NANOG 82 recap summary

The NANOG 82 meeting took place earlier this week. It was approximately five hours of content each day for three days. Slide decks for all the talks are on the meeting page already and the videos are due to appear next week on the TeamNANOG YouTube channel. This is a very brief, likely imperfect summary of the technical talks from the meeting.

Day 1

Evolution of Network Automation at Roblox
Mayuresh Gaitonde
Case study of how an massively multiplayer online game company addressed the limitations they were experiencing with their existing Netbox API-driven, Ansible configuration management, Slack-based alerting, and Influx-based monitoring infrastructure.

IPv6: More than Meets the Eye
Nick Russo
A deeper look at how IPv6 does things IPv4 cannot do or cannot do easily as scale. The talk is drawn primarily from the Secure Network Tunneling Using 6rd and Cisco GETVPN white paper, the Scaling CSfC Mobile Access using DHCPv6 Prefix Delegation white paper, and Nick’s IPv6 Tools GitHub repository.

Tracing DDoS End-to-End in 2021
Craig Labovitz
Based on Nokia’s findings this talk makes at least two arguments. One, most DDoS attacks can be filtered at intermediate routers based on distinct and often unlikely packet fingerprints. Two, the majority of spoofed traffic (the author uses the term IPHM = IP header modification) originates from less than 50 hosting providers or regional ISPs.

Gatekeeper: first open source DDoS protection system
Cody Doucette
A look at a distributed admission control and policy enforcement project to reduce unwanted attack traffic. Uses a suite of open source tools that will selectively announce BGP routes in key aggregation points on distributed Linux servers before proxying allowed traffic to the ultimate destinations. The Gatekeeper GitHub page has more detail and code.

DNS Evolution
Geoff Huston
A critique of the current state and direction of the DNS in Geoff’s inimitable style. Focus is on three distinct areas where changes have occurred or are beginning to. This includes the addition of authenticity (i.e. DNSSEC signing and validation), application rendezvous optimizations (e.g. application-specific RR types, EDNS client subnet extension), and privacy enhancements (e.g. QNAME minimization, DNS over HTTPS).

Day 2

Enhancing PING and TRACEROUTE
Ron Bonica, Andreas Roeseler
An overview of Linux and JUNOS implementation enhancements to ping and traceroute output interface-specific status otherwise inaccessible (e.g. unnumbered interfaces). These capabilities are not enabled by default in JUNOS equipment and can be limited to specific probe source stations.

Keynote: The Evolution of the Interplanetary Internet
Vint Cerf
A brief tour through the design and considerations of delay and disruption tolerant protocols for inter-planetary communications. Watch the video to realize these are not just through experiments, but ongoing work. Also be sure to watch through to the Q&A where Vint is briefly interrupted from an unexpected caller.

Applications of Segment Routing Flex-Algo and BGP Classful Transport
Julian Lucek
I missed this talk. It was a follow-up to an Flex-Algo talk given at the previous NANOG. This talk discussed applications and use cases for the technology.

Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI
Pouyan Fotouhi Tehrani
I missed this talk. This is a research talk that evaluates the deployment of authenticity mechanisms such as X.509 certificates and DNSSEC at various alerting authorities (e.g. government law enforcement agencies, registrars).

No it wasn’t a hijack
Aftab Siddiqui
This talk characterizes and highlights a long-standing, but little known BGP routing table phenomenon where some routes have had an unexpected single-digit ASN in the AS path. This appears to be the result of a common misconfiguration on Mikrotik routers.

Day 3

NOG in a Box - So you want to start a NOG?
Vincent Celindro, Tom Kacprzynski
The authors share their experience and wisdom organizing a localized network operators group (Chicago’s CHI-NOG) so that others interested in forming one in their own area have a framework from which to adapt.

Disaggregated routing gets real in Deutsche Telekom
Carsten Michel, Hannes Gredler
Case study of DT’s largely distributed and disaggreated broadband SDN architecture in lieu of what might have historically been a chassis-based design.

Tenant Networking in Public Clouds: Do We Still Need Networking Engineers?
Ivan Pepelnjak
Presents a set of considerations, differences, and challenges faced when building network services in one or more cloud providers. For example, will all your layer 2 tunneling, monitoring, and routing tricks work in the cloud? Hint: probably not.