Re: Why used DHCPv6 when RA has RDNSS and DNSSL?

2020-04-02 Thread Philip Homburg
>> Independent of the prefix distribution mechanism, it may be worth revisit=
>ing
>> having a single /48 for an organisation of 4 employees.
>
>Sure, but if we start handing out /40s like there's enough of them,
>eventually there won't be.

I find it weird that the IEEE manages to allocate a unique 48 bit MAC address
to each ethernet / wifi interface and that the RIRs would be unable to
allocate 40 bit unique numbers to companies with 4 employes.

>> So having an address policy that would support a /64 per host makes sense=
> to
>> me.=20
>
>This is, interestingly enough, too big and too small at the same time.

Can you eleborate on the too small part.

Of course, we are talking about averages. There may be some big VM hosts
that may need more. Some simple devices may not need any /64.


Re: Why used DHCPv6 when RA has RDNSS and DNSSL?

2020-04-02 Thread Philip Homburg
>So you need to somehow build a prefix distribution mechanism, so people
>can have an arbitrary number of PD prefixes in "wherever network they=20
>happen to be".  So we're back to multi-level PD, with all the challenges
>(firewall rules, ACLs, internal routing, ...).  And even then, a /48
>might no longer be sufficient for a company with, say, 500 internal
>network segments and 40.000 employees - where it would be extremely=20
>spacious otherwise.

Independent of the prefix distribution mechanism, it may be worth revisiting
having a single /48 for an organisation of 4 employees.

There needs to be way to shield network complexity within a host from the
rest of the network. If we don't then limits on what routers can track (ND)
can become a limit in what we can do on a host. Even now people are already
worried about the number of 'privacy addresses'.

So having an address policy that would support a /64 per host makes sense to
me. 

If we assume that hosts have no further structure (i.e., this just requests
one or a few /64s) then managing prefixes allocated to hosts is very similar
to managing individual addresses. So there is no reason why PD would not work
for that.

Of course, in a network of routers, PD makes less sense. However in this case,
when the network is actually managed, routers get prefixes from some 
addressing plan, not from an automated mechanism.

That leaves homenet as the most complex dynamic case: potentially multiple
layers of routers that should configure automatically. However, in the homenet
case, the network is typically small enough that keeping track of individual
/64s is possible. So PD where each request is a /64 could very well work.
(I'm not trying to express an opinion on HNCP here)




Re: Why used DHCPv6 when RA has RDNSS and DNSSL?

2020-04-01 Thread Philip Homburg
>We are already 90% of the way here: Make IA_PD work for hosts, not
>just for routers. That way Android handsets can have as many addresses
>as they want.

IA_PD 'works' (for small values of works) for hosts today.

The upstream interface of a CPE is defined as a host instead of a router.

The big gap in IA_PD is that it doesn't specify how routing is supposed to
work. This is fine if IA_PD happens between routers and all routers have a 
common routing protocol.

For IA_PD to hosts, including CPEs, there is a varity of hacks to install
the prefix in the FIB of the access router.


Re: Atlas probes and 6to4 [Re: IPv6 ingress filtering]

2019-05-20 Thread Philip Homburg
>I tried to traceroute one of them (Probe #3009) at
>2002:568:1047:1:220:4aff:fee0:20ac
>and it petered out at 6to4.tyo1.he.net [2001:470:0:17a::2]
>
>The embedded IPv4 address is 5.104.16.71, which is reachable,
>and is indeed the published address of probe #3009, so it does
>indeed look like a failure in the return relay path.

Probe 3009 doesn't have a default route on IPv6. I can look at other
probes if requested.

In the context of 6to4, I'm more curious how users would experience broken
6to4. Happy Eyeballs was supposed to hide broken IPv6 in general and the
priority of 6to4 address in destination selection should be below IPv4.




Re: juniper weird IPv6 error ICMPs

2016-11-09 Thread Philip Homburg
>> And I'm really curious how to got sizes like 989, 990, 993
>>
>>
>
>Did you check the actual contents of the packets?

The contents of the packets look fine. The packets I'm sending contain
a bit of data and then zeros. The error ICMPs I get back contain the
same data and zeros. That aspect looks okay.


juniper weird IPv6 error ICMPs

2016-11-08 Thread Philip Homburg
Playing with traceroute I noticed that juniper routers send error ICMPs
with weird sizes. Did anyone else notice this as well, I can't remember
seeing it mentioned anywhere.

Here is some tcpdump output:
11:51:14.691810 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > ff02::1:ff00:1: ICMP6, 
neighbor solicitation, who has fe80::13:0:0:1, length 32
11:51:14.694750 IP6 2001:67c:2e8:13::3 > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, neighbor advertisement, tgt is fe80::13:0:0:1, length 32
11:51:14.694781 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 1, length 1308
11:51:14.697665 IP6 2001:67c:2e8:13::3 > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 
989
11:51:14.708090 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 2, length 1308
11:51:14.710634 IP6 2001:67c:2e8:13::3 > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 
989
11:51:14.721396 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 3, length 1308
11:51:14.728065 IP6 2001:67c:2e8:13::3 > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 
989
11:51:14.739038 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 4, length 1308
11:51:14.741656 IP6 ams-ix.sara.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 989
11:51:14.752068 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 5, length 1308
11:51:14.754816 IP6 ams-ix.sara.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 989
11:51:14.766003 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 6, length 1308
11:51:14.770292 IP6 ams-ix.sara.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 989
11:51:14.780776 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 7, length 1308
11:51:14.784750 IP6 0.ae4.xr3.3d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 990
11:51:14.795372 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 8, length 1308
11:51:14.798701 IP6 0.ae4.xr3.3d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 990
11:51:14.809910 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 9, length 1308
11:51:14.812934 IP6 0.ae4.xr3.3d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 990
11:51:14.823234 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 10, length 1308
11:51:14.828122 IP6 0.ae0.dr12.d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 993
11:51:14.838781 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 11, length 1308
11:51:14.842716 IP6 0.ae0.dr12.d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 993
11:51:14.853966 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 12, length 1308
11:51:14.857645 IP6 0.ae0.dr12.d12.xs4all.net > 
2001:67c:2e8:13:21c:42ff:fe9f:b8b3: ICMP6, time exceeded in-transit for 
2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 993
11:51:14.868309 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 13, length 1308
11:51:14.889053 IP6 stereo6.hq.phicoh.net > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 
1240
11:51:14.899403 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 14, length 1308
11:51:14.920754 IP6 stereo6.hq.phicoh.net > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 2001:980:1284:10:2a0:c9ff:fe9f:17a9, length 
1240
11:51:14.931113 IP6 2001:67c:2e8:13:21c:42ff:fe9f:b8b3 > 
2001:980:1284:10:2a0:c9ff:fe9f:17a9: ICMP6, echo request, seq 15, length 1308
11:51:14.951985 IP6 stereo6.hq.phicoh.net > 2001:67c:2e8:13:21c:42ff:fe9f:b8b3: 
ICMP6, time exceeded in-transit for 

Re: Netflix hates IPv6

2016-06-15 Thread Philip Homburg
In your letter dated Wed, 15 Jun 2016 11:12:19 +0200 you wrote:
>The interesting question is why they hand out v6 addresses in the first
>place - I'd assume that Netflix is doing the same global DNS content
>steering thing as all the other big content networks, so they should know
>where the user is coming from...  and if the DNS query is coming from a
>(v4) access network in the US, it seems silly to disallow access to the
>v6 server *they have told the client to use* later on.

Note that people are actively trying to bypass whatever geo restrictions
netflix puts in place. And of course, netflix wants to avoid blocking
legitimate users as much as possible.

So to the extent that DNS is used to implement geo blocking, people will
use DNS resolvers in the desired country to avoid the blocks.

Of course, in the case of HE tunnels, netflix could just add an IPv4-only
option to the users' profiles and redirect people to an IPv4-only server.
I guess they can just offer the redirect as an option whenever they
show the VPN-detected banner for an HE address.