[49596] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Internet vulnerabilities

daemon@ATHENA.MIT.EDU (Bill Woodcock)
Fri Jul 5 13:35:00 2002

Date: Fri, 5 Jul 2002 10:34:28 -0700 (PDT)
From: Bill Woodcock <woody@zocalo.net>
To: Barry Raveendran Greene <bgreene@cisco.com>
Cc: Marshall Eubanks <tme@multicasttech.com>, <nanog@merit.edu>
In-Reply-To: <LNEHJBNJAPFNLEGJHCPECEOBHHAA.bgreene@cisco.com>
Errors-To: owner-nanog-outgoing@merit.edu


      On Fri, 5 Jul 2002, Barry Raveendran Greene wrote:
    > http://www.cisco.com/public/cons/isp/essentials/ip-anycast-cmetz-03.pdf

Yes, this document correctly described IPv4 anycast.  It somewhat
overstates the severity of the issue with TCP and the dynamicism of the
underlying network topology...  Although that's often brought up by people
who've never used anycast before and think they're being clever, in actual
deployed networks it's accounted for less than 0.001% of total traffic
volume, or far less than is generally lost across the network anyway.  It
also describes the group-membership-announcement issue, which is basically
a non-issue now that all the host vendors can support OSPF, which neatly
fills the need.

                                -Bill



home help back first fref pref prev next nref lref last post