Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/633025.633027acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Understanding BGP misconfiguration

Published: 19 August 2002 Publication History

Abstract

It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity. Yet little is known about the frequency of misconfiguration or its causes, except for the few spectacular incidents of widespread outages. In this paper, we present the first quantitative study of BGP misconfiguration. Over a three week period, we analyzed routing table advertisements from 23 vantage points across the Internet backbone to detect incidents of misconfiguration. For each incident we polled the ISP operators involved to verify whether it was a misconfiguration, and to learn the cause of the incident. We also actively probed the Internet to determine the impact of misconfiguration on connectivity.Surprisingly, we find that configuration errors are pervasive, with 200-1200 prefixes (0.2-1.0% of the BGP table size) suffering from misconfiguration each day. Close to 3 in 4 of all new prefix advertisements were results of misconfiguration. Fortunately, the connectivity seen by end users is surprisingly robust to misconfigurations. While misconfigurations can substantially increase the update load on routers, only one in twenty five affects connectivity. While the causes of misconfiguration are diverse, we argue that most could be prevented through better router design.

References

[1]
C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing Policy Specification Language (RPSL). RFC 2622, IETF, June 1999.
[2]
T. Bates. The CIDR Report. http://www.employees.org/tbates/cidr-report.html.
[3]
A. Brown and D. A. Patterson. Embracing Failure: A Case for Recovery-Oriented Computing (ROC). In High Performance Transaction Processing Symposium, Oct. 2001.
[4]
N. Brownlee, kc Claffy, and E. Nemeth. DNS Measurements at a Root Server. In Globecom, Nov. 2001.
[5]
E. Chen and T. Bates. An Application of the BGP Community Attribute in Multi-home Routing. RFC 1998, IETF, Aug. 1996.
[6]
J. M. Christensen and J. M. Howard. Field Experience in Maintenance. In NATO Symposium on Human Detection and Diagnosis of System Failures, 1981.
[7]
Cisco Documentation. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/icsbgp4.htm.
[8]
T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. McGraw Hill, 1993.
[9]
J. Cowie, A. Ogielski, B. Premore, and Y. Yuan. Global Routing Instabilities during Code Red II and Nimda Worm Propagation. http://www.renesys.com/projects/bgp_instability.
[10]
P. B. Danzig, K. Obraczka, and A. Kumar. An Analysis of Wide-area Name Server Traffic: A Study of the Domain Name System. In ACM SIGCOMM, Sep. 2000.
[11]
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. In SOSP, Oct. 2001.
[12]
J. Farrar. C & W Routing Instability. NANOG mail archives. http://www.merit.edu/mail.archives/nanog/2001-04/msg00209.html.
[13]
A. Feldmann and J. Rexford. IP Network Configuration for Intradomain Traffic Engineering. IEEE Network Magazine, Sep. 2001.
[14]
L. Gao. On Inferring Autonomous System Relationships in the Internet. In IEEE Global Internet Symposium, Nov. 2000.
[15]
J. Gray. Why Do Computers Stop and What Can Be Done About It? Technical Report 85.7, Tandem Computers, June 1985.
[16]
J. Gray. A Census of Tandem System Availability Between 1985 and 1990. Technical Report 90.1, Tandem Computers, Jan. 1990.
[17]
B. Greene and P. Smith. Essential IOS Features Every ISP Should Consider (v 2.9), June 2001.
[18]
T. Griffin and G. T. Wilfong. An Analysis of BGP Convergence Properties. In ACM SIGCOMM, pages 277--288, Aug. 1999.
[19]
G. Huston. BGP Table Statistics. http://www.telstra.net/ops/bgp/index.html.
[20]
IPMA Project. http://www.merit.edu/ipma/.
[21]
B. H. Kantowitz and R. D. Sorkin. Human Factors: Understanding People-System Relationships. Wiley, 1983.
[22]
S. Kent, C. Lynn, and K. Seo. Secure Border Gateway Protocol (Secure-BGP). IEEE JSAC, 18(4), Apr. 2000.
[23]
T. Kernen. Traceroute.org. http://www.traceroute.org/.
[24]
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet Routing Convergence. In ACM SIGCOMM, Sep. 2000.
[25]
C. Labovitz, A. Ahuja, and F. Jahanian. Experimental Study of Internet Stability and Wide-Area Network Failures. In Fault-Tolerant Computing Symposium (FTCS), June 1999.
[26]
C. Labovitz, G. R. Malan, and F. Jahanian. Origins of Internet Routing Instability. In IEEE INFOCOM, June 1999.
[27]
N. G. Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995.
[28]
O. Maennel and A. Feldman. Realistic BGP traffic for test labs. In ACM SIGCOMM, Aug. 2002.
[29]
C. D. Marsan. Faster 'Net growth rate raises fears about routers. http://www.nwfusion.com/news/2001/0402routing.html, Apr. 2001.
[30]
D. Meyer. RouteViews Project. http://www.routeviews.org.
[31]
S. A. Misel. Wow, AS7007! NANOG mail archives. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
[32]
D. A. Norman. Design Rules Based on Analyses of Human Error. Communications of the ACM, 1983.
[33]
J. Reason. Human Error. Cambridge University Press, 1990.
[34]
Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, IETF, Mar. 1995.
[35]
Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. Address Allocation for Private Internets. RFC 1918, IETF, February 1996.
[36]
Routing registry consistency check. http://www.ripe.net/ripe/docs/rr-consistencycheck.html, Dec. 2001.
[37]
J. Senders and N. Moray. Human Error: Cause, Prediction and Reduction. LEA Publishers, 1991.
[38]
Skitter project. http://www.caida.org/tools/measurement/skitter/.
[39]
J. Stone and C. Partridge. When the Checksum and the Data Disagree. In ACM SIGCOMM, Aug. 2000.
[40]
K. Varadhan, R. Govindan, and D. Estrin. Persistent Route Oscillations in Inter-Domain Routing. Computer Networks, 32(1), 1999.
[41]
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. An Analysis of BGP Multiple Origin AS (MOAS) Conflicts. In ACM SIGCOMM Internet Measurement Workshop, Nov. 2001.

Cited By

View all
  • (2022)Software-defined network assimilationProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544244(281-297)Online publication date: 22-Aug-2022
  • (2022)BigBen: Telemetry Processing for Internet-Wide Event MonitoringIEEE Transactions on Network and Service Management10.1109/TNSM.2022.318459319:3(2625-2638)Online publication date: Sep-2022
  • (2021)Understanding and Detecting Software Upgrade Failures in Distributed SystemsProceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles10.1145/3477132.3483577(116-131)Online publication date: 26-Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
August 2002
368 pages
ISBN:158113570X
DOI:10.1145/633025
  • cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 32, Issue 4
    Proceedings of the 2002 SIGCOMM conference
    October 2002
    332 pages
    ISSN:0146-4833
    DOI:10.1145/964725
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 August 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM02
Sponsor:
SIGCOMM02: SIGCOMM 2002 Conference
August 19 - 23, 2002
Pennsylvania, Pittsburgh, USA

Acceptance Rates

SIGCOMM '02 Paper Acceptance Rate 25 of 300 submissions, 8%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)258
  • Downloads (Last 6 weeks)41
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Software-defined network assimilationProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544244(281-297)Online publication date: 22-Aug-2022
  • (2022)BigBen: Telemetry Processing for Internet-Wide Event MonitoringIEEE Transactions on Network and Service Management10.1109/TNSM.2022.318459319:3(2625-2638)Online publication date: Sep-2022
  • (2021)Understanding and Detecting Software Upgrade Failures in Distributed SystemsProceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles10.1145/3477132.3483577(116-131)Online publication date: 26-Oct-2021
  • (2021)Monitoring Cloud Service Unreachability at ScaleIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488778(1-10)Online publication date: 10-May-2021
  • (2020)Finding network misconfigurations by automatic template inferenceProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388313(999-1014)Online publication date: 25-Feb-2020
  • (2020)Network error loggingProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388312(985-998)Online publication date: 25-Feb-2020
  • (2020)APKeepProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388259(241-256)Online publication date: 25-Feb-2020
  • (2020)Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC42975.2020.9283472(2165-2172)Online publication date: 11-Oct-2020
  • (2020)λBGP: Rethinking BGP programmabilityNOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS47738.2020.9110331(1-9)Online publication date: Apr-2020
  • (2019)UNARIProceedings of the 15th International Conference on Emerging Networking Experiments And Technologies10.1145/3359989.3365420(272-284)Online publication date: 3-Dec-2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media