Wednesday Registration
|
Date/Time |
7:30 AM to 5:00 PM
|
Location |
Lone Star Foyer, Level 3 |
back to meeting agenda.
|
Wednesday Extended Breakfast
|
Date/Time |
7:30 AM to 9:45 AM
|
Location |
Griffin Hall, Level 2 |
back to meeting agenda.
|
Wednesday Espresso Bar
|
Date/Time |
8:30 AM to 4:30 PM
|
Location |
Lone Star East Foyer, Level 3 |
Sponsors |
|
back to meeting agenda.
|
NANOG 77 Community Meeting
|
Date/Time |
10:00 AM to 10:30 AM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Vincent Celindro, Dell Technologies
- Vincent has nearly twenty years of experience architecting, deploying, operating networks and challenging the norm. He started his career at Northwestern University, where he was one of the pioneers running an MPLS/VPN network in a university environment. Vince currently is an Architect at Juniper Networks, where he travels around the country helping well-known organizations ranging from Mega/Hyperscale datacenters, tier2/3 service providers, the largest Colo-facilities globally, Higher Ed, retailers and online gaming companies – architect, maintain and advance their networks to support their respective services today and for the future. He is a mentor, and always willing to share his knowledge/experiences to help improve and progress the craft of Network Engineering.
Network \R\evolutionist (JNCIE #69/CCIE #8630)
- Steve Feldman, CBS Interactive
- Edward McNair, NANOG
- Benson Schliesser, Volta Networks
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Designing a workflow to respond to BGP Incidents
|
Date/Time |
10:30 AM to 11:00 AM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Job Snijders, NTT
- Job is actively involved in the Internet community both in an operational capacity and as a founder of cooperation efforts such as the NLNOG RING. He has taught service providers in the Middle East how to deploy IPv6 and has a passion for Routing Security and Automation.
Job holds a position at NTT Communications' IP Development Department.
|
Abstract |
What do you do when someone calls you and tells you your company is part of a BGP hijack?
None of us want to be part of or contribute to route leaks, misconfigurations, or BGP hijacks; but what steps do you take to analyse the problem, how can you verify such a claim? After all, we do need to prevent taking down the wrong customer should the BGP hijack complained contain the wrong information. It is prudent for Network Operations Centers to respond to BGP incidents in a consistent and reliable manner; preferably without having to make up the process on the spot!
In this presentation we'll cover what incident response can look like in a NOC in terms of evidence collection and interpreting the available data. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
An Architecture of Highly Available Services using Anycast and Segment Routing in IPv6
|
Date/Time |
11:00 AM to 11:45 AM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Andrew Wang
|
Abstract |
IPv6 anycast is increasingly being used to provide geoproximity, fault-tolerance and load balancing solutions for services that are available from multiple points in the network. Anycast is a technique that can be used to direct clients to the closest server that can respond to the request, often reducing latency and improving the client experience. The major challenge in such systems is handling TCP connections during outages, as nodes go down and eventually come back up.
We present an architecture that leverages Segment Routing in IPv6 (SRv6) to ensure fast failover in the presence of server outage. i.e., requests are redirected to a remote server, but keep ongoing TCP connections to remote servers intact in the presence of local recovery, all this transparently to the client making the request.
In this presentation we cover basic concepts of IPv6 anycast and Segment Routing. We show how anycast can be achieved in IPv6 using BGP and the challenges it presents for a TCP connection. Then we will go over SRv6, introduce its main principles, and show how it can be leveraged to support stable TCP connections for services that are anycast from multiple points in the network. A short demonstration running in Containernet (mininet based network emulator that supports docker images) will tie all the concepts together: GoBGP for route advertisement, Netbricks (framework for developing DPDK apps) for SRv6 packet handling and Consul for service healthcheck. We will show a client making a request which will be served by a local cluster, and how the request will be fulfilled by a remote server when the local server is unavailable.
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation
|
Date/Time |
11:00 AM to 12:00 PM
recorded
|
Location |
Lone Star Salon A-C, Level 3 |
Presenters |
- Speaker
- Jatin Kataria
|
Abstract |
In the space of trusted computing, FPGA-based security modules have appeared in a number of widely used security conscious devices. The Cisco Trust Anchor module (TAm) is one such example that is deployed in a significant number of enterprise network switches, routers, & firewalls. We discuss several novel direct FPGA bitstream manipulation techniques that exploit the relative simplicity of input and output pin configuration structures.We present an analysis of the efficacy of Cisco TAm & discuss both the high-level architectural flaws of the TAm as well as implementation specific vulnerabilities in a TAm- protected Cisco router. By combining techniques presented in this talk with other recent advancements in FPGA bitstream manipulation, we demonstrate the feasibility of reliable remote exploitation of all Cisco TAm implemented using Xilinx Spartan-6 FPGAs. The TAm exploit described in this presentation allows the attacker to fully bypass all Trust Anchor functionality, including hardware-assisted secure boot, & to stealthily inject persistent malicious implants within both the TAm FPGA & the application processor.
Outline:
*Describe Cisco ASR1001-X Tam & initial recon process.
*Record emanation during boot process with near-field probe.
*Hypothesis: FPGA loads bitstream, becomes TAm, emulates a SPI device, yields XEON bootloader, performs integrity attestation
*Upon detection of corruption, FPGA resets XEON processor.
FPGA Bitstream Manipulation
*RTL reconstruction is a complex problem. RTL reconstruction without intimate knowledge of the specific FPGA hardware design is currently infeasible.
*Identify/Reconfigure IOB that controls FPGA GPIO pin that affects RST pin.
*Win without doing any RTL reconstruction
*Fundamental flaw of FPGA-based TAm design,all FPGA-based TAm implementations are vulnerable
*Chain PSIRT 0513862549 & PSIRT 0968652476, demonstrate remote FPGA bitstream manipulation attack to bypass TAm.
*Cisco patch explanation
*Effect: Automotive ADAS, weapon guidance & control systems |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Wednesday Lunch (On Your Own)
|
Date/Time |
12:00 PM to 1:15 PM
|
back to meeting agenda.
|
Lightning Talk: DNS Transparency Project
|
Date/Time |
1:40 PM to 1:50 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- James Shank
|
Abstract |
Recent attacks on the DNS, such as those detailed in Cisco Talos' report "Sea Turtle", expose a critical lack of visibility / audit trail within the DNS hierarchy. This lack of an available audit trail helps sophisticated actors remain difficult to detect in their efforts to undermine entire ccTLDs.
Myself, Tim April, Barry Greene, Warren Kumari, and Matt Ploessel are working together with several others within the DNS Operations community. We hope to solve this problem with a system broadly modeled off the Certificate Transparency concept.
We are creating a system that will allow domain owners to protect their domain name resources by making record changes available for the domain owners and other interested parties to verify. We are calling this service "DNS Transparency" and we want to work with all companies and stakeholders to enable a more transparent naming infrastructure for the future!
https://dnstransparency.org |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Lightning Talk: Next chapter in MANRS
|
Date/Time |
1:50 PM to 2:00 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Andrei Robachevsky, Internet Society
- Andrei Robachevsky is the Senior Technical Programme Manager at the Interenet Society.
His primary area of interest is security and resilience of the Internet infrastructure. This work is based on active engagement with the operator, research and policy communities.
Prior to joining ISOC, Andrei was Chief Technical Officer of the RIPE NCC, responsible for the deployment of DNSSEC for the reverse DNS tree and deployment of anycast instances of the K-root DNS server.
Andrei brings to the Internet Society more than 20 years experience in the Internet technical community. For more than a decade he is actively following Regional Internet Registry (RIR) and Internet Engineering Task Force (IETF) activities. He was Chair of the Number Resource Organization’s (NRO) Engineering Coordination Group (ECG), which is responsible for various technical inter-RIR activities and projects. In 2010-2012 Andrei was a member of the Internet Architecture Board (IAB).
|
Abstract |
Mutually Agreed Norms for Routing Security (MANRS) is a global initiative that provides crucial fixes to reduce the most common routing threats. Originally designed by and for network operators, the initiative has already been adapted once to address the unique needs and concerns of IXPs. This resulted in the development of a so-called MANRS IXP Programme.
We would like to present the next phase of this work that focuses on CDN and Cloud providers and aims at making MANRS more accessible and impactful to these categories of operators.
This is work in progress. Following the approach we used in the past a task force developed a draft Action Set, that will be presented in this
talk to raise awareness and solicit feedback. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Powering Your Automation: A Single Source of Truth
|
Date/Time |
2:00 PM to 3:00 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Tim Schreyack, Dell Networking
- Tim began his career as a network engineer for a regional DSL provider in New England in 2000 and progressed to working on large scale cloud provider networks. About 4 years ago, he first learned of DevOps, the SRE model and automation as pertaining to their use in Networking. He became an early adopter, first using Puppet and then eventually Ansible to enable automation and orchestration of networks. Most recently he joined the Dell Networking team to try and help others in transitioning to the Open Networking model.
|
Abstract |
Powering Your Automation: A Single Source of Truth
Introduction
- How we define automation
- Automation vs Orchestration
Automation Overview
- Ansible, Salt, Puppet
- Template based configs
- Git and peer review process
Single Source of Truth
- Automation depends on inputs and assignment of resources
- How do we populate and maintain those inputs
- Single Source of Truth DB
DB Data Structure
- Physical and virtual devices
- Links
- IPAM
- Logical and physical resource pools
- Rich connections between all items in the DB allows for easy data retrieval
Accessing data from the DB in your templates
- Small code modules to use in templates (python,ruby, etc...)
- Example python code for Ansible
Demo
- Run small demo of using Ansible and .j2 template to create and deploy device configuration for two different switches |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Hackathon Recap
|
Date/Time |
3:00 PM to 3:30 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Wednesday Break
|
Date/Time |
3:30 PM to 4:00 PM
|
Location |
Lone Star Foyer, Level 3 |
Sponsors |
|
back to meeting agenda.
|
The intersection of optical transport and routing in next-generation networks
|
Date/Time |
4:00 PM to 4:30 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Phil Bedard, Cisco
- I began working at my first ISP at the age of 16, working tech support, building servers, and managing a network of Proteon routers. I continued to work at service providers for over 20 years, most recently as a Principal Engineer at Cox Communications, a position I held for ~9 years. I joined Cisco in March 2017 as a Technical Marketing Engineer in the SP Networking Software and Automation group, focused on network architecture and helping build automation products for the operator community.
I have resided in Atlanta, GA for 10 years, originally hailing from SE Wisconsin. I have a B.S. in Computer Science from the University of Wisconsin-Parkside. In my spare time I enjoy racing in amateur motorsports, backcountry hiking, and tinkering with just about everything.
|
Abstract |
Innovations in networking will change the way you think about optical transport and IP routing. Key advances in coherent optical technology and routing platforms are destined to intersect in a way that will disrupt how metro, regional, and long-haul backbone networks are built. In this talk we will explore these innovations and their applicability to metro, regional, and long-haul backbone networks. You will better understand the potential for this to condense layers, simplify operations and drive higher resiliency. We will also discuss enhancements at the packet layer to ensure continued support for high speed wavelength services with path determinism, transparency, protection, and SLA assurance. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
The Future of Passive Multiplexing and Multiplexing Beyond 10G
|
Date/Time |
4:30 PM to 5:00 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Wouter van Diepen, Solid Optics
- Wouter (pronounced WOW-TER) has a background in Chemistry and Computer Science. His early career was in the industrial automation industry, but for the past 12 years he has worked in the data networking industry with a special focus on optical transceiver technology and CWDM & DWDM passive optical networks. As a Co-Founder and CTO of Solid Optics, Wouter developed multiple unique products to meet the needs of network professionals, including a handheld optics recoding/tuning device (Multi-Fiber-Tool) and several innovative multiplexers, including an all-in-one 1RU MUX + EDFA + DISP COMP for long distance DWDM projects and 100G (EDFA-MUX).
|
Abstract |
The Future of Passive Multiplexing and Multiplexing Beyond 10G. In the past, it was easy to change your optical network from 1G to 10G by simply changing the transceiver, but what if you want to do more than 10G? What if you want to go beyond 80km? What are your options and why is there no QSFP28-DWDM-ZR? These are the central questions in this presentation. We will cover the 3 “ingredients” of Multiplexing: The Fiber, the Passive Mux, and the Transceiver, and talk about the limitations and possibilities of multiple times 100G over one fiber pair. We will also cover the following topics: The challenges that arise due to attenuation and chromatic dispersion; Different types of Multiplexers - Cascaded TFF and AWG (including Gaussian Fit and Flat Top); ITU Grids such as DWDM and the new LWDM band (often used for 5G deployment); Modulation & Coherent 100G/200G/400G; How to use QSFP28 DWDM PAM4; and what is coming in 2020 - 400G DWDM QSFP-DD. At the end of this talk, you will understand the future of 100G multiplexing and how it can fit into your network. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Analyzing the Costs (and Benefits) of DNS, DoT, and DoH for the Modern Web
|
Date/Time |
5:00 PM to 5:30 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Austin Hounsel
- I'm a Ph.D. student in the Computer Science department at Princeton University. Generally speaking, I'm interested in Internet measurements, privacy, and censorship.
|
Abstract |
Essentially all Internet communication relies on the Domain Name System (DNS), which first maps a human-readable Internet destination or service to an IP address before two endpoints establish a connection to exchange data.
Today, most DNS queries and responses are transmitted in cleartext, making them vulnerable to eavesdroppers and traffic analysis.
Past work has demonstrated that DNS queries can reveal everything from browsing activity to user activity in a smart home.
To mitigate some of these privacy risks, two new protocols have been proposed: DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT). Rather than sending queries and responses as cleartext, these protocols establish encrypted tunnels between clients and resolvers.
This fundamental architectural change has implications for the performance of DNS, as well as for content delivery.
We measure the effect of DoH and DoT on name resolution performance and content delivery.
We find that although DoH and DoT response times can be higher than for conventional DNS (Do53), DoT can perform better than both protocols in terms of page load times, and DoH can at best perform indistinguishably from Do53.
However, when network conditions degrade, webpages load quickest with Do53, with a median of almost 0.5 seconds faster compared to DoH.
Furthermore, in a substantial amount of cases, a webpage may not load at all with DoH, while it loads successfully with DoT and Do53.
Our in-depth analysis reveals various opportunities to readily improve DNS performance, for example through opportunistic partial responses and wire format caching. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Conference Closing
|
Date/Time |
5:30 PM to 6:00 PM
recorded
|
Location |
Lone Star Salon D-H, Level 3 |
Presenters |
- Speaker
- Edward McNair, NANOG
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
ARIN Welcome Reception
|
Date/Time |
6:00 PM to 7:00 PM
|
Location |
Lone Star Salon A-C, Level 3 |
Abstract |
**We encourage you to attend, connect with friends, and recharge before the Public Policy and Members Meeting gets underway.** |
Sponsors |
|
back to meeting agenda.
|