Re: [sidr] BGPSec scaling (was RE: beacons and bgpsec)

Christopher Morrow <morrowc.lists@gmail.com> Mon, 12 September 2011 19:07 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E126321F8C41 for <sidr@ietfa.amsl.com>; Mon, 12 Sep 2011 12:07:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.299
X-Spam-Level:
X-Spam-Status: No, score=-103.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HkHVh49A2R6m for <sidr@ietfa.amsl.com>; Mon, 12 Sep 2011 12:07:41 -0700 (PDT)
Received: from mail-gx0-f182.google.com (mail-gx0-f182.google.com [209.85.161.182]) by ietfa.amsl.com (Postfix) with ESMTP id 88E5621F8C5F for <sidr@ietf.org>; Mon, 12 Sep 2011 12:07:34 -0700 (PDT)
Received: by gxk28 with SMTP id 28so4020262gxk.27 for <sidr@ietf.org>; Mon, 12 Sep 2011 12:09:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=dV3lpEcfNgbO8S/Ciu0lsIG7JD9GXQD01PGpSvuSA58=; b=mBjnRHVcrEUg5iY0Jo86qZUEedr0UsLOWhLiMR40DEgB0BQS4PJ2llJKBPz6Xcyglu RRTcY/d1JYzRVFE3mg3qwHPhs9KOHYyl24EIS57O+5QgMH+QstK/hO46ympKR+eOxdQe UuiYzPP/u8cqEj+OsEHHaEWCxqf8kVKz2oLgs=
MIME-Version: 1.0
Received: by 10.42.135.129 with SMTP id p1mr269590ict.56.1315854577866; Mon, 12 Sep 2011 12:09:37 -0700 (PDT)
Sender: christopher.morrow@gmail.com
Received: by 10.231.65.5 with HTTP; Mon, 12 Sep 2011 12:09:37 -0700 (PDT)
In-Reply-To: <34E4F50CAFA10349A41E0756550084FB0E26B03F@PRVPEXVS04.corp.twcable.com>
References: <A37CADA4-F16D-4C01-8D9C-D01001C4EFE4@tcb.net> <21C19DA8-7BF3-4832-8C13-C9A45FE026FB@algebras.org> <87D9E106-2A37-4E1E-8C69-7084C199A3FE@tcb.net> <331AEFBD-6AE5-469E-A11E-E672DC61DCDC@pobox.com> <B92913D1-AB82-4D9F-B8A9-F8F4F99713D6@tcb.net> <p06240803ca685bff5443@128.89.89.43> <D6D12861-412E-4A65-B626-B627449981B8@tcb.net> <34E4F50CAFA10349A41E0756550084FB0C2ED5A4@PRVPEXVS04.corp.twcable.com> <7B321CF0-ABE6-4FCD-B755-8099BB63399A@rob.sh> <5E9BE75F-C0A6-4B48-B15F-7E0B80EFE981@ericsson.com> <m2ipp4qxs5.wl%randy@psg.com> <34E4F50CAFA10349A41E0756550084FB0E0D5BDC@PRVPEXVS04.corp.twcable.com> <D4059E53-6EEC-4F66-9E1E-B96675182F22@rob.sh> <m2wrdhvjpe.wl%randy@psg.com> <4E6A2CD0.1010305@riw.us> <m2pqj9vgc8.wl%randy@psg.com> <CAL9jLaYoU-f_6CmmrLkSFyO1oHEZeKeYL8pF+pjF+3DXd0myTg@mail.gmail.com> <34E4F50CAFA10349A41E0756550084FB0E26B03F@PRVPEXVS04.corp.twcable.com>
Date: Mon, 12 Sep 2011 15:09:37 -0400
X-Google-Sender-Auth: qew3vN0OhLH-jAnqYJsxtB3PhG0
Message-ID: <CAL9jLaa_ZiaCC2pojxWP5sdqckg+mZ3T=ymBeybfSvacG7JOdg@mail.gmail.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
To: "George, Wesley" <wesley.george@twcable.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: "sidr@ietf.org" <sidr@ietf.org>
Subject: Re: [sidr] BGPSec scaling (was RE: beacons and bgpsec)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Sep 2011 19:07:42 -0000

On Mon, Sep 12, 2011 at 2:28 PM, George, Wesley
<wesley.george@twcable.com> wrote:
> -----Original Message-----
> From: christopher.morrow@gmail.com [mailto:christopher.morrow@gmail.com] On Behalf Of Christopher Morrow
> Sent: Sunday, September 11, 2011 11:26 PM
> To: Randy Bush; George, Wesley
> Cc: Russ White; sidr@ietf.org
> Subject: Re: [sidr] BGPSec scaling (was RE: beacons and bgpsec)
>
> maybe what Wes is asking here is really:
> "Could someone model the load on a router doing bgpsec, in a world of
> bgpsec speaking devices?"
>
> Something like, for a core network edge device (say sprint, C&W, TWTC,
> UU/vzb,ATT an edge connecting device in their worst metro):
>  o number of updates today/second (steady state and 'worst case')
>  o projected growth of update stream (given historical data)
>  o projected 'cost' (cpu cycles) of un-assisted bgpsec
>  o projected RIB RAM size (use historical data to project forward)
>  o projected beacons/second (which really just look like updates in
> the update stream)
>  o routing table size (projected forward from historical data)
>
> It seems most of that data exists in one form or another, it seems
> that running the math isn't "hard". There's a question of the validity
> of the model... but that's always the case.
>
> Wes, is this sort of thing what you're asking for?
>
> WEG] Yes, to some extent, but you're right that the model is the hard part, not the math. In trying to unwind a similar problem of how to characterize steady-state and peak CPU load on a L3VPN PE router so that there are real rules of thumb for capacity management and scaling, we discovered a couple of things -
> 1) (some) Vendors are quite bad at providing reasonably accurate multi-dimensional scaling models based on testing or real-world results. They tend to give a lot of single-dimension scale limits (eg with this knob turned to 11, you can get this value), but are very conservative and mumbly when it comes to what the actual real-life limits are, YMMV, etc. As a result, sometimes you end up finding out about the scaling cliff as you're falling over it, or you pay for hardware that you can never fully use because you stick to very conservative limitations.
> 2) a corollary: behavior at scale becomes increasingly non-deterministic the more variables you're working with simultaneously. Even worse, it's difficult to account in a model for things that work well enough at moderate scale, but are not efficient enough for high scale, or suffer some sort of secondary impact due to dependencies, etc.
> 3) some routers are very bad at providing useful data about critical scaling vectors (updates per sec, changes in multicast state, etc). Coupled with the fact that each router's numbers can be wildly different, it's difficult to characterize a "common" router, let alone a common network.
> 4) there are widely varying opinions among vendors and operators as to what is an acceptable level of performance at scale i.e. time to convergence of last route, steady-state CPU utilization (how much headroom is enough), stability during system or network events.
>
> I think that what is coming up here are concerns in a couple of different categories:
> 1) Short-term hardware scale - is BGPSec supportable with what is realistically available today? For how long? Is that long enough?
> 2) Long-term hardware scale (5+ years) - What's the next breakthrough? How long does that buy us? Is that long enough? What does it do to our time remaining before we have to redesign the routing system to make it keep scaling?
> This is where we should be considering RFC4984 and either updating or affirming the guidance there.
> 3) Cost for both - what is an acceptable assumption of the cost premium for BGPSec, in both capital and personnel?
>
> On the hardware side, we're in a discussion that sounds a lot like predicting peak oil - when do we run out of scale growth on Moore's law with the current overall Internet architecture, and will BGPSec be just "one more gas-guzzler on the road" or the straw that broke the camel's back?
>
> I don't know that we're going to get a definitive answer from modeling, and I'm not trying to bring on analysis paralysis either. Randy's (and mine, and everyone else's) guess may be BS, but even making a gut check based on what info we have available and documenting the assumptions we're basing our decision on would be a good thing.

I agree with the above, and the last comment really was what I was
aiming at.. If someone were to model the 6-ish items I outlined, and
properly documented their test-harness (and maybe provided it out so
folk could test with their favorite settings?) that would help us get
around this paralysis problem. At least we'd feel a bit more
comfortable having something to check against.

-chris