> 
> bill;
> 
> >     to reiterate my concerns expressed at the mic yesterday,
> 
> Thank you very much.
>       
> >     Ohta-san, would you be comfortable with 200,000,000 devices
> >     being shipped with the IP address 131.112.32.188 (the address
> >     of one of your organizations nameservers) being burned into
> >     eeprom?
> 
> I will be comfortable with 200,000,000 devices being shipped
> with the IP address 127.0.0.1 (an anycast address) being burned
> into eeprom, which was the point of my comment to you, yesterday.

        so would i, but for perhaps distinctly divergent reasons. :)

> I'll be fine if 127.0.0.1 is replaced by some anycast address,
> as long as certain address range (say /24 in the C swamp or
> /16 in class B) of the address is not used by anyone.

        and that can -NOT- be assured, hence the danger of
        promoting the use of well known addresses. 
> 
> >     disclaimers about restricting, by IETF fiat, well known addresses
> >     to special IP ranges will -NOT- work in the real world.
> 
> I'm not sure what you mean.
> 
> Each well know addresses may have its own range to protect against
> route filtering and there is no requirement of mine that
> the addresses are restricted to special IP range.

        one can not ensure all parties that do routing will respect
        the IETF concerns regarding routing restrictions.  A quick
        look at the prohibitions of using RFC 1918 space in the 
        Internet adn the empirical evidence of thier leakage (AS112
        project) are a powerful incentive to protocol designers
        that operators take prohibitions as suggestions at best.
        that said, all addresses are potentially "well-known".

> >     If you are willing to commit your enterprise to absorb 0.1%
> >     of the total packets generated by 200,000,000 devices, then 
> >     perhaps I will be persuaded that use of well-known addresses
> >     is an operationally acceptable technique.
> 
> 200,000 devices are not for usual enterprises (or universities)
> but for ISPs of medium scale.

        missed an order of magnitude there.  presuming a vendor
        picks the "well-known" address that your enterprise uses
        and burns it into eproms (e.g. the recent netgear episode)
        and ships them -worldwide- then all those devices will
        try and use your service - since it has your well known
        address hard coded.   UoW NTP IP service was burned into
        a vendors hardware, saturating the incoming network links
        to the university and the university network itself.

> But, I know an ISP, internal of which I know well, with >3,000,000
> subscribers is operating DNS servers for all the subscribers.
> 
> So, what is the problem?

        excessive traffic from non-customers.

> >     Yes, I know we do it now and it reduces the level of effort
> >     in getting new features deployed, but in -EVERY- case, the
> >     use of well known addresses has caused problems.
> 
> I think I have shown a solution on the problem on root server
> addresses with anycast addresses and AS numbers.

        and there are significant long-term problems with that 
        approach, such as content coherence and route hijacking.

> If there are other cases, let me know so that I can try to use
> anycast approach for the problems.
> 
>                                               Masataka Ohta

--bill
#----------------------------------------------------------------------
# To unsubscribe, send a message to <[EMAIL PROTECTED]>.

Reply via email to