The Peering LAN

Published: Sep 30, 2024 | Modified: Sep 30, 2024 | Authors: Thomas Liske, Marcel Koch, Tassilo Tanneberger, Matthias Wählisch

Untitled

In the third article of our series "IXP from Scratch", we discuss our setup of the peering switches and route servers at DD-IX, an Internet Exchange located in the city of Dresden, Germany. We explain how we connect our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable operation.

In this article, we start with explaining the configuration of our switching infrastructure using common IETF protocols to implement redundancy, full usage of resources, and seamless adaptivity in case of failures or maintenance. We then continue presenting the configuration of our route servers with a special focus on isolating different LANs and dynamically exclude invalid routes.

Building Bridges

Our switching infrastructure consists of two Arista DCS-7050SX switches donated by third parties (thanks again!). Each switch serves one PoP. Both switches are connected via two CWDM-based 10G links.

Right from the beginning, we aim for scalability that allows us to easily expand our IX to connect additional switches and PoPs later without sacrificing fault tolerance and resource sharing. Combining plain Ethernet, link aggregation, and spanning tree might work for small LANs with few switches, but would become a major challenge in larger deployments since convergence in case of topology changes is slow and flexibility to steer packet forwarding is limited. A key feature of this classic approach, however, is that it is based on open standards and a distributed control plane – features that are also very important to us. Consequently, any { Your vendor building bridges } Software Defined Lock-in solution would not work for us either.

In the following, we describe our setup based on MP-BGP EVPN (Multiprotocol BGP Ethernet VPN) on top of VxLAN (Virtual Extensible LAN), both defined by the IETF.

Setup a Fabric

We need various broadcast domains which are implemented on the switching hardware as common VLANs:

  • the peering (V)LAN in which peers get connected.

  • quarantine VLAN for the assessment of new peers.

  • management VLAN since we do not have a out-of-band management, yet.

Typically, large broadcast domains do not scale since unknown MAC addresses lead to larger flooding, even in switched environments. Using VXLAN and EVPN we can tunnel layer 2 traffic via an IP network, enabling coherent L2 domains without spanning a VLAN across all switches. Using a multiprotocol routing protocol allows us to provision MAC addresses via unicast and to balance traffic across multiple ports in parallel.

Our EVPN setup uses an IGP in the underlay and full "meshed" iBGP sessions between the loopback interfaces of our two switches. Instead of the complex OSPF monster, we choose IS-IS as IGP.

Bundle Resources: To LAG or not to LAG?

We do not use any Link Aggregations (LAGs) for the underlay ports but deploy Equal-Cost Multi-Path (ECMP) routing. Running a routing session on each individual link instead of aggregating links on layer 2 brings various advantages:

  1. Links can be released from traffic by disabling the individual routing session. This allows link maintenances with zero packet loss since the routing protocol will gradually move the traffic instead of abruptly turn off ports.

  2. Reconfigurations or even replacing the IGP of the underlay is possible without traffic disruption in the overlay.

  3. BFD is performed independently on each link.

Detecting Errors: To BFD or not to BFD?

To quickly detect link errors in the underlay, we use Bidirectional Forwarding Detection (BFD) on all underlay ports. This allows us to reduce IGP convergence times to a minimum without tuning any routing protocol default timers.

We do not use BFD for MP-BGP EVPN, though, because a router interface attached to a switch ports in the Peering LAN is not able to move, they are virtually static. If one of our PoP switches fails or get isolated, it does not make it any better to quickly remove the MAC addresses of unreachable ports from the EVPN.

Protecting the Peering LAN

The most challenging part of setting up our switches is to protect the Peering LAN to which the routers of our peers are connected to, see also APNIC and MANRS.

003_pop

That looks like a simple setup, doesn’t it? In reality, however, different types of remote stations are connected to this VLAN with different levels of trustworthiness:

  • our route servers (very trustworthy).

  • directly connected peer routers (trustworthy).

  • different types of L2 backhauls for remote peer routers (not trustworthy).

003_backhaul

What could possibly go wrong?

  1. The Peering LAN is just a bridge and all peering ports with L2 backhauls are building a large carrier-spanning (country-spanning? continent-spanning? …) broadcast domain. 🥂 No one has the intention to build a loop!

  2. Every router in the Peering LAN can (unintentionally) be disruptive by using incorrect layer 2 or layer 3 addresses, doing Proxy ARP, or doing other weird things.

  3. Even if you trust your peers, there is still a risk that a router could be exploited by an attacker - it doesn’t matter whether you trust your peers or not.

Several incidents in the past (e.g., 2014, 2015, 2023) give good reasons for zero trust.

Peering Ports Basics

To mitigate risks, we harden each switch port leveraging our switching configuration. The ports are configured depending on the physical port status setting in the IXP Manager. We automatically assign the following configuration to all ports connecting peers having the status Connected:

interface Ethernet11
   description PEER AS65372 peer1
   switchport access vlan 600
   ip access-group peer-eth11-ipv4 in
   ipv6 access-group peer-eth11-ipv6 in
   mac access-group peer-eth11 in
   no lldp transmit
   no lldp receive
   sflow enable
   storm-control broadcast level 0.01
   storm-control multicast level 0.01
   storm-control unknown-unicast level 0.01

This configuration limits Broadcast, unknown-unicast and multicast (BUM) traffic to prevent packet storms from external networks into our fabric. On each peering port, we use ingress sFlow sampling to build traffic statistics. We also apply the following inbound ACLs at layer 2 and layer 3:

mac access-list peer-eth11
   10 remark AS65372 allow arp broadcast
   11 permit vlan 600 0x000 00:53:42:8b:7b:20 00:00:00:00:00:00 ff:ff:ff:ff:ff:ff 00:00:00:00:00:00 arp
   20 remark AS65372 allow nd multicast
   21 permit vlan 600 0x000 00:53:42:8b:7b:20 00:00:00:00:00:00 33:33:ff:00:00:00 00:00:00:ff:ff:ff ipv6
   30 remark AS65372 drop other broadcasts or multicasts
   31 deny vlan 600 0x000 any 01:00:00:00:00:00 fe:ff:ff:ff:ff:ff log
   40 remark AS65372 allow lan access
   41 permit vlan 600 0x000 00:53:42:8b:7b:20 00:00:00:00:00:00 any arp
   42 permit vlan 600 0x000 00:53:42:8b:7b:20 00:00:00:00:00:00 any ip
   43 permit vlan 600 0x000 00:53:42:8b:7b:20 00:00:00:00:00:00 any ipv6
   100 remark AS65372 drop any
   101 deny any any log
! ...
mac address-table static 0053.428b.7b20 vlan 600 interface Ethernet11

The layer 2 ACL allows IPv6 Neighbor Discovery multicasts, IPv4 ARP broadcasts but no other layer 2 non-unicast traffic. Furthermore, only packets of the EtherType IPv6, IPv4, and ARP are allowed to enter these ports: sorry OSI&.

We require that all peers use only a single static MAC address on their peering ports, and add a corresponding static MAC address-table entry.

ipv6 access-list peer-eth11-ipv6
   10 remark AS15372 IPv6 multicast (RFC 5963)
   11 permit ipv6 any host ff02::1
   12 permit ipv6 any host ff02::2
   13 permit ipv6 any host ff02::16
   14 permit ipv6 any ff02::1:ff00:0/104
   15 deny ipv6 any ff00::/8 log
   20 remark AS65372 allow router IPv6
   21 permit vlan 600 0x000 ipv6 host 2001:db8:79::3c0c:1 any
   30 remark AS65372 deny IPv6 abuse
   31 deny vlan 600 0x000 ipv6 2001:db8:79::/64 2001:db8:79::/64 log
   100 remark allow any other traffic
   101 permit ipv6 any any
! ...
ip access-list peer-eth11-ipv4
   10 remark AS65372 allow router IP
   11 permit vlan 600 0x000 ip host 198.51.100.71 any
   20 remark AS65372 deny IP abuse
   21 deny vlan 600 0x000 ip 198.51.100.64/26 198.51.100.64/26 log
   100 remark allow any other traffic
   101 permit ip any any

Filtering IPv6 Peering Addresses is Specifically Challenging

The layer 3 ACLs are used to block peers from using an IP address not assigned to them. In IPv4, this is straightforward since we assign peering LAN IP addresses to peers, supported by the IXP Manager. In IPv6, this is less obvious because of link-local addresses. First, the IXP Manager does not allow to manage (static) link-local addresses. Second, autoconfigured link-local addresses require dedicated monitoring to discover them. What we would like to see in the future are common rules about the configuration of link-local IPv6 addresses in IXP peering LANs, which ultimately will ease IP filtering.

We have link-local multicast filters following RFC 5963 - IPv6 Deployment in Internet Exchange Points (IXPs). This also serves to suppress incorrectly configured router advertisements.

Configurations May Include Features that are not Available

We are aware that the hardware of our switches (Trident2 BCM56850 series) does not support the outer VLAN option in any ACL. Not every setting visible in the active configuration is actually effective – a common "feature" of many switch vendors using generic software images.

This is dangerous because although the configuration on different switch models is syntactically correct, it may (surprisingly) have different semantics! And depending on how the ACL is written, it can behave fail open or fail close. 😖

Also be careful when replacing the switch in the event of a failure or when upgrading to a new model - your ACLs might have a different semantics.

Be Prepared for Maintenances

It is necessary to do maintenance on switches from time to time. We use "involuntary BGP session teardown" according to RFC 8327 - BGP session culling to disable traffic forwarding on a single switch for maintenance. This is implemented by inserting additional access control entries (ACE) at the top of the peer ACLs during maintenance:

ipv6 access-list peer-eth11-ipv6
   5 deny tcp 2001:db8:79::/64 eq bgp 2001:db8:79::/64
   6 deny tcp 2001:db8:79::/64 2001:db8:79::/64 eq bgp
   ! ...
! ...
ip access-list peer-eth11-ipv4
   5 deny tcp 198.51.100.64/26 eq bgp 198.51.100.64/26
   6 deny tcp 198.51.100.64/26 198.51.100.64/26 eq bgp
   ! ...

This intentionally breaks any BGP session between the peers and our route servers and all direct peerings to other peers in the peering LAN on the switch in maintenance. BGP sessions that do not terminate on the switch under maintenance continue to work, though.

When the maintenance is completed, these ACEs will be removed and the BGP sessions recover. This allows us to do (emergency) maintenances without directly interacting with all affected peers.

Route Servers

Our route servers run on dedicated hardware Alpine Linux in diskless mode allowing for robust operation, see prior RIPE Labs article. We use a single bird2 instance as routing daemon.

Isolate the Peering LAN

The route servers are connected to the management LAN and the peering LAN. For security reasons, it is important that network packets are never routed between those networks. Deploying firewall rules is the first step but not sufficient. We also need to tune ARP responses and other settings of the Linux kernel to achieve full isolation.

The Linux kernel provides a lightweight built-in solution to implement partitioning of kernel resources such as user IDs, file system, processes, or the network stack. So called network namespaces (netns) enable the creation of partitions with their own isolated IP routing configuration. Processes and interfaces can be moved between netns as required. Our route servers have a bonding link (LAG) where the VLANs of the PoP Management LAN and the Peering LAN are attached.

003_ixp_rs

The Peering LAN subinterface and the BIRD BGP daemon are assigned to the {peering} network namespace. While network namespaces in Linux provide a hard isolation for any IP-based connection, it does not affect UNIX domain sockets. So we can still use the BIRD CLI {birdc} from the default network namespace to manage the BIRD daemon running inside the peering netns. This also works for monitoring tools such as birdwatcher and birdexporter_.

003_rs_netns

Alpine Linux has built-in support to run daemons inside network namespaces. We use IfState to have a fully declarative network configuration (disclaimer: Thomas is upstream developer of IfState). IfState also has native netns support allowing us to configure such setup easily (see our jinja2 template for /etc/ifstate/config.yml).

BGP Configuration

The BGP configuration of IXP route servers must prevent the distribution of incorrect routing information between peers. RFC 7947 and RFC 7948 provide a good overview of important requirements. Instead of implementing policies to ignore invalid routes from scratch, we use a well-known and tested framework.

Exclude Invalid Routes from Advertisement

At DD-IX, we build the basic BIRD configuration of our route servers using ARouteServer provided by Pier Carlo Chiodi. Our configuration of ARouteServer is available in our DD-IX Ansible IXP repository. The BIRD configurations are automatically rebuilt and activated several times a day to reflect changes of route objects, RPKI material etc.

Transparency is Important

Debugging in case of errors, unexpected behavior etc. requires full transparency into the configuration of our route severs. To make most recent configurations available to our peers, we use the built-in feature of ARouteServer to create a textual representation of the route server options and policies, and publish the output automatically on our website.

IPv4 Prefixes and an IPv6 Next Hop?

RFC 8950 defines the option to advertise IPv4 prefixes with an IPv6 Next Hop. This feature is supported by ARouteServer. Although this feature seems not to be provided by many IXPs, yet, we decided to try this feature in our greenfield setup. Unfortunately, we had to deactivate it for now because it conflicts with our monitoring setup.

Conclusions

We would like to emphasize the following take-aways.

  1. Running a larger switching infrastructure that is allows for fast failovers and use available resources flexibly, is more than deploying link aggregation and spanning tree. There is no need, however, for proprietary solutions. Open IETF technologies for virtualization perfectly work.

  2. Securing your peering LAN is a must but it also introduces complexity, especially when it comes to debugging L3 filters. In our next article, we will describe how we generate our configurations and ACLs.

  3. RFC 8950 still has some issues that hinder its use, mainly because software such as the Alice Looking Glass do not support integration.

  4. A route server should not propagate any route advertised by a peer. Tools are available to compile a list of invalid routes, but it also requires input from operators – create RPKI ROAs (and filter) ;)!

  5. IPv6 introduce special consideration of link-local addresses. Currently, our community does not have a clear understanding which addressing scheme should be used. This, however, is a requirement for the creation of filter rules. We hope that this will be clarified among IXPs in the future.