RE: IPv6 delivery model to end customers

2009-02-09 Thread Pekka Savola

On Sat, 7 Feb 2009, Mikael Abrahamsson wrote:
But I wasn't talking (A)DSL. DSL is last century. I am talking VDSL2/ETTH. 
Security model there is to only have ethernet and IP, no PPP/ATM, no L2TPv3 
or PPPoE. Let's skip the terms BRAS/LNS etc. Anything that terminates tunnels 
is expensive (apart from GRE/IPV6IP which the 7600 seems to do very well, but 
I don't like tunnels. I like native). Most of the ETTH ports are 10/10, 
100/10 or 100/100 (or even higher speeds) and 100/10 costs ~30 USD a month. 
L2TPv3/PPPoE is not an option.


I may be missing something.  only have ethernet and IP.  Why is 
plain-ethernet with each subscriber provisioned in a separate router's 
vlan subinterface insufficient?  There is no security issue because 
each subscriber only sees its own traffic.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings



Re: Private use of non-RFC1918 IP space

2009-02-09 Thread Bill Stewart
On Sun, Feb 8, 2009 at 11:42 PM, Joel Jaeggli joe...@bogus.com wrote:
 FD00::/8

 ula-l rfc 4139

s/4139/4193/

-- 

 Thanks; Bill

Note that this isn't my regular email account - It's still experimental so far.
And Google probably logs and indexes everything you send it.



RE: IPv6 delivery model to end customers

2009-02-09 Thread Mikael Abrahamsson

On Mon, 9 Feb 2009, Pekka Savola wrote:

I may be missing something.  only have ethernet and IP.  Why is 
plain-ethernet with each subscriber provisioned in a separate router's 
vlan subinterface insufficient?  There is no security issue because each 
subscriber only sees its own traffic.


It's rare that this is the way it's done.

Most ETTH deployments I know use one of these deployment scenarios:

1. One vlan per customer (not so often) plus uRPF like behaviour.
2. Shared broadcast domain with L2 devices doing one or several of:
  2.1 Forced forwarding towards router.
  2.2 ARP inspection
  2.3 DHCP server protection (stops customers from running DHCP server)
  2.4 Spoofing filters by means of DHCP snooping (both L2 and L3)
  2.5 STP root guard
  2.6 MAC rewrite
  2.7 Ethertype filtering

Plus more I can't think of right now.

It's scenario 2 I'm worried about, all those machanisms haven't been 
implemented for IPv6 as far as I know and if you're only doing 2.2-2.5 
then you're open to the IPv6 security issue I described.


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Andy Davidson
On Thu, Feb 05, 2009 at 07:19:37PM -0500, Robert D. Scott wrote:
 Wii should not even consider developing  a cool new protocol for the Wii
 that is not NAT compliant via V4 or V6. And if they do, we should elect a
 NANOG regular to go POSTAL and handle the problem. The solution to many of
 these networking conundrums should rest with the application people, and NOT
 the network people.

You are wrong, there are lots of new ... and not so new ... protocols that 
*can* work via ALGs or other NAT traversal systems, but tend to work worse 
than if they'd had end to end visibility.  The various VoIP protocols are 
the perfect example.

The end to end principal is the lifeblood of innovation on the internet and
we need to do everything we can to allow anyone who wants it to have it.


Kind regards,
Andy Davidson



Re: Packet Loss between Qwest and Global Crossing

2009-02-09 Thread Andris Kalnozols
 This post to the NANOG list in the hope that an interested
 engineer from either Qwest or GBLX will act on the problem
 I have observed.
 
 I've identified a packet loss problem (10-15%) between Qwest
 and Global Crossing.

Thanks to whomever has fixed the problem.  Packet loss is now
zero and latency time is very much improved.

--
Andris



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Mohacsi Janos




On Mon, 9 Feb 2009, Andy Davidson wrote:


On Thu, Feb 05, 2009 at 07:19:37PM -0500, Robert D. Scott wrote:

Wii should not even consider developing  a cool new protocol for the Wii
that is not NAT compliant via V4 or V6. And if they do, we should elect a
NANOG regular to go POSTAL and handle the problem. The solution to many of
these networking conundrums should rest with the application people, and NOT
the network people.


You are wrong, there are lots of new ... and not so new ... protocols that
*can* work via ALGs or other NAT traversal systems, but tend to work worse
than if they'd had end to end visibility.  The various VoIP protocols are
the perfect example.



Example please!
Kind Regards,
Janos Mohacsi



RE: v6 DSL / Cable modems

2009-02-09 Thread TJ
So far as I am aware, this is default behaviour only on certain versions of
Mac OSX, and must be explicitly enabled on all others.
Manually, on the console.  RA does not dynamically distribute this
behaviour; the client has to choose it.  Usually it is a sysctl or a
registry variable or the like.

NIT: Add any IPv6 capable Windows workstation to that list (workstation
meaning not server OS).  Or any USAGI-derived 'nix kernel, AFAIK.
(WinXP as described/expected, Vista with a twist (no EUI64 by
default))


The philosophies of design of these two systems are entirely at odds.

While I agree with that statement, I disagree just a little bit with your
supporting argument.  On either case, the host is initiating the discussion
and trying to do what it wants (either appending randomized IIDs or asking
the DHCPv6 server to supply it with randomly generated IIDs, and using the
results as (a) temporary/privacy address(es)) ... in either case, if the
hosts doesn't support it or doesn't ask, it doesn't happen.


/TJ




RE: IPv6 delivery model to end customers

2009-02-09 Thread Soucy, Ray
 It's scenario 2 I'm worried about, all those machanisms haven't been 
 implemented for IPv6 as far as I know and if you're only doing 2.2-2.5

 then you're open to the IPv6 security issue I described.

We've been seeing problems with this for the last year or so (since
Vista started showing up).  Since we run an academic network, we don't
have as much control over hosts as you would see in a corporate setting.

We've started poking Cisco about some key IPv6 support that we really
need to move forward.

A big one is a solution to address the security concerns with IPv6 RA
(Router Advertisement) and rogue DHCPv6. On IPv4 networks we have the
option of using DHCP snooping to suppress unauthorized DHCP servers from
handing out address information. With IPv6, any host can announce itself
as a router (using RA) and make network traffic suddenly start making
use of it as the router for a network. This makes it possible for hosts
to inadvertently disrupt network service (Vista) or even be used
maliciously to perform a man-in-the-middle attack to intercept your
traffic. Similarly with DHCPv6 there is nothing stopping a host from
trying to hand out stateful IPv6 address configuration.

Even worse is that since modern hosts give traffic priority to IPv6, it
becomes easy for a rogue host (Vista) to advertise itself as an IPv6
router on IPv4-only networks. So there are security concerns even for
networks that do not run IPv6 here.

I think it goes without saying that this needs to be addressed before
IPv6 can be deployed on most campus networks where users manage their
own PC's.

So Cisco (and other vendors) needs to introduce two things for LAN
switching. DHCPv6 snooping, and more importantly, RA suppression (or RA
snooping).

As far as IPv6 deployment to residential customers...  I say most things
these days are moving to Metro Ethernet.  Give ea. customer a VLAN, that
will save you a lot of headache and ultimately provide a better
experience for the customer.

Ray Soucy
Communications Specialist

+1 (207) 561-3526

Communications and Network Services

University of Maine System
http://www.maine.edu/



Re: 97.128.0.0/9 allocation to verizon wireless

2009-02-09 Thread Ben Scott
On Sat, Feb 7, 2009 at 9:24 PM, Jeff S Wheeler j...@inconcepts.biz wrote:
 Sure, smart phones are becoming more popular.

  My ancient and crufty Nextel iDEN i530 phone, manufactured circa
2003, with a monochrome 4-line text display, and about as dumb as
they get, gets assigned an IP address.  Now, that IP address is in
10/8, but the point is that not just smart phones get IP addresses.

  As to whether VZW needs public IP space for every phone -- I'll let
others handle the rampant speculation on that front.

-- Ben



Re: IPv6 delivery model to end customers

2009-02-09 Thread Mark Tinka
On Monday 09 February 2009 10:21:24 pm Soucy, Ray wrote:

 So Cisco (and other vendors) needs to introduce two
 things for LAN switching. DHCPv6 snooping, and more
 importantly, RA suppression (or RA snooping).

For IOS, have you tried the command:

int gi0/1
 ipv6 nd ra suppress

Cheers,

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: 97.128.0.0/9 allocation to verizon wireless

2009-02-09 Thread Martin Hannigan
On Sun, Feb 8, 2009 at 7:07 PM, Mark Andrews mark_andr...@isc.org wrote:


 In message 1234128761.17985.352.ca...@guardian.inconcepts.net, Jeff S
 Wheeler
  writes:
  On Sun, 2009-02-08 at 14:37 -0800, Aaron Glenn wrote:
   NAT? why isn't Verizon 'It's the Network' Wireless using IPv6?
   speaking-from-assthere should be a FOIA-like method to see large
   allocation justifications/ass
  Realistically, I suppose Verizon Wireless is big enough to dictate to
  the manufacturers of handsets and infrastructure, you must support IPv6
  by X date or we will no longer buy / sell your product.  I wonder if
  any wireless carriers are doing this today?
 
  What services require an IP, whether they can be supplied via NAT, how
  soon smart phone adoption will bring IP to every handset ... all these
  are good and valid points.  However, they all distract from the glaring
  and obvious reality that there is no current explanation for Verizon
  Wireless needing 27M IPs.

 Well it's a 8M allocation for current population of 2M with
a 25M more potential handsets that will be upgraded soon.
This looks to be consistent with how ARIN hands out other
blocks of address space.


Plus the rest of their space, at least the easily identifiable portions.
It's extremely difficult to speculate what people are doing with large
amounts of addresses. I trust that ARIN has done the right thing in
accordance with community standards. V6 addresses included.

They may want to not recycle that template containing the comment again. It
showed up on the last two allocations.


Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-66-174-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-66-174-0-0-1)
66.174.0.0 http://ws.arin.net/whois/?queryinput=66.174.0.0 -
66.174.255.255 http://ws.arin.net/whois/?queryinput=66.174.255.255

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-69-82-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-69-82-0-0-1)
69.82.0.0 http://ws.arin.net/whois/?queryinput=69.82.0.0 -
69.83.255.255 http://ws.arin.net/whois/?queryinput=69.83.255.255

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-69-96-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-69-96-0-0-1)
69.96.0.0 http://ws.arin.net/whois/?queryinput=69.96.0.0 -
69.103.255.255 http://ws.arin.net/whois/?queryinput=69.103.255.255

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-70-192-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-70-192-0-0-1)
70.192.0.0 http://ws.arin.net/whois/?queryinput=70.192.0.0 -
70.223.255.255 http://ws.arin.net/whois/?queryinput=70.223.255.255

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET6-2001-4888-1
http://ws.arin.net/whois/?queryinput=%21%20NET6-2001-4888-1)
2001:4888::::::
http://ws.arin.net/whois/?queryinput=2001:4888::::::
- 2001:4888::::::
http://ws.arin.net/whois/?queryinput=2001:4888::::::

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-97-128-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-97-128-0-0-1)
97.128.0.0 http://ws.arin.net/whois/?queryinput=97.128.0.0 -
97.255.255.255 http://ws.arin.net/whois/?queryinput=97.255.255.255

Cellco Partnership DBA Verizon Wireless WIRELESSDATANETWORK
(NET-174-192-0-0-1
http://ws.arin.net/whois/?queryinput=%21%20NET-174-192-0-0-1)
174.192.0.0 http://ws.arin.net/whois/?queryinput=174.192.0.0 -
174.255.255.255 http://ws.arin.net/whois/?queryinput=174.255.255.255



Best,

Martin


-- 
Martin Hannigan   mar...@theicelandguy.com
p: +16178216079


FW: IPv6 delivery model to end customers

2009-02-09 Thread Soucy, Ray
 For IOS, have you tried the command:
 
 int gi0/1
 ipv6 nd ra suppress

I think this only applies to RA originating from the L3 interface in
question... not an L2 interface.  I could be mistaken.  I'll have to
poke at it.




Re: FW: IPv6 delivery model to end customers

2009-02-09 Thread Mark Tinka
On Monday 09 February 2009 11:54:41 pm Soucy, Ray wrote:

 I think this only applies to RA originating from the L3
 interface in question... not an L2 interface.

Quite right, indeed.

Mark.


signature.asc
Description: This is a digitally signed message part.


RE: 97.128.0.0/9 allocation to verizon wireless

2009-02-09 Thread Holmes,David A
We're not a big verizon wireless customer, (we have been allocated a /25
for remote data access devices). We run multi-homed BGP with vw. vw says
that they must advertise 48 summarized prefixes to us, instead of just
the /25. The 48 prefixes are apparently advertised to all of the
de-aggregated users contained in the summarized 48 prefixes. Is this a
common practice? If so is it a best practice?  

-Original Message-
From: Mike Leber [mailto:mle...@he.net] 
Sent: Sunday, February 08, 2009 10:39 PM
To: David Conrad
Cc: nanog@nanog.org
Subject: Re: 97.128.0.0/9 allocation to verizon wireless


David Conrad wrote:
 On Feb 8, 2009, at 7:37 PM, Aaron Glenn wrote:
 so if they don't deploy IPv6 then ('extremely high growth period'),
 when will they?
 
 Hint: how many of the (say) Alexa top 1000 websites are IPv6 enabled?

haha, I went insane for a moment and though you said Freenix top 1000, 
and so I just checked that.  Here is the answer to the question you 
didn't ask:

Top 1000 Usenet Servers in the World
list here: http://news.anthologeek.net/top1000.current.txt
details here: http://news.anthologeek.net

1000 usenet server names
913 are potentially valid hostnames (in usenet news a server name does 
necessarily correspond directly to a hostname)
722 have ipv4 address records (A)
67 have ipv6 address records ()
9.2% of the top 1000 usenet servers have added support for ipv6

I'm sure there are more this took exactly 183 seconds of work. ;)

Here they are:

feeder.erje.net 2001:470:992a::3e19:561
feeder4.cambrium.nl 2a02:58:3:119::4:1
news.dal.ca 2001:410:a010:1:214:5eff:fe0a:4a4e
news.nonexiste.net 2002:6009:93d5::1
nrc-news.nrc.ca 2001:410:9000:2::2
news.z74.net 2001:610:637:4::211
news.kjsl.com 2001:1868:204::104
npeer.de.kpn-eurorings.net 2001:680:0:26::2
feeder6.cambrium.nl 2a02:58:3:119::6:1
feeder3.cambrium.nl 2a02:58:3:119::3:1
news.belnet.be 2001:6a8:3c80::38
feeder2.cambrium.nl 2a02:58:3:119::2:1
feeder5.cambrium.nl 2a02:58:3:119::5:1
syros.belnet.be 2001:6a8:3c80::17
vlad-tepes.bofh.it 2001:1418:13:1::5
news.stack.nl 2001:610:1108:5011:230:48ff:fe12:2794
ikarus.belnet.be 2001:6a8:3c80::38
news.space.net 2001:608::1000:7
feed.news.tnib.de 2001:1b18:f:4::4
newsfeed.velia.net 2a01:7a0:3::254
news.isoc.lu 2001:a18:0:405:0:a0:456:1
ikaria.belnet.be 2001:6a8:3c80::39
newsfeed.teleport-iabg.de 2001:1b10:100::119:1
news.tnib.de 2001:1b18:f:4::2
kanaga.switch.ch 2001:620:0:8::119:2
erode.bofh.it 2001:1418:13:1::3
irazu.switch.ch 2001:620:0:8::119:3
bofh.it 2001:1418:13::42
newsfeed.atman.pl 2001:1a68:0:4::2
news.mb-net.net 2a01:198:292:0:210:dcff:fe67:6b03
news.gnuher.de 2a01:198:293::2
switch.ch 2001:620:0:1b::b
news.k-dsl.de 2a02:7a0:1::5
news.task.gda.pl 2001:4070:1::fafe
news1.tnib.de 2001:1b18:f:4::2
aspen.stu.neva.ru 2001:b08:2:100::96
novso.com 2001:1668:2102:4::4
citadel.nobulus.com 2001:6f8:892:6ff::11:133
feeder.news.heanet.ie 2001:770:18:2::c101:db29
news-zh.switch.ch 2001:620:0:3::119:1
news.szn.dk 2001:1448:89::10:d85d
news.litech.org 2001:440:fff9:100:202:b3ff:fea4:a44e
news.weisnix.org 2001:6f8:892:6ff:213:8fff:febb:bec3
news.panservice.it 2001:40d0:0:4000::e
nntp.eutelia.it 2001:750:2:3::20
bolzen.all.de 2001:bf0::60
newsfeed.esat.net 2001:7c8:3:1::3
news.snarked.org 2607:f350:1::1:4
feed1.news.be.easynet.net 2001:6f8:200:2::5:46
aotearoa.belnet.be 2001:6a8:3c80::58
news.babsi.de 2a01:198:292:0:230:48ff:fe51:a68c
news.muc.de 2001:608:1000::2
newsfeed.carnet.hr 2001:b68:e160::3
news.nask.pl 2001:a10:1:::3:c9a2
news.linuxfan.it 2001:4c90:2::6
texta.sil.at 2001:858:2:1::2
news.stupi.se 2001:440:1880:5::10
news.supermedia.pl 2001:4c30:0:3::12
news.trigofacile.com 2001:41d0:1:6d44::1
nuzba.szn.dk 2001:6f8:1232::263:8546
geiz-ist-geil.priv.at 2001:858:666:f001::57
newsfeed.sunet.se 2001:6b0:7:88::101
news.pimp.lart.info 2001:6f8:9ed::1
glou.fr.eu.org 2001:838:30b::1
news.germany.com 2001:4068:101:119:1::77
feeder.z74.net 2001:610:637:4::211
news.nask.org.pl 2001:a10:1:::3:c9a2

Mike.

-- 
+ H U R R I C A N E - E L E C T R I C +
| Mike LeberWholesale IPv4 and IPv6 Transit  510 580 4100 |
| Hurricane Electric   AS6939 |
| mle...@he.net Internet Backbone  Colocation  http://he.net |
+-+




Re: One /22 Two ISP no BGP

2009-02-09 Thread Andy Davidson
On Fri, Feb 06, 2009 at 01:13:14PM -0500, Joe Maimon wrote:
 Perhaps ebgp-multihop with this ISP's upstream provider might offer you 
 an advantage combined with this approach.

This is quite neat, but the ISP may be multihomed and support BGP at
one edge (several transits, several peers), but not at their customer
facing edge.

Andy



Re: Packet Loss between Qwest and Global Crossing

2009-02-09 Thread Dave Temkin
This has been a recurring problem, especially in the Bay Area - and it 
seems as though neither side really cares all that much.


-Dave

Andris Kalnozols wrote:

This post to the NANOG list in the hope that an interested
engineer from either Qwest or GBLX will act on the problem
I have observed.

I've identified a packet loss problem (10-15%) between Qwest
and Global Crossing.



Thanks to whomever has fixed the problem.  Packet loss is now
zero and latency time is very much improved.

--
Andris

  




Re: Packet Loss between Qwest and Global Crossing

2009-02-09 Thread Morgan Miskell
Oddly enough, we've got a few customers that are on Qwest network on the
east coast and we see packet loss in the same range to them, we've
tested origination packets from 6-7 networks.  The customer has reported
it and the issue has been ongoing for at least a week or two, but so far
nothing has been done...

On Mon, 2009-02-09 at 09:49 -0800, Dave Temkin wrote:
 This has been a recurring problem, especially in the Bay Area - and it 
 seems as though neither side really cares all that much.
 
 -Dave
 
 Andris Kalnozols wrote:
  This post to the NANOG list in the hope that an interested
  engineer from either Qwest or GBLX will act on the problem
  I have observed.
 
  I've identified a packet loss problem (10-15%) between Qwest
  and Global Crossing.
  
 
  Thanks to whomever has fixed the problem.  Packet loss is now
  zero and latency time is very much improved.
 
  --
  Andris
 

 
-- 
Morgan A. Miskell
Carolina Internet
704-643-8330 x206

The information contained in this e-mail is confidential and is intended
only for the named recipient(s). If you are not the intended recipient
you must not copy, distribute, or take any action or reliance on it. If
you have received this e-mail in error, please notify the sender. Any
unauthorized disclosure of the information contained in this e-mail is
strictly prohibited.






RE: IPv6 delivery model to end customers

2009-02-09 Thread TJ
A big one is a solution to address the security concerns with IPv6 RA
(Router Advertisement) and rogue DHCPv6. On IPv4 networks we have the
option
of using DHCP snooping to suppress unauthorized DHCP servers from handing
out address information. With IPv6, any host can announce itself as a
router
(using RA) and make network traffic suddenly start making use of it as the
router for a network. This makes it possible for hosts to inadvertently
disrupt network service (Vista) or even be used maliciously to perform a
man-in-the-middle attack to intercept your traffic. Similarly with DHCPv6
there is nothing stopping a host from trying to hand out stateful IPv6
address configuration.

Even worse is that since modern hosts give traffic priority to IPv6, it
becomes easy for a rogue host (Vista) to advertise itself as an IPv6 router
on IPv4-only networks. So there are security concerns even for networks
that
do not run IPv6 here.

I think it goes without saying that this needs to be addressed before
IPv6 can be deployed on most campus networks where users manage their own
PC's.

So Cisco (and other vendors) needs to introduce two things for LAN
switching. DHCPv6 snooping, and more importantly, RA suppression (or RA
snooping).

Indeed, this is a problem.
RA Guard is a very straight-forward, hopefully soon-to-be-widely-supported,
defense.
http://tools.ietf.org/html/draft-ietf-v6ops-ra-guard-01

A pure layer 3 solution is, of course, SEND/CGA ... where deployment
concerns/problems abound ...
http://tools.ietf.org/html/rfc3971 
http://tools.ietf.org/html/rfc3972

And as I may have said once or thrice already, YES - I agree these solutions
should have been developed / made deployable long before now.


As far as IPv6 deployment to residential customers...  I say most things
these days are moving to Metro Ethernet.  Give ea. customer a VLAN, that
will save you a lot of headache and ultimately provide a better experience
for the customer.

Amen to that ...




RE: IPv6 delivery model to end customers

2009-02-09 Thread TJ
 So Cisco (and other vendors) needs to introduce two things for LAN
 switching. DHCPv6 snooping, and more importantly, RA suppression (or
 RA snooping).

For IOS, have you tried the command:

int gi0/1
 ipv6 nd ra suppress


That stops your router from sending any RAs.
Does nothing to prevent someone else from sending them, and becoming the
default gateway for every IPv6 capable host on that link ... 




RE: IPv6 delivery model to end customers

2009-02-09 Thread Soucy, Ray
 Indeed, this is a problem.
 RA Guard is a very straight-forward, hopefully
soon-to-be-widely-supported,
 defense.
   http://tools.ietf.org/html/draft-ietf-v6ops-ra-guard-01

Thanks for pointing us to this.  It's encouraging to know that it is
being worked on.

Ray





Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Ricky Beam

On Fri, 06 Feb 2009 22:32:10 -0500, Owen DeLong o...@delong.com wrote:

IPTables is decent firewall code.


Not really.  It's quite complicated for a non-engineer type to manage.   
Think of all the unpatched windows xp/vista users of the world.



It's free.

...
Further, since more and more CPE is being built on embedded linux,  
there's no reason
that IPTables isn't a perfectly valid approach to the underlying  
firewall code.


No. It's not.  While you might not be paying anyone for the software, it  
does come with some significant costs... a moderately powerful processor  
and a lot of memory.  Ah, but both are cheap these days, and getting  
cheaper, you say.  Tell me where I can get 500MHz+ processors and 16+ MB  
of ram for pennies.  Case in point... (in case you missed it) Linksys  
stopped using Linux on their popular WRT54G line years ago in favor of  
vxWorks because it took less resources and therefor meant they could use  
less memory (flash and ram) and save money despite paying a license fee  
for vxWorks. (They still use vxWorks on the 54g, but have used linux on  
their newer (much more expensive) hardware.)


DSL and cable modems are extremely simple devices.  I'm amazed they have  
any amount of router in them at all.  And I've yet to see one running  
Linux. (the 2 popular brands around here -- westell and motorola -- run  
vxworks.)


--Ricky



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Ricky Beam
On Sat, 07 Feb 2009 14:31:57 -0500, Stephen Sprunk step...@sprunk.org  
wrote:

Non-NAT firewalls do have some appeal, because they don't need to mangle
the packets, just passively observe them and open pinholes when
appropriate.


This is exactly the same with NAT and non-NAT -- making any anti-NAT  
arguments null.


In the case of NAT, the helper has to understand the protocol to know  
what traffic to map.


In the case of a stateful firewalling (non-NAT), the helper has to  
understand the protocol to know what traffic to allow.


Subtle difference, but in the end, the same thing... if your gateway  
doesn't know what you are doing, odds are it will interfere with it.  In  
all cases, end-to-end transparency doesn't exist. (as has been the case  
for well over a decade.)


--Ricky



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Jack Bates

Ricky Beam wrote:
On Sat, 07 Feb 2009 14:31:57 -0500, Stephen Sprunk step...@sprunk.org 
wrote:

Non-NAT firewalls do have some appeal, because they don't need to mangle
the packets, just passively observe them and open pinholes when
appropriate.


This is exactly the same with NAT and non-NAT -- making any anti-NAT 
arguments null.


Actually, it's worlds different.

In the case of a stateful firewalling (non-NAT), the helper has to 
understand the protocol to know what traffic to allow.


This is not completely true. Technologies such as uPNP can quickly open 
up a pinhole for traffic which needs to be initiated from the far end, 
but no address rewriting is necessary by the software (embedded in the 
protocol) or the firewall. For non-UDP/TCP packets, ports have no 
meaning, which is the biggest failing of NAT (since we are talking about 
overloading on one IP here, and not 1 to 1 translations). Firewall rules 
for packets that are not UDP/TCP usually allow the return traffic based 
on source and destination IP and IP protocol number. NAT, on the other 
hand can't do it. We have to make udp/tcp tunnels to carry the traffic 
through NAT instead.


Subtle difference, but in the end, the same thing... if your gateway 
doesn't know what you are doing, odds are it will interfere with it.  In 
all cases, end-to-end transparency doesn't exist. (as has been the case 
for well over a decade.)


End-to-end addressing does exist, though. There are cases that are 
straight forward that NAT breaks without adding extra tunneling layers, 
or without either NAT or the software having to rewrite an embedded IP 
address in a packet to the public address. Sure, stateful firewalls can 
still block traffic and break certain scenarios without the assistance 
of uPNP(or application layer analysis). They will be simpler, and break 
less (we'd hope simpler means less). It's one thing to communicate with 
your firewall to dynamically open up ports for your address. It's 
another to start rewriting packets, analyzing specific protocols so that 
you can alter them.


Feel free to disagree with me on all except non-TCP/UDP breakage. I've 
had too many support calls on that one, and NAT-T isn't always 
available, and even when available, it's not necessarily configurable.



Jack



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Scott Howard
On Sat, Feb 7, 2009 at 5:56 PM, Matthew Moyle-Croft 
m...@internode.com.auwrote:

 My issue is that customers have indicated that they feel statics are a
 given for IPv6 and this would be a problem if I went from tens of thousands
 of statics to hundreds of thousands of static routes (ie. from a minority to
  all).   Even injecting statics into


But is this a general requirement, or just one from the types of people that
are likely to be early adopters for IPv6?

Go and ask those people who feel statics are a given for IPv6 if they
would prefer static or dynamic IPv4 addresses, and I suspect most/all of
them will want the static there too.  Now ask your average user the same
question and see if you get the same answer.

I don't see static for IPv6 as any more (or less?) of an operational
requirement than for IPv4.  Certain users will definitely require static
address, just as they do for IPv4, and IMHO these should be handled in
exactly the same way - the exact mechanism for which will vary from ISP to
ISP.

  Scott.


Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Nathan Ward

On 10/02/2009, at 11:35 AM, Scott Howard wrote:

Go and ask those people who feel statics are a given for IPv6 if  
they
would prefer static or dynamic IPv4 addresses, and I suspect most/ 
all of
them will want the static there too.  Now ask your average user the  
same

question and see if you get the same answer.



I imagine there will be a difference - in my experience few people  
understand the automatic renumbering that you can do with IPv6, so  
think that static addressing is the only way forward.


With IPv4 this is not an issue, as they do not re-number internal  
interfaces when their external IPv4 address changes.


--
Nathan Ward




Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Owen DeLong


On Feb 9, 2009, at 2:11 PM, Ricky Beam wrote:

On Sat, 07 Feb 2009 14:31:57 -0500, Stephen Sprunk  
step...@sprunk.org wrote:
Non-NAT firewalls do have some appeal, because they don't need to  
mangle

the packets, just passively observe them and open pinholes when
appropriate.


This is exactly the same with NAT and non-NAT -- making any anti-NAT  
arguments null.



And making the PRO-NAT arguments in this respect equally NULL.

This was being touted as a benefit of NAT, not a reason not to do NAT.

Your statement proves my point... It is NOT a reason to do NAT or a
benefit derived from NAT.

In the case of NAT, the helper has to understand the protocol to  
know what traffic to map.


In the case of a stateful firewalling (non-NAT), the helper has  
to understand the protocol to know what traffic to allow.


Subtle difference, but in the end, the same thing... if your gateway  
doesn't know what you are doing, odds are it will interfere with  
it.  In all cases, end-to-end transparency doesn't exist. (as has  
been the case for well over a decade.)


Right.  This is the counterpoint to the argument that NAT is needed.   
You have

now agreed that it is not.

Owen




Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Ricky Beam
On Fri, 06 Feb 2009 09:39:01 -0500, Iljitsch van Beijnum  
iljit...@muada.com wrote:
If you want the machine to always have the same address, either enter  
it manually or set your DHCP server to always give it the same address.


Manual configuration doesn't scale. With IPv4, it's quite hard to make  
this work with DHCP, but mostly because of a lack of IPv4 addresses.  
With IPv6 it's easier, but you're still limiting the uptime of your  
system to that of the DHCPv6 server. Router advertisements is much more  
robust.


As I read it, you don't want to use DHCP because it's an other service to  
fail.  Well, what do you think is broadcasting RA's?  My DHCP servers  
have proven far more stable than my routers. (and one of them is a windows  
server :-))  Most dhcp clients that keep any state will continue using the  
previously assigned address if the server is unavailable (and nothing else  
is using it.)  Configuring a static address in a DHCP server is a pretty  
trivial task.


My point is simply, this whole mess with RA's should never have been on  
the table.  DHCP has been around and used for years to provide IPv4 hosts  
with an address, gateway, and MANY other configuration options.  It exists  
because (in many cases) hosts need more than just an address.  Yet the  
protocol designers, staunch haters of DHCP, refused to see any value in  
DHCP for IPv6 and rolled back the clock 3 decades dooming us ALL to  
repeating the same bull.  DHCPv6 can do everything SLAAC can plus  
infintely more.  And an it just works configurationless setup could have  
been part of the standard instead; yet here we are... nobody 100% happy  
and a considerable amount of work being poured into reinventing the DHCP  
wheel.


Manual static configuration is indeed a pain.  That's why we have DHCP...  
set aside a range of addresses for machines that can move around (client  
workstations, etc.) and a pool of persistant addresses for servers,  
printers, etc. that you want to stay in one place -- some applications  
record addresses instead of names, *sigh*.  Everything is in one, easy to  
manage location.  For an ISP where a lot necessarily has to be manually  
configured, it can be more work, but is still simple -- even in the days  
of the NOC NOTEBOOK where only one person could be assigning addresses  
at a time. (we've had web based stuff for years now; feed rwhois directly,  
'tho not automatic.)



Isn't remembering stuff what we have computers for?


If you aren't accessing machines by number, why do you care if it always  
has the same number?  As long as the name always maps to the right number,  
it doesn't matter.


I have a lot of problems with DHCP and most people don't _need_ it.  
Still, very many people _want_ it and some people do in fact need it. I  
have no problem with that, as long as it doesn't lead to the situation  
where I have to run it.


And I, likewise, don't want the utterly useless RA forced on my  
networks.  Hosts need much more than just a unique address.  And I don't  
want to have to walk around to every one of them to change anything.


--Ricky



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Michael Thomas

Nathan Ward wrote:

On 10/02/2009, at 11:35 AM, Scott Howard wrote:


Go and ask those people who feel statics are a given for IPv6 if they
would prefer static or dynamic IPv4 addresses, and I suspect most/all of
them will want the static there too.  Now ask your average user the same
question and see if you get the same answer.



I imagine there will be a difference - in my experience few people 
understand the automatic renumbering that you can do with IPv6, so think 
that static addressing is the only way forward.


With IPv4 this is not an issue, as they do not re-number internal 
interfaces when their external IPv4 address changes.


I wonder how much this is all going to change as there's an inevitable
shift from my computer being The Client, to my computer being one
of many servers that my cell phone uses, and is generally tethered
to. Or just the situation that you have more than one place of residence
and there is a somewhat indeterminate concept of what my computer
really is.

This is somewhat reminiscent of the pop/imap days, but there's just so
much more stuff these days and broadband is still way too slow to
really have a completely viable network/server solution. Fast servers
in the network are great, but there are is a fairly large set of things
that it just doesn't handle well; manifestly given the still huge split
between local and network storage. (what percentage of stuff is in the
cloud? 1%?)

To me, that says that more and more people are going to want to access
their home computer as if it were a server... which in fact it really
is in the case of an iPhone wanting to suck down the latest dross from
iTunes. And server means non-client accessiblity however you accomplish
that.

Mike



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Stephen Sprunk

Ricky Beam wrote:
On Sat, 07 Feb 2009 14:31:57 -0500, Stephen Sprunk 
step...@sprunk.org wrote:
Non-NAT firewalls do have some appeal, because they don't need to 
mangle the packets, just passively observe them and open pinholes 
when appropriate.


This is exactly the same with NAT and non-NAT -- making any anti-NAT 
arguments null.


In the case of NAT, the helper has to understand the protocol to 
know what traffic to map.


In the case of a stateful firewalling (non-NAT), the helper has to 
understand the protocol to know what traffic to allow.


Subtle difference, but in the end, the same thing... if your gateway 
doesn't know what you are doing, odds are it will interfere with it.  
In all cases, end-to-end transparency doesn't exist. (as has been the 
case for well over a decade.)


Yes, an ALG needs to understand the packet format to open pinholes -- 
but with NAT, it also needs to mangle the packets.  A non-NAT firewall 
just examines the packets and then passes them on unmangled.


This mangling can be a serious source of problems.  With UDP, it can 
introduce checksum errors.  With TCP, not only do you have possible 
checksum errors, you also have to mangle the sequence numbers in both 
directions if the length of the payload changes.  The mangling will 
inherently break standard IPsec and other shim layers like HIP.  And 
let's not forget that NAT makes widespread deployment of any L4 
alternative to TCP and UDP (e.g. SCTP) virtually impossible, forcing 
every new transport or shim protocol to inefficiently ride on top of TCP 
or UDP...


Some protocols, e.g. SIP/RTP, also work fine through a stateful firewall 
even without an ALG in most cases -- but not when you add in NAT.


S

--
Stephen Sprunk God does not play dice.  --Albert Einstein
CCIE #3723 God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity. --Stephen Hawking



smime.p7s
Description: S/MIME Cryptographic Signature


Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Mark Newton


On 10/02/2009, at 9:54 AM, Stephen Sprunk wrote:


Yes, an ALG needs to understand the packet format to open pinholes  
-- but with NAT, it also needs to mangle the packets.  A non-NAT  
firewall just examines the packets and then passes them on unmangled.


Sure, but at the end of the day a non-NAT firewall is just a special  
case

of NAT firewall where the inside and outside addresses happen to
be the same.

If I was a commodity consumer hardware manufacturer, that's how I'd  
handle

the IPv6 firewalling problem, because that'd let me pass non-NAT'ed v6
packets and NAT'ed v4 packets through the same code paths, thereby  
enabling

me to avoid reinventing the entire wheel (and an entire new set of bugs)
to do v6 firewalling.

DSL/Cable CPE is already full of v4 ALGs, and it's reasonable to  
expect that

the only difference between those and the equivalent v6 ALGs will be the
lack of v6 NAT.

  -  mark

--
Mark Newton   Email:  new...@internode.com.au 
 (W)
Network Engineer  Email:   
new...@atdot.dotat.org  (H)

Internode Pty Ltd Desk:   +61-8-82282999
Network Man - Anagram of Mark Newton  Mobile: +61-416-202-223








Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Owen DeLong


On Feb 9, 2009, at 3:33 PM, Mark Newton wrote:



On 10/02/2009, at 9:54 AM, Stephen Sprunk wrote:


Yes, an ALG needs to understand the packet format to open pinholes  
-- but with NAT, it also needs to mangle the packets.  A non-NAT  
firewall just examines the packets and then passes them on unmangled.


Sure, but at the end of the day a non-NAT firewall is just a special  
case

of NAT firewall where the inside and outside addresses happen to
be the same.


Uh, that's a pretty twisted view.  I would say that NAT is a special
additional capability of the firewall which mangles the address(es)
in the packet.  I would not regard passing the address unmangled
as a special case of mangling.

In terms of implementing the code, sure, the result is about the same,
but, the key point here is that there really isn't a benefit to having  
that

packet mangling code in IPv6.

Owen




Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Mark Newton


On 10/02/2009, at 10:17 AM, Owen DeLong wrote:


Sure, but at the end of the day a non-NAT firewall is just a  
special case

of NAT firewall where the inside and outside addresses happen to
be the same.


Uh, that's a pretty twisted view.  I would say that NAT is a special
additional capability of the firewall which mangles the address(es)
in the packet.  I would not regard passing the address unmangled
as a special case of mangling.


You're passing a value judgement on NAT, using loaded terms like  
mangling

and twisted.

Fine, you don't like rewriting L3 addresses and L4 port numbers.  Yep,
I get that.  Relevance?


In terms of implementing the code, sure, the result is about the same,
but, the key point here is that there really isn't a benefit to  
having that

packet mangling code in IPv6.


There is if you have a dual-stack device, your L4-and-above protocols
are the same under v4 and v6, and you don't want to reinvent the ALG  
wheel.


  - mark

--
Mark Newton   Email:  new...@internode.com.au 
 (W)
Network Engineer  Email:   
new...@atdot.dotat.org  (H)

Internode Pty Ltd Desk:   +61-8-82282999
Network Man - Anagram of Mark Newton  Mobile: +61-416-202-223








Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Matthew Kaufman

Owen DeLong wrote:

In terms of implementing the code, sure, the result is about the same,
but, the key point here is that there really isn't a benefit to having that
packet mangling code in IPv6.


Unless your SOX auditor requires it in order to give you a non-qualified 
audit of your infrastructure.


The real problem with IPv6 deployment is not that it can't be done, but 
that there are so many still-to-be-answered questions between here and 
there...


Matthew Kaufman



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Mark Andrews

In message 4990c38c.8060...@eeph.com, Matthew Kaufman writes:
 Owen DeLong wrote:
  In terms of implementing the code, sure, the result is about the same,
  but, the key point here is that there really isn't a benefit to having that
  packet mangling code in IPv6.
 
 Unless your SOX auditor requires it in order to give you a non-qualified 
 audit of your infrastructure.

The SOX auditor ought to know better.  Any auditor that
requires NAT is incompenent.
 
 The real problem with IPv6 deployment is not that it can't be done, but 
 that there are so many still-to-be-answered questions between here and 
 there...

And the only way to answer them is to go ahead and find the
gaps.  Waiting and waiting won't find the problems and will
just put you under more time presure.

Mark
 
 Matthew Kaufman
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Jack Bates

Mark Newton wrote:

Fine, you don't like rewriting L3 addresses and L4 port numbers.  Yep,
I get that.  Relevance?

Just out of what I like and might use, GRE (no port), ESP (no port), AH 
(no port), SCTP (would probably work fine with NAT, but I haven't seen 
it supported yet and because every box doing address rewrites MUST 
understand the protocol to perform NAT, it's likely to be back shelved 
despite it's cool features. Without NAT, it can be treated like GRE, 
ESP, and AH by a firewall, though improved security if the firewall does 
understand the protocol). And my favorite, 6-to-4, broken.



There is if you have a dual-stack device, your L4-and-above protocols
are the same under v4 and v6, and you don't want to reinvent the ALG wheel.


ALG only fixes some problems, and it's not required for as much when 
address translations are not being performed. In addition, the bugs 
caused from address rewrites (and there have been some really poor 
implementations at the cheap home router level) will naturally disappear 
(to be replaced with new bugs concerning ALG/uPNP I'm sure).



Jack



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Mark Newton


On 10/02/2009, at 11:03 AM, Jack Bates wrote:


There is if you have a dual-stack device, your L4-and-above protocols
are the same under v4 and v6, and you don't want to reinvent the  
ALG wheel.


ALG only fixes some problems, and it's not required for as much when  
address translations are not being performed.


On a commodity consumer CPE device, the ALG code doubles as a
stateful inspection engine.

So it _is_ required when address translations are not being performed.

Is security something that gets thought about now, or post-deployment?

  - mark

--
Mark Newton   Email:  new...@internode.com.au 
 (W)
Network Engineer  Email:   
new...@atdot.dotat.org  (H)

Internode Pty Ltd Desk:   +61-8-82282999
Network Man - Anagram of Mark Newton  Mobile: +61-416-202-223








Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Jack Bates

Mark Newton wrote:

On a commodity consumer CPE device, the ALG code doubles as a
stateful inspection engine.

So it _is_ required when address translations are not being performed.



H, the code may be there, but I suspect that not all of it will 
apply to v6 and be used.



Is security something that gets thought about now, or post-deployment?


I suspect that depends on who you ask. Security is always the top of my 
list. That being said, what security is there in removing NAT from v4 
because it broke what the customer wanted to do? Then they are back to 
their host based stateful firewall; which apparently everyone believes 
is not good enough. Might as well throw in v6 and trash the NAT.



Jack



Network equipments process utilization

2009-02-09 Thread 정치영
Hi everyone,

I wonder which percentage is good level of CPU and Memory util of network 
equipment ?
In my case, I try to keep under 30% cpu util and 70% memory util. My most 
equipment are Cisco product. 
I have no technical reference about that, it is just a rule of mine or my 
predecessor.
Could you tell me how other operators are doing ? what is your operation 
baseline ? or is there any guideline about process utilization ?

Best regards,
Chiyoung 
=
 Chi-Young Joung
 SAMSUNG NETWORKS Inc.
 Email: lion...@samsung.com
 Tel +82 70 7015 0623, Mobile +82 17 520 9193
 Fax +82 70 7016 0031
=

RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread TJ
As I read it, you don't want to use DHCP because it's an other service to
fail.  Well, what do you think is broadcasting RA's?  My DHCP servers have
proven far more stable than my routers. (and one of them is a windows
server
:-))  Most dhcp clients that keep any state will continue using the
previously assigned address if the server is unavailable (and nothing else
is using it.)  Configuring a static address in a DHCP server is a pretty
trivial task.

Your routers fail frequently?  And does your traffic continue to get
forwarded?  Perhaps through another router?
... which would work the same way in an IPv6 scenario ... with the host
knowing it's address for a period of time (Valid timer), and learning a new
gateway in fairly short order (even sans FHRP).


My point is simply, this whole mess with RA's should never have been on the
table.  DHCP has been around and used for years to provide IPv4 hosts with
an address, gateway, and MANY other configuration options.  It exists
because (in many cases) hosts need more than just an address.  Yet the
protocol designers, staunch haters of DHCP, refused to see any value in
DHCP
for IPv6 and rolled back the clock 3 decades dooming us ALL to repeating
the
same bull.  DHCPv6 can do everything SLAAC can plus infintely more.  And an
it just works configurationless setup could have been part of the
standard
instead; yet here we are... nobody 100% happy and a considerable amount of
work being poured into reinventing the DHCP wheel.

Why is there a problem with RAs being the first step, possibly including
prefix info or possibly just hinting @ DHCPv6?


Manual static configuration is indeed a pain.  That's why we have DHCP...
set aside a range of addresses for machines that can move around (client
workstations, etc.) and a pool of persistant addresses for servers,
printers, etc. that you want to stay in one place -- some applications
record addresses instead of names, *sigh*.  Everything is in one, easy to
manage location.  For an ISP where a lot necessarily has to be manually
configured, it can be more work, but is still simple -- even in the days of
the NOC NOTEBOOK where only one person could be assigning addresses at a
time. (we've had web based stuff for years now; feed rwhois directly, 'tho
not automatic.)

 Isn't remembering stuff what we have computers for?

If you aren't accessing machines by number, why do you care if it always
has
the same number?  As long as the name always maps to the right number, it
doesn't matter.

 I have a lot of problems with DHCP and most people don't _need_ it.
 Still, very many people _want_ it and some people do in fact need it.
 I have no problem with that, as long as it doesn't lead to the
 situation where I have to run it.

And I, likewise, don't want the utterly useless RA forced on my networks.
Hosts need much more than just a unique address.  And I don't want to have
to walk around to every one of them to change anything.

Well, as it stands now the RA isn't useless.  
It, and it alone, provides default gateway information ... from the default
gateway itself.
(I actually think that this is architecturally superior, but that is just my
opinion ... )
((The rest of the info, (addressing or other) can be obtained via RA/SLAAC
or DHCPv6))

Also, it is not true in every case that hosts need a lot more than an
address.
In many cases all my machine needs is an address, default gateway and DNS
server (cheat off of v4 | RFC5006 | Stateless DHCPv6).





RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread TJ
   The SOX auditor ought to know better.  Any auditor that
   requires NAT is incompenent.

Sadly, there are many audit REQUIREMENTS explicitly naming NAT and RFC1918
addressing ... 




Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Mark Andrews

In message 00cf01c98b24$efe42680$cfac73...@com, TJ writes:
 Also, it is not true in every case that hosts need a lot more than an
 address.
 In many cases all my machine needs is an address, default gateway and DNS
 server (cheat off of v4 | RFC5006 | Stateless DHCPv6).

address + default gateway.  I know where the root servers live :-)
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread John Peach


On Mon, 9 Feb 2009 21:16:49 -0500
TJ trej...@gmail.com wrote:

  The SOX auditor ought to know better.  Any auditor that
  requires NAT is incompenent.
 
 Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
 RFC1918 addressing ... 

SOX auditors are incompetent. I've been asked about anti-virus software
on UNIX servers and then asked to prove that they run UNIX.
 
 


-- 
John



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Christopher Morrow
On Mon, Feb 9, 2009 at 6:16 PM, Ricky Beam jfb...@gmail.com wrote:
 On Fri, 06 Feb 2009 09:39:01 -0500, Iljitsch van Beijnum
 iljit...@muada.com wrote:

 If you want the machine to always have the same address, either enter it
 manually or set your DHCP server to always give it the same address.

 Manual configuration doesn't scale. With IPv4, it's quite hard to make
 this work with DHCP, but mostly because of a lack of IPv4 addresses. With

'quite hard to make this work'?? what?? have you been making a dhcp
server from scratch all these years? Iljitsch, what parts of making
static mappings in DHCP, or setting the configuration bits required
for dns/default-router/tftp-server/root-partition/wins-server/. is
'hard to do' in a dhcp server with decently wide use today? (isc
dhcpd/windows-dhcp-server)

 IPv6 it's easier, but you're still limiting the uptime of your system to
 that of the DHCPv6 server. Router advertisements is much more robust.

'more robust'... except it doesnt' actually get a device into a usable
state without admins walking around to each machine and poking at them
randomly. if you have 5 machines that's cool, knock yourself out, if
you have 5000 or 5 you are in a completely different ballpark of
work. DHCP servers do this today, the servers pass out all the
relevant bits require for dynamic-addressed and static-addressed
systems, they can be rebooted, moved, re-addressed, re-homed... all
without the masses of clients stopping their work.

Why are you filling the discussion with FUD about dhcp servers??


 As I read it, you don't want to use DHCP because it's an other service to
 fail.  Well, what do you think is broadcasting RA's?  My DHCP servers have
 proven far more stable than my routers. (and one of them is a windows server
 :-))  Most dhcp clients that keep any state will continue using the
 previously assigned address if the server is unavailable (and nothing else
 is using it.)  Configuring a static address in a DHCP server is a pretty
 trivial task.

thank you Mr. Beam.

 I have a lot of problems with DHCP and most people don't _need_ it. Still,

can you explain how 'most people don't need it'?? is that because most
people have an admin to go configure their DNS servers in their
resolver config?? Consumer Internet users are a great example of this,
if necessary an ISP can pass out new DNS servers, and in 8-10 days
easily remove the old DNS servers from the network, or move them to
another place in the network seemlessly without having to touch each
consumer device.

Why would anyone NOT want that?? what replaces that option in current
RA deployments?

 very many people _want_ it and some people do in fact need it. I have no
 problem with that, as long as it doesn't lead to the situation where I have
 to run it.

no, you don't today have to run it... but why are you arguing against
the fact that admins at enterprises and ISP's have been making this
very clear argument for equal functionality to what's available today?

-Chris



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Seth Mattinen
John Peach wrote:
 
 On Mon, 9 Feb 2009 21:16:49 -0500
 TJ trej...@gmail.com wrote:
 
 The SOX auditor ought to know better.  Any auditor that
 requires NAT is incompenent.
 Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
 RFC1918 addressing ... 
 
 SOX auditors are incompetent. I've been asked about anti-virus software
 on UNIX servers and then asked to prove that they run UNIX.


Not just SOX. I vaguely remember something in PCI about NAT. It wouldn't
surprise me if every auditing thing involving computers said something
about requiring NAT. See my earlier comment about NAT=firewall.

~Seth




RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread TJ
 The SOX auditor ought to know better.  Any auditor that
 requires NAT is incompenent.

 Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
 RFC1918 addressing ...

SOX auditors are incompetent. I've been asked about anti-virus software on
UNIX servers and then asked to prove that they run UNIX.

Fair enough, but my point was that it isn't the auditors' faults in _all_
cases.
When the compliance explicitly requires something they are required to check
for it, they don't have the option of ignoring or waving requirements ...
and off the top of my head I don't recall if it is SOX that calls for
RFC1918 explicitly but I know there are some that do.






Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Jack Bates

TJ wrote:

When the compliance explicitly requires something they are required to check
for it, they don't have the option of ignoring or waving requirements ...
and off the top of my head I don't recall if it is SOX that calls for
RFC1918 explicitly but I know there are some that do.


I believe that RFC1918 space won't be a requirement for IPv6. I'm pretty 
sure the requirements will change as the addressing changes. Of course, 
I'm sure you will have a lot of NEW requirements. :)


Jack



RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread TJ
Why would anyone NOT want that?? what replaces that option in current RA
deployments?

One nit - I like to differentiate between the presence of RAs (which should
be every user where IPv6 is present) and the use of SLAAC (RA + prefix).


Right now - Cheat off of IPv4's config.
(Lack of DHCPv6 client-side support, and lack of DNS v6 transport (WinXP),
necessitate this)

Hopefully soon - RFC5006.
Around the same timeframe - DHCPv6 (stateful or stateless, doesn't matter).





RE: IPv6 delivery model to end customers

2009-02-09 Thread TJ
  http://tools.ietf.org/html/draft-ietf-v6ops-ra-guard-01 
Thanks for pointing us to this.  It's encouraging to know that it is being
worked on.

My pleasure, now everyone - feel free to ring up your local sales/support
rep and encourage their product to implement this ... please!


/TJ




RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Frank Bulk - iName.com
Comtrend DSL modem use iptables in their code.  I discovered this while
trying to understood why small-MTU FTP breaks when issuing the PORT command.

Frank

-Original Message-
From: Ricky Beam [mailto:jfb...@gmail.com] 
Sent: Monday, February 09, 2009 4:01 PM
To: Owen DeLong
Cc: nanog@nanog.org
Subject: Re: v6  DSL / Cable modems [was: Private use of non-RFC1918 IP
space

snip

DSL and cable modems are extremely simple devices.  I'm amazed they have
any amount of router in them at all.  And I've yet to see one running
Linux. (the 2 popular brands around here -- westell and motorola -- run
vxworks.)

--Ricky





Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Mark Andrews

In message 00df01c98b27$3181b7e0$948527...@com, TJ writes:
The SOX auditor ought to know better.  Any auditor that
requires NAT is incompenent.
 
  Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
  RFC1918 addressing ...
 
 SOX auditors are incompetent. I've been asked about anti-virus software on
 UNIX servers and then asked to prove that they run UNIX.
 
 Fair enough, but my point was that it isn't the auditors' faults in _all_
 cases.
 When the compliance explicitly requires something they are required to check
 for it, they don't have the option of ignoring or waving requirements ...
 and off the top of my head I don't recall if it is SOX that calls for
 RFC1918 explicitly but I know there are some that do.

Please cite references.

I can find plenty of firewall required references but I'm
yet to find a NAT and/or RFC 1918 required.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org



Re: Automatic Switches?

2009-02-09 Thread Joe Greco
 Seth Mattinen wrote:
  I hate to interrupt the IPv6 and RFC 1918 mega-threads...
  
  Does anyone know of a company that makes 208v (3-wire line-line ground,
  no neutral, 208v loads only, single phase) 30-60 amp automatic transfer
  switches with sub-30ms switching time? APC used to make the SU045X163
  30A model, but it seems to have been discontinued and it's hard to find
  products that support 208v single phase.

It's not flagged as discontinued on the APC site, though it seems to
have been dropped from the RATS page.  Maybe in the process of being
discontinued?

http://www.apc.com/resource/include/techspec_index.cfm?base_sku=SU045X163

 Ugh, of course I come across something (TwinSource DCC-II RM-ITSTS, 50A
 in a 4U case using SCRs) mere minutes after posting. Any other
 recommendations are still welcome. The TwinSource unit looks quite
 fascinating, although I'm guessing quite expensive.

http://shop.ebay.com/?_from=R40_trksid=m38.l1313_nkw=SU045X163_sacat=See-All-Categories

The main downside to the SU045 product line seems to be a lack of network
manageability.  Doesn't mean you can't get 'em.  :-)

APC doesn't make RATS units larger than 30A, though, so if you need a
50A unit, you'll have to look elsewhere.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



RE: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread TJ
 When the compliance explicitly requires something they are required to
 check for it, they don't have the option of ignoring or waving
requirements ...
 and off the top of my head I don't recall if it is SOX that calls for
 RFC1918 explicitly but I know there are some that do.

I believe that RFC1918 space won't be a requirement for IPv6. I'm pretty
sure the requirements will change as the addressing changes. Of course, I'm
sure you will have a lot of NEW requirements. :)

But that is the problem - it doesn't say You must use RFC1918 for IPv4 ...
it just says You must use RFC1918.
Meaning, you must not run IPv6.  And some regulations do not mention/address
IPv6 at all.  Silence != security.




Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Matthew Kaufman

Mark Andrews wrote:

Please cite references.

I can find plenty of firewall required references but I'm
yet to find a NAT and/or RFC 1918 required.


(Skip if you've participated in a SOX audit from the IT department POV)

The way it works is that the law doesn't call for specific measures. The 
law calls for audits. Audits are done by outside firms (like large 
accounting firms) using their internally-developed checklists for 
compliance. Passing the checklist gets you an unqualified audit. Failing 
a few items gets you a qualified audit. Failing more means you don't 
have the necessary audit document to present.


The exact details of every line item are typically under non-disclosure 
when presented to the IT department for review, so for instance I can't 
post the ones from the last audit I participated in.


Firms are also free to develop their own internal control guidelines, as 
long as they can convince the outside auditor that the controls are at 
least as strong as the ones on the checklist.


Other regulations, like HIPPA, also require the same thing. For 
instance, the top Google hit for HIPPA and private address space links 
to a wustl.edu document regarding how their controls over 
HIPPA-protected information are implemented (including the use of 
private address space and the use of multiple layers of NAT).


It takes a *lot* longer to get policies changed and auditors to sign off 
on the revised policies than it does to make a change in a router. That 
means that the process of updating policies should have started *even 
sooner* than the process of upgrading and reconfiguring routers for 
IPv6. But since there's still open questions (like the recent discussion 
of IPv6 NAT on the BEHAVE list) that have no answers at all, I can 
imagine why some folks might be putting off revising their policies and 
asking for external review of those.


Matthew Kaufman



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space (IPv6-MW)]

2009-02-09 Thread Christopher Morrow
On Mon, Feb 9, 2009 at 9:47 PM, TJ trej...@gmail.com wrote:
Why would anyone NOT want that?? what replaces that option in current RA
deployments?

 One nit - I like to differentiate between the presence of RAs (which should
 be every user where IPv6 is present) and the use of SLAAC (RA + prefix).


Sure, but... RA is necessitated by the initial decision to use it and
NOT support something akin to the bootp/dhcp sequence that v4 has.
This could, it seems to me, be done... but since RA is there, it's not
BAD to use it for prefix/default-route/ip-address it's just not
anywhere near complete.


 Right now - Cheat off of IPv4's config.
 (Lack of DHCPv6 client-side support, and lack of DNS v6 transport (WinXP),
 necessitate this)

agreed.

-Chris



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread John Osmon
On Tue, Feb 10, 2009 at 02:16:10PM +1100, Mark Andrews wrote:
 
 In message 00df01c98b27$3181b7e0$948527...@com, TJ writes:
[...SOX auditor stuff...]
  When the compliance explicitly requires something they are required to check
  for it, they don't have the option of ignoring or waving requirements ...
  and off the top of my head I don't recall if it is SOX that calls for
  RFC1918 explicitly but I know there are some that do.
 
   Please cite references.
 
   I can find plenty of firewall required references but I'm
   yet to find a NAT and/or RFC 1918 required.

It isn't SOX, but sadly enough, PCI DSS Requirement 1.5 says:
   Implement IP address masquerading to prevent internal addresses from
   being translated and revealed on the Internet. Use technologies that
   implement RFC 1918 address space, such as port address translation (PAT)
   or network address translation (NAT)

I know that some auditors want to hold people to that standard.

I stopped working with the credit card people at that point...





Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Nuno Vieira - nfsi telecom
security by obscurity is not the way, everyone knows it.

those guys will figure it out sooner or later (where later, might take ages).

in the meanwhile, a lot have pseudo-secured networks thru triple-nat, 
quadruple-nat, multiple ipsec'd layered and so, and others live with the hammer 
in their suitcase for fixing things around when the clue is gone.

often they forgot the neat webserver box that run's some strange software, 
which no one updates, and... in the end is the cheese hole around their 
network...

but, in the other end, money talks, and bulls**t walks, so, we might be all 
wrong, and they might be right, who knows ?

who cares anyway ? :-)
--nvieira


- John Osmon jos...@rigozsaurus.com wrote:
 
 It isn't SOX, but sadly enough, PCI DSS Requirement 1.5 says:
Implement IP address masquerading to prevent internal addresses
 from
being translated and revealed on the Internet. Use technologies
 that
implement RFC 1918 address space, such as port address translation
 (PAT)
or network address translation (NAT)
 
 I know that some auditors want to hold people to that standard.
 
 I stopped working with the credit card people at that point...



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Scott Howard
On Mon, Feb 9, 2009 at 9:54 PM, John Osmon jos...@rigozsaurus.com wrote:

 It isn't SOX, but sadly enough, PCI DSS Requirement 1.5 says:
   Implement IP address masquerading to prevent internal addresses from
   being translated and revealed on the Internet. Use technologies that
   implement RFC 1918 address space, such as port address translation (PAT)
   or network address translation (NAT)


It's moved to Requirement 1.3.8 of the current PCI DSS (V1.2, October 2008),
and has been reworded slight :
*1.3.8 Implement IP masquerading to prevent internal addresses from being
translated and revealed on the Internet, using RFC 1918 address space. Use
network address translation (NAT) technologies—for example, port address
translation (PAT).*

However the PCI DSS does contain a Compensating controls section, which
allows for the use of functionality which provide[s] a similar level of
defense to the stated requirements, where the stated requirements can not
be followed due to legitimate technical or documented business constraints

Now the fact that RFC1918 addresses don't work with IPv6 is clearly a
legitimate technical ... constraint, so as long as you could successfully
argue that a stateful firewall or other measures in place provided
equivalent security as NAT you should be fine.

  Scott.


RE: IPv6 delivery model to end customers

2009-02-09 Thread Mikael Abrahamsson

On Mon, 9 Feb 2009, TJ wrote:

My pleasure, now everyone - feel free to ring up your local 
sales/support rep and encourage their product to implement this ... 
please!


What about DHCPv6 / DHCPV6-PD sniffing (and using that info to create L3 
filter rules in L2 devices), is a standard needed or is it obvious to 
vendors how to implement it?


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Matthew Palmer
On Mon, Feb 09, 2009 at 09:27:59PM -0500, TJ wrote:
The SOX auditor ought to know better.  Any auditor that
requires NAT is incompenent.
 
  Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
  RFC1918 addressing ...
 
 SOX auditors are incompetent. I've been asked about anti-virus software on
 UNIX servers and then asked to prove that they run UNIX.
 
 Fair enough, but my point was that it isn't the auditors' faults in _all_
 cases.
 When the compliance explicitly requires something they are required to check
 for it, they don't have the option of ignoring or waving requirements ...
 and off the top of my head I don't recall if it is SOX that calls for
 RFC1918 explicitly but I know there are some that do.

Considering that RFC1918 says nothing about IPv at all, could that be a
blocker for deployment in general?  That'd also make for an interesting
discussion re: other legacy protocols (IPX, anyone?)...

- Matt

-- 
I tend to think of solution as just a pretentious term for thingy. 
Doing that word substitution in my head makes IT marketing literature
somewhat more tolerable.
-- lutchann, in http://lwn.net/Articles/124703/