layer 3 vpns and traceroute
play

Layer 3 VPNs and Traceroute Alex Marder, Matthew Luckie, Bradley - PowerPoint PPT Presentation

Layer 3 VPNs and Traceroute Alex Marder, Matthew Luckie, Bradley Huffaker, kc claffy, Jonathan M. Smith Expected Response Types: Ingress Expected Response Types: Egress Responses Face the Traceroute Source Ingress Response Egress Response


  1. Layer 3 VPNs and Traceroute Alex Marder, Matthew Luckie, Bradley Huffaker, kc claffy, Jonathan M. Smith

  2. Expected Response Types: Ingress

  3. Expected Response Types: Egress

  4. Responses Face the Traceroute Source Ingress Response Egress Response

  5. Responses Do Not Face Destination • We don’t expect the interface that would have forwarded the probe to the destination

  6. What is a Layer 3 VPN? • Virtual IP networks that share the same physical infrastructure • VPN uses ISP backbone but separate forwarding tables • Common uses • Connect customer sites together • Enable high bandwidth connection to cloud

  7. L3 VPN: Traceroute Example Traceroute Network Map Service Provider AS A SE 1 s' 1 s 1 S 1 s' 2 s 2 SE 2 AE a' a b' b BE AS B

  8. L3 VPN: Packet Sent From AS AS A to AS AS B Traceroute a AS A Network Map Service Provider AS A SE 1 s' 1 s 1 S 1 s' 2 s 2 SE 2 AE a' a b' b BE AS B Dest: AS B

  9. L3 VPN: Traceroute Starts Normally Traceroute s 1 a AS A AS S Network Map Service Provider AS A SE 1 s' 1 s 1 S 1 s' 2 s 2 SE 2 AE a' a b' b BE AS B MPLS Label VPN ID Dest: AS B

  10. L3 VPN: Egress Virtual Forwarding (VRF) Traceroute s 1 a b' AS A AS B AS S Network Map Service Provider AS A SE 1 s' 1 s 1 S 1 s' 2 s 2 SE 2 AE a' a b' b BE AS B VPN ID Dest: AS B

  11. L3 VPN: Ends Normally Traceroute s 1 a b' b AS A AS B AS B AS S Network Map Service Provider AS A SE 1 s' 1 s 1 S 1 s' 2 s 2 SE 2 AE a' a b' b BE AS B Dest: AS B

  12. Problem With Conventional Interpretation Traceroute 162.252.70.103 128.91.238.218 128.91.238.217 Internet2 UPenn UPenn Interpretation (Assuming Ingress Addresses) 162.252.70.103 128.91.238.218 128.91.238.217 R 1 R 2 R 3 Internet2 UPenn UPenn Internet2 UPenn

  13. Problem With Conventional Interpretation Traceroute 162.252.70.103 128.91.238.218 128.91.238.217 Internet2 UPenn UPenn Correct Interpretation 162.252.70.103 128.91.238.218 128.91.238.217 R 1 R 2 R 3 ? Internet2 UPenn UPenn Internet2 UPenn

  14. Finding Egress VRF Addresses Adjacent hops with consecutive addresses

  15. Must Rule Out Two Separate /31s One /30 Link 162.252.70.103 128.91.238.218 128.91.238.217 R 1 R 2 R 3 ? Internet2 UPenn UPenn Internet2 UPenn Two /31 Links 162.252.70.103 128.91.238.219 128.91.238.218 128.91.238.216 128.91.238.217 R 1 R 2 R 3 Internet2 UPenn UPenn UPenn UPenn Internet2 UPenn

  16. 4 Address Prefixes: Ping Test 128.91.238.216/30 Network 128.91.238.216 Usable 128.91.238.217 Host 128.91.238.218 Addresses 128.91.238.219 Broadcast

  17. Results

  18. Conclusion • Watch out for egress VRF addresses • 6% of middle addresses in ITDK traceroutes • We can detect them • An hopefully account for them

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend