Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Internet Network

Does the Internet Route Around Damage? (ripe.net) 60

Longtime Slashdot reader Zarhan writes: On Sunday and Monday, two undersea cables in Baltic sea were cut. There is talk of a hybrid operation by Russia against Europe, and a Chinese ship has been detained by Danish Navy. However, the interesting part is did the cuts really have any effect, or does the internet actually route around damage? RIPE Atlas tests seem to indicate so. RIPE Atlas probes did not observe any noticeable increase of packet loss and only a minimal and perfectly expected increase of latency as traffic automatically switched itself to other available paths. While 20-30% of paths experienced latency increases, the effects were modest and no packet loss was detected. That said, questions remain about the consequences of further cable disruptions. "We are blind on what would happen if another link would be severed, or worse, if many are severed," reports RIPE Labs.
This discussion has been archived. No new comments can be posted.

Does the Internet Route Around Damage?

Comments Filter:
  • Going forward ... (Score:3, Insightful)

    by fahrbot-bot ( 874524 ) on Thursday November 21, 2024 @05:51PM (#64963537)

    Looks like the Internet will (just) have to track Chinese ships and route around them. :-)

    • maybe we should place autonomous sea mines around undersea internet cables.

      • Re: (Score:3, Interesting)

        by fahrbot-bot ( 874524 )

        This isn't the first time a Chinese ship has gotten caught doing (something like) this. A while ago one "accidentally" dragged their anchor for a hundred miles or so and broke a communications cable. China denied it for a long time, then admitted the "mistake" and (I think) paid a fine.

      • by AmiMoJo ( 196126 )

        You will blow up civilian shipping and marine life.

        You will also become responsible for monitoring all those mines, and cleaning up when they reach end-of-life.

        Plus I doubt it would be legal to mine international waters.

      • maybe we should place autonomous sea mines around undersea internet cables.

        Bad idea, as others have said here (see AmiMoJo's response in particular.)

        Better to disclose where these cables are (since apparently they're not that hard to find anyway) and negotiate their protection via treaty or maritime law. Accidents will still happen of course.

  • by ls671 ( 1122017 ) on Thursday November 21, 2024 @06:04PM (#64963561) Homepage

    I'd say semi-automatically and it depends on how well BGP is configured on the different hops and how many different paths are available between hosts for it to be completely automatic but in some cases, yes it should be automatic and transparent. Then again, a fail-over route might not be able to handle all the capacity of a primary route. That's my understanding at least.

    • by DamnOregonian ( 963763 ) on Thursday November 21, 2024 @06:35PM (#64963637)
      You're more or less right.

      "The Internet" is a mesh of BGP speaking Autonomous Systems (I run one).
      For the most part (there are exceptions, but they don't really matter here) everyone has a full routing table- i.e., a route to every single destination on the internet.
      Most are also multi-homed (meaning they have multiple sets of full routing tables at different NNIs)
      Functionally, this means that "Yes, the Internet routes around damage."

      Of course, every mesh has some critical amount of damage it can sustain before parts of it go dark, but "The Internet" as a whole is not susceptible to simple cable cuts. Darking individual countries (particularly smaller ones) isn't terribly hard- but something like a continent? Not going to realistically happen.
      • by ls671 ( 1122017 )

        BGP was only introduced in 1989 and the military used to be able to route around broken links since the beginning of the Internet. I can't tell, but was it all manual back then? Or just like a patchy server, scripts hacked together including ping and the like? Any insight?

        I didn't see any mention of predecessors here:
        https://en.wikipedia.org/wiki/... [wikipedia.org]

        I played a little with BGP but we are relying on providers BGP for our links right now. We are using OSPF for the network where we fully control all devices rig

        • by bill_mcgonigle ( 4333 ) * on Thursday November 21, 2024 @08:44PM (#64963855) Homepage Journal

          Look at a man page for gated.conf .

          It was more manual back then but there were daemons and route preferences and stuff.

        • BGP was only introduced in 1989 and the military used to be able to route around broken links since the beginning of the Internet. I can't tell, but was it all manual back then? Or just like a patchy server, scripts hacked together including ping and the like? Any insight?

          No, before that we had EGP (today, EGP broadly means *any* inter-AS routing protocol, but before BGP, it was an actual distinct protocol.
          It was obsoleted by classless routing. BGP was designed to by extensible so that a migration wouldn't be required again in the future.
          Other than that, it did basically the same job that BGP does- a vector routing protocol with the ability to mesh and preference paths.
          Before EGP (I think the 70s?) I have no idea how they did it- but I'm guessing it was very manual. I thi

      • by okvol ( 549849 )
        The addition of BGP routing was an ARPA enhancement to make it bomb proof. If we have have a massive thermonuclear war, this will be tested to the extreme.
      • by e3m4n ( 947977 )

        The bigger problem occurs when somehow, against safeguards, someone advertises your damn ASN in turn killing your route. Its still happening but less frequent. It happened about a year ago. Someone became trusted that should not have been. The outage was around 2hrs.

        • RPKI is the solution to this. Rollout is slow, but becoming more universal.
          Previously, providers generated their own filters at customer BGP ingress, which meant if a peer of yours incorrectly trusted a customer, you would propagate that bad trust.
          Now, with RPKI, we're able to automatically validate all routes from every BGP ingress and drop anything that doesn't have valid RPKI. Networks that have this fully implemented are "hijack-proof".
          At this point, there are enough of them out there, that not havin
    • by Z00L00K ( 682162 )

      Unfortunately BGP is also sensitive to misconfiguration so if done wrong then you can take down a whole autonomous system someplace else.

      For redundancy - it only works if you have capacity left.

      • We have multiple safeguards for this. The gamechanger is RPKI, though it's not fully implemented yet.
        The previous trust model was impossible to verify on transit links, so "one misplaced trust, was all of our misplaced trust".
        The Internet as a whole is still in the process to migrating to RPKI-validated transit links, but large swaths of the internet have completed it.
    • There are many IP cables at the bottom of the Baltic Sea and the big companies that operate these have several, and for routing there is cooperation.

      Cables often break due to weather and sea conditions, requiring regular repair.
  • by LindleyF ( 9395567 ) on Thursday November 21, 2024 @06:06PM (#64963565)
    So it really should. But it's kind of sad we're not sure, half a century later.
    • by XanC ( 644172 ) on Thursday November 21, 2024 @06:13PM (#64963577)

      I'd rather NOT be 100% certain on this point, personally...

      • There has to be a way to simulate link failure. Like, have the routers fork the traffic both through and around that link, but mark the ones going through. At the destination, wait for the unmarked packets for x time, only delivering the marked ones if they don't show up.
        • Nuclear war will affect a lot more than the hardware that directly supports the links. These days there are numerous dependencies which could be highly relevant. Cloudfront for example.

          • The project in ARPA that proposed a network, was designed it to route around blown-up cities. However, the first ARPA network had very few nodes and very few lines, so it couldn't route around much of anything. It wasn't particularly targeted at survivability.

            Since we haven't had a nuclear war before the (D)ARPA net became the Internet, there has been little interest in testing its large-scale rerouting. We don't particularly want to have a nuclear war just to see if the design actually handles massive r

      • You don't get a choice in that matter. Only some syphilitic ancient mother fucker who has never experienced unfiltered life gets to make that decision. Human civilization is about to be set back 200 years or more.

    • by Anonymous Coward

      So it really should. But it's kind of sad we're not sure, half a century later.

      Naa, we are very sure how BGP works.

      The problem is to "route around damage" requires another route, one that isn't the same as was damaged.
      A single route to a POP is not going to have a second route to go around the first.

      Then there is the issue of cost.
      Two routes need to be kept at 50% or less utilization. Three routes at 66% or less. Etc.
      Without that the routes around won't have the bandwidth to handle the extra traffic.
      So it's not just the cost of the multiple links but the cost of what looks like unde

      • by ls671 ( 1122017 )

        Two routes need to be kept at 50% or less utilization. Three routes at 66% or less. Etc. Without that the routes around won't have the bandwidth to handle the extra traffic.
        So it's not just the cost of the multiple links but the cost of what looks like underutilized links, which those in it for profit or on the cheap will read as "wasted"

        You can cheat a little depending on the degradation you are willing to accept. Like, say, 3 routes at max 80%, which would sound better to the finance department. Just tell them (lying) the 20% is due to tcp-ip packet overhead and you're good to go! :)

        Same principle for server clusters as a side note.

      • So it really should. But it's kind of sad we're not sure, half a century later.

        Naa, we are very sure how BGP works.

        Why does it seem we’re reading otherwise on Slashdot in 2024 then? Nevermind a specific protocol(BGP). Yes. We are very sure how routers work. Yes. The internet contains routers that can route around damage. Does it pretty much every hour of every day on the larger scale. We kinda designed it that way. Network cores, routers, routing protocols, layer 1-3 redundancy, and all that.

        It’s not sad we’re asking half a century later. It’s clickbait bullshit:

        did not observe any noticeable increase of packet loss and only a minimal and perfectly expected increase of latency as traffic automatically switched itself to other available paths.

        Translation; A cut line o

    • by Anonymous Coward

      It was designed to survive nuclear war So it really should. But it's kind of sad we're not sure, half a century later.

      That's a myth. [aei.org]

    • by e3m4n ( 947977 )

      Thats how BGP works. In order for it to work effectively, your ASN must have multiple routes to the internet. If your ASN is only connected by a single fiber connection, and that connection gets cut or goes down, there is no route back to you.

  • by bugs2squash ( 1132591 ) on Thursday November 21, 2024 @06:12PM (#64963573)
    You would think that instead of cutting the cable they would squeeze it so that the reduced diameter would only allow small packets like small routing protocol updates to go through to make it look like the line was open until you try to push through a large packet that would plug it until it times out and disolves.
    • Heh. There is a physical real-world analogue to this.
      The larger a packet you throw over a link, the more susceptible it, individually, is to random bit-errors (which are simply a fact of life on long-haul links)
      This means packet loss increases with packet size.

      i.e., small packets are protected from packet loss by the school-of-fish effect.
      • by ls671 ( 1122017 )

        Very interesting! Although quite obvious, I never thought about it but it makes plenty of sense at first glance.

    • The problem is that it needs to look like an accident, due to dragging their anchors in a storm. They started last year with a gas pipeline [yle.fi], where the squeezing alternative could have worked nicely, but they just wrecked it into pieces.

      We used to have a saying in Finland that could be translated as "russ up", meaning "screw up", because nothing worked right in Soviet Russia. Unfortunately this has changed with Putin's Russia, the accidents are now intentional.

    • The issue here is that the digital binary '1's have sharp edges, and wind up shredding the cable anyway.
    • Yeah, don't want to cut an underwater cable. Think of all those poor cute cats coming out of the ends, to meet their doom!

  • by PPH ( 736903 )

    When the power goes out and takes FTTH, cellular service, CATV, etc out with it, I just drive down to the coffee shop with my laptop.

  • by MachineShedFred ( 621896 ) on Thursday November 21, 2024 @06:21PM (#64963589) Journal

    Really, the internet is a simple / complex system. It's simple as there are only so many ways to reroute, but complex in that it's prone to cascade failures if the existing pathways are overstressed.

    Example:

    You have 4 links between A and B, each utilized at 50% capacity to make the maths easy. If you lose one link and the traffic fails over, the other 3 would each be around 62% capacity. If you lose another, the remaining two are ~75% capacity. If you lose one more, your remaining link is over 100% capacity and other things start to timeout / fail as there is insufficient capacity to service the load, and nobody can predict what happens then from a system-wide perspective.

    • Shouldn't that be 50%/66%/100%/200%?

      If you have 4 identical links at 50% saturation each, that's 200 "points" of traffic. Which then gets distributed over 3, 2, and then finally 1 link.

      In which case, the network is fully saturated with just two links. And while it's technically not overloaded, it's close enough that things are probably going to break anyhow.

  • TCP/IP - ARPANET, the Internet: is designed to rout around damage.

    Obviously, that only works: if there is still a route.

    • TCP/IP is designed to allow for automatic rerouting around 'damage.'

      The network using TCP/IP still needs to be engineered to have these alternate paths, and to have these alternate paths with sufficient bandwidth to carry the extra traffic.

  • The re-routing traffic requires competence and cooperation between organizations. One blown up building in Nashville and AT&T Atlanta had no internet for a week. Fiber breaks in Dallas routinely cut Time Warner's Austin customers off of the internet.
    • by Targon ( 17348 )

      There needs to be alternate routes. In many cases, the fiber links are used by multiple providers, so if one main gets taken down, there isn't another physical alternative to get from place to place. The more nodes there are with the capacity to handle the traffic, the better.

    • One blown up building in Nashville and ATT Atlanta had no internet for a week.

      If someone is responsible for providing an “Atlanta” amount of internet service, “one” should probably not exist anywhere in the network engineers vocabulary.

  • If you knew everything John Gilmore has done to make everything better. But nobody but he knows everything he did. Still there is that one time he said "The Net interprets censorship as damage and routes around it." It was about delivering censored content on the Internet, not about the Internet being hardened or resilient to a physical layer attack.

    It's funny like a pun thrown into the middle of a turkey dinner by a three year old to talk about the Chinese anchor destroying two submarine cables, but ple

  • Would there be packets dropped because they contained political views / medicine names / explosive names that are illegal in the countries that house the detour?
  • > There is talk of a hybrid operation by Russia against Europe, and a Chinese ship has been detained by Danish Navy.

    a. The ship was never detained.
    b. It was most probably the Americans so as they could blame Russia.
  • "The Net Interprets Censorship As Damage and Routes Around It"

    This and Various versions of this sentiment have been credited to John Gilmore, Michael Sattler, Denny Thomas, dated from 1993, and initially intended to describe Usenet behavior which, when confronted with hosts dropping messages they preferred not to deliver, would see those messages pop up in other groups.

    Physical damage, of course, requires a resilient topology that is an inherently able to route traffic by multiple paths, something Arpanet w

  • . . . social media would be inaccessible.

There's no such thing as a free lunch. -- Milton Friendman

Working...