I think the way to think about it was the damage was done in 2 seconds (according to the syslog), however the switch did not automatically recover from those 2 seconds.  So we need a method that will react quicker than 2 seconds like a MAC ACL.

 

From: MICE Discuss [mailto:MICE-DISCUSS@LISTS.IPHOUSE.NET] On Behalf Of Tom Krenn
Sent: Wednesday, November 02, 2022 4:24 PM
To: MICE-DISCUSS@LISTS.IPHOUSE.NET
Subject: Re: [MICE-DISCUSS] [EXTERNAL] Re: [MICE-DISCUSS] Proposal: MICE Static MAC address Only

 

I don’t know the config of the switch but out of curiosity, would storm control help mitigate the impact on the forwarding table? We might still have 2-3 seconds of disruption but it may avoid the manual intervention and let us keep the more dynamic port security approach.

 

Tom Krenn

Network Architect

Enterprise Architecture - Information Technology

Hennepin County logo

 

 

From: MICE Discuss <MICE-DISCUSS@LISTS.IPHOUSE.NET> On Behalf Of Jeremy Lumby
Sent: Monday, October 31, 2022 9:12 AM
To: MICE-DISCUSS@LISTS.IPHOUSE.NET
Subject: Re: [MICE-DISCUSS] [EXTERNAL] Re: [MICE-DISCUSS] Proposal: MICE Static MAC address Only

 

The issue was a member port.  The port security took 2 seconds to shutdown the port, however 100G of traffic looped and crashed the forwarding table on the main switch, forcing manual intervention.  A static MAC ACL on each port would not have taken time to react.  This is what the SIX has been doing on their ports since 2010 (as well as multiple other layers of security).

 

From: MICE Discuss [mailto:MICE-DISCUSS@LISTS.IPHOUSE.NET] On Behalf Of Kittel, Brady
Sent: Monday, October 31, 2022 9:07 AM
To: MICE-DISCUSS@LISTS.IPHOUSE.NET
Subject: Re: [MICE-DISCUSS] [EXTERNAL] Re: [MICE-DISCUSS] Proposal: MICE Static MAC address Only

 

Was the source of the issue a remote switch?

 

"

 
To be clear, this is still only for end ports, not ports facing remote
switches, of course. The remote switches are responsible for enforcing
the current MAC limit, and would be responsible for changing those
settings as described here."

 

-Brady


From: MICE Discuss <MICE-DISCUSS@LISTS.IPHOUSE.NET> on behalf of Jay Hanke <jayhanke@SOUTHFRONT.IO>
Sent: Monday, October 31, 2022 9:05:08 AM
To: MICE-DISCUSS@LISTS.IPHOUSE.NET <MICE-DISCUSS@LISTS.IPHOUSE.NET>
Subject: [EXTERNAL] Re: [MICE-DISCUSS] Proposal: MICE Static MAC address Only

 

CAUTION: This email originated from outside of HCMC. DO NOT CLICK links or open attachments unless you recognize the sender and know the content is safe.


The error disable takes 1-2 seconds to clamp down and disable the
port. This results in a short, but severe, broadcast storm.

The churn rate on members changing mac addresses is fairly low.

I agree that we should automate the process so it can be done via
self-service by the members.

On Mon, Oct 31, 2022 at 8:59 AM Steve Howard <showard@paulbunyan.net> wrote:
>
>
> Below is a message indicating the current policy as decided by the MICE Board in December 2019 is that the MAC address limit is 1.
>
>
> The subject of Jay's message indicates "Static" MAC, but, the text seems to indicate a limit of 1.  I like the 1 address limit, but, am not a fan of Static.  Was the current issue caused by somebody not having a proper MAC address limit installed?
>
>
> On 12/13/19 18:00, Richard Laager wrote:
>
> The board has approved the change in MAC address limit from 5 to 1.
>
> NOTE: This is orthogonal to the dedicated remote switch question, which
> is still pending. Non-dedicated remote switches can, for example,
> enforce this per-VLAN.
>
> We have already confirmed that most participants are using only 1 MAC
> address, and some that were using more than 1 have addressed that after
> being contacted. As discussed below, this change will be rolled out in a
> way to keep everyone working, by grandfathering if necessary.
>
> On 10/28/19 3:25 PM, Richard Laager wrote:
>
> We have discussed this a bit in the past, and this came up at the last
> UG. I'm looking for feedback from the group before formally proposing
> this to the board for a vote.
>
> I first brought this up to the technical committee, CCing the board. I
> have heard no objections. Jeremy is "in favor of it 100%".
>
> Based on our quick conversation after the UG, I _think_ Anthony is in
> favor as well; we both made notes to follow up on this.
>
> -----
>
> I am proposing that MICE change its MAC address limit from 5 MACs per
> port to 1 MAC per port. 1 MAC address is enough for normal scenarios and
> this would further limit the potential for problems on the fabric. This
> restriction is one that SIX and AMS-IX both have, with the latter being
> known for their excellent configuration guide for participants:
> https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ams-ix.net%2Fams%2Fdocumentation%2Fconfig-guide&amp;data=05%7C01%7CBRADY.KITTEL%40HCMED.ORG%7Cdfc752f4190b41df5c1f08dabb48f46c%7Cada0782c5f344003b5d63187f30aecdd%7C0%7C0%7C638028219286453089%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=NdK%2BQxJvhCPwQjSWZsa8z2CjMsOw%2BY0mFS8Z21li9N8%3D&amp;reserved=0
>
> To be clear, this is still only for end ports, not ports facing remote
> switches, of course. The remote switches are responsible for enforcing
> the current MAC limit, and would be responsible for changing those
> settings as described here.
>
> If someone is swapping their MICE-facing router, the resulting port flap
> on the MICE/remote switch will clear the limit anyway, if they are
> directly connected. If they are unable to flap the port (e.g. because
> they have someone else's layer 2 gear in the middle), they will have to
> either work with that carrier or their switch operator (MICE/remote) to
> flap the port. This is a non-zero burden, but I think it's pretty
> minimal in practice. Additionally, if someone plans to make an equipment
> swap, we would increase the limit in advance, temporarily, upon request.
>
> For reference, SIX goes further and locks you to a particular MAC
> address in an ACL, so you have to contact them to change your MAC. I am
> not proposing that. Still, I've been through that a couple of times, and
> even that isn't really too big of a deal. So I don't think the change to
> a limit of 1 MAC at MICE will be particularly onerous.
>
> There are a couple of participants who have two IP address sets (one
> IPv4 and one IPv6) on the same port. For those ports, the limit
> obviously must be at least 2 MACs, but I propose 3 MACs as the limit. If
> they're using two IPs, they probably are doing so to get some redundancy
> out of it. For this particular use case, needing to flap the port
> defeats that redundancy goal, as it breaks the other router. Having a
> MAC limit of 3 would allow them to swap a device without needing to flap
> the port. We would grandfather these setups until they are looking for a
> port-type upgrade; at that point they would need to get to one IP
> address set per port (by splitting into two ports or reducing to one IP
> address set) or request an exception as outlined below. The exception
> process would allow us to better evaluate this use case at that time.
>
> There are some members who have multiple MACs showing up now, despite
> using only one device. For those, I am proposing we set the MAC limit to
> however many MACs are currently showing up on their port. That is, they
> would be grandfathered at their current situation for now. At the time
> of this change, we would encourage them to investigate and fix the
> multiple MACs issue at their leisure. In the future, if they are doing a
> equipment swap (especially like-for-like), we would again encourage them
> to address it, but would otherwise leave their higher limit in place. If
> they do a port-type upgrade, we would not bring the grandfathering over.
> If they needed, they could ask for an official exception at that time.
>
> There may be cases where people cannot reasonably fix their routers to
> use only 1 MAC, other scenarios I haven't considered, or things that may
> come up in the future. For that reason, I think we should allow for the
> possibility of exceptions upon request to the board. In practice, I
> would expect the board would confer with the technical committee and/or
> the technical committee would be bringing these to the board anyway. The
> goal is to strike a reasonable balance between protecting the fabric
> without preventing networks from connecting.
>
>
>
>
> On 10/31/22 08:27, Jay Hanke wrote:
>
> I propose we change the MICE required port security settings to be
> hard filtered for a single static mac address per port.
>
> Over the years, we've had several incidents where floods have occurred
> prior to port being error-disabled during a looping event.
>
>
>
> ________________________________
>
> To unsubscribe from the MICE-DISCUSS list, click the following link:
> https://nam02.safelinks.protection.outlook.com/?url=http%3A%2F%2Flists.iphouse.net%2Fcgi-bin%2Fwa%3FSUBED1%3DMICE-DISCUSS%26A%3D1&amp;data=05%7C01%7CBRADY.KITTEL%40HCMED.ORG%7Cdfc752f4190b41df5c1f08dabb48f46c%7Cada0782c5f344003b5d63187f30aecdd%7C0%7C0%7C638028219286453089%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=jLh%2Bb2qZqRJ43G%2BWgEaxAy40%2FUZKOHTosSLbtElpDYg%3D&amp;reserved=0



--
Jay Hanke, President
South Front Networks
jayhanke@southfront.io
Phone  612-204-0000

 

Confidentiality Notice:

Information contained in this e-mail is being sent to you after appropriate authorization or by legal exception. You are obligated to maintain it in a safe, secure and confidential manner. Re-disclosure without patient consent or as permitted by law is prohibited and may subject you to state and/or federal penalties. This information may also be legally privileged, the disclosure of which is governed by law. This information is intended for the use of the person or entity to which it is addressed. If you are not the intended recipient, or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any access, disclosure, copying or distribution of this information is strictly prohibited. If you have received this message by error, please notify the sender immediately to arrange for return or proof of destruction of the information contained in this message.

 


To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1

 


To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1



Disclaimer: If you are not the intended recipient of this message, please immediately notify the sender of the transmission error and then promptly permanently delete this message from your computer system.

 


To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1



To unsubscribe from the MICE-DISCUSS list, click the following link:
http://lists.iphouse.net/cgi-bin/wa?SUBED1=MICE-DISCUSS&A=1