58:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=92AZ0L7IjVNKve2wweXBDka+JFE/cZgb4nWKHDG+82g=; b=e2rsTpMFBnqO/zllGF4LAzY4I/1Og2XDQGom12s6jfOZAp2X2hUZRDAm48l9fqiD+V r9Fj6zHKMAdu2xbr7q4Rr4Nj8tm0Y015VG4uDl1RcnkfrwFcalkz4iiCSdXCUvbfCbDr tKnh8q+hAlmUy+FTlynL+U7Iu5Khwpg19ta3V6NdjNI26gAiY4mIz12ML/BuFscmnz4i ihXmcg+h6XqXN6M0naMfDyskhcrIs8t4gD4ZDQTGwpEMgfbBIaRMlhFUKcAnDyrNKNEt tw+P5/yqHbQ7aGQGa9MMyvD9CkrkvWl6R9FBH3O8aplJLqAw0oo8LY/PpuBKot2etAAv SNpw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=92AZ0L7IjVNKve2wweXBDka+JFE/cZgb4nWKHDG+82g=; b=NY83oPyCrXmrSgdFLHgnV8rO+/nBCBuOxE/HqLxCKJxuRQ+daPbHh8lXgFhpEA2QJv kGUib87wEddMnDwMs5lsynqFvqlmQH5FX0LAqshNPf9xlDou/iJSbjsBB4WyibWh9o7X k4nGEmklbJ7rgSyBajkZYIhhWojNI4njVzHibGefbZZWp+fgVk77TQWLw+FUc0jAnK0b ZnlZgR0b/oaW6uffFGuSvlkZLXadxhN/Xayzq9IXynV+K9jzhrwq+ZNBsw+ER6l8trPJ OC9sBubfAUztcOJpLVSG+f+CkxdR6CJnT1QHx8K8HDUEy0ErSPdI9Tii4E5laN6AYMEN acpQ==
X-Gm-Message-State: AE9vXwPVy47zpY7xoiJiCUSUhhMrombMI2hRO3Qhiyt6aaX+M5b0sfptoTOeoFms7N8RIEF2hb15IrrMPh5b0g==
X-Received: by 10.36.19.209 with SMTP id 200mr1454890itz.83.1472079479265; Wed, 24 Aug 2016 15:57:59 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.158.82 with HTTP; Wed, 24 Aug 2016 15:57:18 -0700 (PDT)
In-Reply-To: <mailman.600.1472070107.3902.ospf@ietf.org>
References: <mailman.600.1472070107.3902.ospf@ietf.org>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Wed, 24 Aug 2016 15:57:18 -0700
Message-ID: <CA+wi2hOibgT0Sv+a+OKf868CXvoLjs-VMKxHph+npxzaCbgKWw@mail.gmail.com>
To: ospf@ietf.org
Content-Type: multipart/alternative; boundary="001a11446d6271608e053ad93696"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ospf/TdPZtPciJujCtIMECH3mwqRB9dI>
Subject: Re: [OSPF] OSPF Digest, Vol 126, Issue 40
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 22:58:01 -0000
What's the saying? When you start to build Byzantine security or Petri net libraries you ran out of real problems ;-) On the other hand, 777 control software, DCs, BitCoin use tons of BFT these days. Though it's probably easier to run well-implemented protocols as Dave says rather than install yet-another-abandoned-github-attempt ;-) into your network and make the protocol spec eye-watering complex trying to protect against it. Not that I think the cost of building Quorums in IGPs would be viable unless you have some insane amount of memory & parallel cycles to burn ... -1 to adoption ... --- tony On Wed, Aug 24, 2016 at 1:21 PM, <ospf-request@ietf.org> wrote: > > > > ---------- Forwarded message ---------- > From: Dave Katz <dkatz@juniper.net> > To: "Acee Lindem (acee)" <acee@cisco.com> > Cc: "Zhangxudong (zhangxudong, VRP)" <zhangxudong@huawei.com>, " > ospf@ietf.org" <ospf@ietf.org>, "lizhenqiang@chinamobile.com" < > lizhenqiang@chinamobile.com> > Date: Wed, 24 Aug 2016 20:21:19 +0000 > Subject: Re: [OSPF] Solicit feedbacks on > draft-dong-ospf-maxage-flush-problem-statement > Speaking as a long time implementor of OSPF, IS-IS, et al, I agree. While > making protocols as robust as we can is a good thing, there are rapidly > diminishing returns in trying to make protocol changes to help detect > one-off bugs, especially if the protocol is not friendly to changes and > extensions. The number of possible bugs is essentially infinite. > > I’ve seen a number of bugs in other implementations that have made it into > production implementations, especially as I have had a tendency to > “stretch” the specs in ways that are guaranteed to work so long as other > implementations are following the spec. These have been few and far > between, however. > > Classic example: the 30 minute “architectural constant” refresh time. > This is *not* an architectural constant (defined as “must be true or things > won’t work”); the refresh just needs to happen often enough to keep the > LSA from being maxaged anywhere. So I made a one-line change to change the > refresh time to 50 minutes, reducing the refresh load by 40% (not really > “scaling” but it was easy, cheap, and guaranteed to work properly <cough>.) > This was fine for several years until someone introduced a router from a > small, now long-dead vendor, at which point things started flapping > weirdly. Turns out that an engineer at said company got carried away > jittering timers, and jittered the LSA age timer by 25% (very very bad). > So the LSA maxage timeout would fire after a random interval between 45 and > 60 minutes. Of course, if you were refreshing at 30 minute intervals, > you’d never notice, but at 50 you get 1/3 of your LSAs being purged by said > broken router. I initially refused to change it, but then an engineer at a > Very Large Router Company made exactly the same mistake. Sigh. > ... >
- Re: [OSPF] OSPF Digest, Vol 126, Issue 40 Tony Przygienda