Print

Print


I have similar concerns as Andrew.  However, I'm cognizant of Jeremy's concerns as well. 

Nevertheless, if we are going to fix our old problems, we have to be willing to accept that we are likely to create other new problems. The hard part is deciding if the old problems, the known problems, are worse than the potential new problems, the potentially unknown problems, and which of the potentially new problems we are willing to accept.

We seem to have a consensus that this particular old problem needs to be addressed; what is not clear is if we have a consensus on accepting the potential new problems and which of those potential problems we are willing to accept.

Note either way we are accepting new problems; we are either accepting potential new problems caused by the automation of IX Manager. Otherwise, we are accepting the potential new problems caused by a static MAC ACL list with only manual changes; I expect delays in changes primarily. Both options are going to produce problems. And if they are delays impacting one of the large content peers they could have as significant of an impact as the original problem we are trying to solve.

Thanks

On Mon, Oct 31, 2022 at 9:02 AM Andrew Hoyos <[log in to unmask]> wrote:
I disagree with static MAC address filtering unless we beef up operational ability to change/adjust in a reasonable timeframe, or offer a self service portal to do so (ie IXP Manager implementation first)

Sent from my iPhone

On Oct 31, 2022, at 9:59 PM, Steve Howard <[log in to unmask]> wrote:


Below is a message indicating the current policy as decided by the MICE Board in December 2019 is that the MAC address limit is 1. 


The subject of Jay's message indicates "Static" MAC, but, the text seems to indicate a limit of 1.  I like the 1 address limit, but, am not a fan of Static.  Was the current issue caused by somebody not having a proper MAC address limit installed?


On 12/13/19 18:00, Richard Laager wrote:
The board has approved the change in MAC address limit from 5 to 1.

NOTE: This is orthogonal to the dedicated remote switch question, which
is still pending. Non-dedicated remote switches can, for example,
enforce this per-VLAN.

We have already confirmed that most participants are using only 1 MAC
address, and some that were using more than 1 have addressed that after
being contacted. As discussed below, this change will be rolled out in a
way to keep everyone working, by grandfathering if necessary.

On 10/28/19 3:25 PM, Richard Laager wrote:
We have discussed this a bit in the past, and this came up at the last
UG. I'm looking for feedback from the group before formally proposing
this to the board for a vote.

I first brought this up to the technical committee, CCing the board. I
have heard no objections. Jeremy is "in favor of it 100%".

Based on our quick conversation after the UG, I _think_ Anthony is in
favor as well; we both made notes to follow up on this.

-----

I am proposing that MICE change its MAC address limit from 5 MACs per
port to 1 MAC per port. 1 MAC address is enough for normal scenarios and
this would further limit the potential for problems on the fabric. This
restriction is one that SIX and AMS-IX both have, with the latter being
known for their excellent configuration guide for participants:
https://www.ams-ix.net/ams/documentation/config-guide

To be clear, this is still only for end ports, not ports facing remote
switches, of course. The remote switches are responsible for enforcing
the current MAC limit, and would be responsible for changing those
settings as described here.

If someone is swapping their MICE-facing router, the resulting port flap
on the MICE/remote switch will clear the limit anyway, if they are
directly connected. If they are unable to flap the port (e.g. because
they have someone else's layer 2 gear in the middle), they will have to
either work with that carrier or their switch operator (MICE/remote) to
flap the port. This is a non-zero burden, but I think it's pretty
minimal in practice. Additionally, if someone plans to make an equipment
swap, we would increase the limit in advance, temporarily, upon request.

For reference, SIX goes further and locks you to a particular MAC
address in an ACL, so you have to contact them to change your MAC. I am
not proposing that. Still, I've been through that a couple of times, and
even that isn't really too big of a deal. So I don't think the change to
a limit of 1 MAC at MICE will be particularly onerous.

There are a couple of participants who have two IP address sets (one
IPv4 and one IPv6) on the same port. For those ports, the limit
obviously must be at least 2 MACs, but I propose 3 MACs as the limit. If
they're using two IPs, they probably are doing so to get some redundancy
out of it. For this particular use case, needing to flap the port
defeats that redundancy goal, as it breaks the other router. Having a
MAC limit of 3 would allow them to swap a device without needing to flap
the port. We would grandfather these setups until they are looking for a
port-type upgrade; at that point they would need to get to one IP
address set per port (by splitting into two ports or reducing to one IP
address set) or request an exception as outlined below. The exception
process would allow us to better evaluate this use case at that time.

There are some members who have multiple MACs showing up now, despite
using only one device. For those, I am proposing we set the MAC limit to
however many MACs are currently showing up on their port. That is, they
would be grandfathered at their current situation for now. At the time
of this change, we would encourage them to investigate and fix the
multiple MACs issue at their leisure. In the future, if they are doing a
equipment swap (especially like-for-like), we would again encourage them
to address it, but would otherwise leave their higher limit in place. If
they do a port-type upgrade, we would not bring the grandfathering over.
If they needed, they could ask for an official exception at that time.

There may be cases where people cannot reasonably fix their routers to
use only 1 MAC, other scenarios I haven't considered, or things that may
come up in the future. For that reason, I think we should allow for the
possibility of exceptions upon request to the board. In practice, I
would expect the board would confer with the technical committee and/or
the technical committee would be bringing these to the board anyway. The
goal is to strike a reasonable balance between protecting the fabric
without preventing networks from connecting.


    



On 10/31/22 08:27, Jay Hanke wrote:
I propose we change the MICE required port security settings to be
hard filtered for a single static mac address per port.

Over the years, we've had several incidents where floods have occurred
prior to port being error-disabled during a looping event.




To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1



To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1



--
===============================================
David Farmer               Email:[log in to unmask]
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota  
2218 University Ave SE        Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================


To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1