skip to main content
10.1145/633025.633027acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Understanding BGP misconfiguration

Published:19 August 2002Publication History

ABSTRACT

It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity. Yet little is known about the frequency of misconfiguration or its causes, except for the few spectacular incidents of widespread outages. In this paper, we present the first quantitative study of BGP misconfiguration. Over a three week period, we analyzed routing table advertisements from 23 vantage points across the Internet backbone to detect incidents of misconfiguration. For each incident we polled the ISP operators involved to verify whether it was a misconfiguration, and to learn the cause of the incident. We also actively probed the Internet to determine the impact of misconfiguration on connectivity.Surprisingly, we find that configuration errors are pervasive, with 200-1200 prefixes (0.2-1.0% of the BGP table size) suffering from misconfiguration each day. Close to 3 in 4 of all new prefix advertisements were results of misconfiguration. Fortunately, the connectivity seen by end users is surprisingly robust to misconfigurations. While misconfigurations can substantially increase the update load on routers, only one in twenty five affects connectivity. While the causes of misconfiguration are diverse, we argue that most could be prevented through better router design.

References

  1. C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing Policy Specification Language (RPSL). RFC 2622, IETF, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Bates. The CIDR Report. http://www.employees.org/tbates/cidr-report.html.Google ScholarGoogle Scholar
  3. A. Brown and D. A. Patterson. Embracing Failure: A Case for Recovery-Oriented Computing (ROC). In High Performance Transaction Processing Symposium, Oct. 2001.Google ScholarGoogle Scholar
  4. N. Brownlee, kc Claffy, and E. Nemeth. DNS Measurements at a Root Server. In Globecom, Nov. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  5. E. Chen and T. Bates. An Application of the BGP Community Attribute in Multi-home Routing. RFC 1998, IETF, Aug. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. M. Christensen and J. M. Howard. Field Experience in Maintenance. In NATO Symposium on Human Detection and Diagnosis of System Failures, 1981.Google ScholarGoogle Scholar
  7. Cisco Documentation. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ics/icsbgp4.htm.Google ScholarGoogle Scholar
  8. T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. McGraw Hill, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Cowie, A. Ogielski, B. Premore, and Y. Yuan. Global Routing Instabilities during Code Red II and Nimda Worm Propagation. http://www.renesys.com/projects/bgp_instability.Google ScholarGoogle Scholar
  10. P. B. Danzig, K. Obraczka, and A. Kumar. An Analysis of Wide-area Name Server Traffic: A Study of the Domain Name System. In ACM SIGCOMM, Sep. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. In SOSP, Oct. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Farrar. C & W Routing Instability. NANOG mail archives. http://www.merit.edu/mail.archives/nanog/2001-04/msg00209.html.Google ScholarGoogle Scholar
  13. A. Feldmann and J. Rexford. IP Network Configuration for Intradomain Traffic Engineering. IEEE Network Magazine, Sep. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Gao. On Inferring Autonomous System Relationships in the Internet. In IEEE Global Internet Symposium, Nov. 2000.Google ScholarGoogle Scholar
  15. J. Gray. Why Do Computers Stop and What Can Be Done About It? Technical Report 85.7, Tandem Computers, June 1985.Google ScholarGoogle Scholar
  16. J. Gray. A Census of Tandem System Availability Between 1985 and 1990. Technical Report 90.1, Tandem Computers, Jan. 1990.Google ScholarGoogle Scholar
  17. B. Greene and P. Smith. Essential IOS Features Every ISP Should Consider (v 2.9), June 2001.Google ScholarGoogle Scholar
  18. T. Griffin and G. T. Wilfong. An Analysis of BGP Convergence Properties. In ACM SIGCOMM, pages 277--288, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Huston. BGP Table Statistics. http://www.telstra.net/ops/bgp/index.html.Google ScholarGoogle Scholar
  20. IPMA Project. http://www.merit.edu/ipma/.Google ScholarGoogle Scholar
  21. B. H. Kantowitz and R. D. Sorkin. Human Factors: Understanding People-System Relationships. Wiley, 1983.Google ScholarGoogle Scholar
  22. S. Kent, C. Lynn, and K. Seo. Secure Border Gateway Protocol (Secure-BGP). IEEE JSAC, 18(4), Apr. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Kernen. Traceroute.org. http://www.traceroute.org/.Google ScholarGoogle Scholar
  24. C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet Routing Convergence. In ACM SIGCOMM, Sep. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. Labovitz, A. Ahuja, and F. Jahanian. Experimental Study of Internet Stability and Wide-Area Network Failures. In Fault-Tolerant Computing Symposium (FTCS), June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Labovitz, G. R. Malan, and F. Jahanian. Origins of Internet Routing Instability. In IEEE INFOCOM, June 1999.Google ScholarGoogle ScholarCross RefCross Ref
  27. N. G. Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995. Google ScholarGoogle Scholar
  28. O. Maennel and A. Feldman. Realistic BGP traffic for test labs. In ACM SIGCOMM, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. D. Marsan. Faster 'Net growth rate raises fears about routers. http://www.nwfusion.com/news/2001/0402routing.html, Apr. 2001.Google ScholarGoogle Scholar
  30. D. Meyer. RouteViews Project. http://www.routeviews.org.Google ScholarGoogle Scholar
  31. S. A. Misel. Wow, AS7007! NANOG mail archives. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.Google ScholarGoogle Scholar
  32. D. A. Norman. Design Rules Based on Analyses of Human Error. Communications of the ACM, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Reason. Human Error. Cambridge University Press, 1990.Google ScholarGoogle Scholar
  34. Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, IETF, Mar. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. Address Allocation for Private Internets. RFC 1918, IETF, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Routing registry consistency check. http://www.ripe.net/ripe/docs/rr-consistencycheck.html, Dec. 2001.Google ScholarGoogle Scholar
  37. J. Senders and N. Moray. Human Error: Cause, Prediction and Reduction. LEA Publishers, 1991.Google ScholarGoogle Scholar
  38. Skitter project. http://www.caida.org/tools/measurement/skitter/.Google ScholarGoogle Scholar
  39. J. Stone and C. Partridge. When the Checksum and the Data Disagree. In ACM SIGCOMM, Aug. 2000.Google ScholarGoogle ScholarCross RefCross Ref
  40. K. Varadhan, R. Govindan, and D. Estrin. Persistent Route Oscillations in Inter-Domain Routing. Computer Networks, 32(1), 1999.Google ScholarGoogle Scholar
  41. X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. An Analysis of BGP Multiple Origin AS (MOAS) Conflicts. In ACM SIGCOMM Internet Measurement Workshop, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Understanding BGP misconfiguration

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
              August 2002
              368 pages
              ISBN:158113570X
              DOI:10.1145/633025
              • cover image ACM SIGCOMM Computer Communication Review
                ACM SIGCOMM Computer Communication Review  Volume 32, Issue 4
                Proceedings of the 2002 SIGCOMM conference
                October 2002
                332 pages
                ISSN:0146-4833
                DOI:10.1145/964725
                Issue’s Table of Contents

              Copyright © 2002 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 19 August 2002

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              SIGCOMM '02 Paper Acceptance Rate25of300submissions,8%Overall Acceptance Rate554of3,547submissions,16%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader