Feeds

Canadian ISP Shaw falls over with 'routing' sickness

How sure are you of cloud computing now?

Internet Security Threat Report 2014

Updated Canadian ISP Shaw is experiencing a "nationwide outage affecting internet browsing", according to the polite phone robot put in place to discourage affected punters from overwhelming support systems.

The issue appears to be multi-faceted. Your Canadian vultures have personally encountered numerous "rolling" outages over the course of the day, and the issue continues to to evolve.

The first hint of an issue occurred when we were unable to RDP into any of our systems in our Edmonton test lab, which is on a Shaw network. Despite lack of RDP access, FTP, VPN and other protocols worked just fine to our boxen.

We were able to RDP into a Calgary datacenter for a period of several hours while we could not RDP into the Edmonton lab, and then that Calgary site too was inaccessible.

At various times Office 365 has been unavailable to both your northern vultures and various readers on a Shaw network. HTTPS-based access to my personal Exchange server has been unavailable all day and Teamviewer access to any Shaw-based systems is sketchy at best.

At some points we have lost all access to individual Shaw-based networks while others remain unaffected. The lengths of outages appear to be as random as the individual network segments affected, and network segments that had been "cured" have gone down again spontaneously over the course of the day.

Calling Shaw's Network Operations Center to lodge a support ticket turned up a description from the support tech that it is "a routing issue".

We here at Vulture North feel that the problem has to be little bit more than "a routing issue", given the number of networks in which specific protocols are affected, but not others. In addition to any routing issues, we're wondering if something has gone wrong with the deep packet inspection gear that Shaw uses.

How else could we be seeing issues like "all RDP access to a given network is denied, regardless of port number", but all VPN traffic and http traffic is fine? Or instances in which Office 365 and Exchange HTTPS traffic is suppressed, but regular HTTPS traffic to other websites carries on just fine?

We asked Shaw for comment, and will update this story when we know more. ®

Updated to add

We've drilled into what happened, right here: the internet hit an arbitrary limit of more than 512,000 routes, which broke a lot of kit worldwide.

Internet Security Threat Report 2014

More from The Register

next story
Brits: Google, can you scrape 60k pages from web, pleeease
Hey, c'mon Choc Factory, it's our 'right to be forgotten'
Of COURSE Stephen Elop's to blame for Nokia woes, says author
'Google did have some unique propositions for Nokia'
FCC, Google cast eye over millimetre wireless
The smaller the wave, the bigger 5G's chances of success
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.