Apologies for the servfails; should be fixed. You have a healthy RIPE Atlas
population!

For folks interested: we ran an "IPv6 hitlist" study a few years ago
because researchers like reachable targets in many networks, but IPv6 isn't
brute-force scannable like the old world. These RIPE Atlas measurements
have been running for a couple of years; each probe resolves the name above
to get a recent address from the list, and runs a traceroute to the address
it got. Each query/traceroute is paced about two minutes apart.

Last time somebody spotted a breakage was December 2020. 'tis the season!
https://www.ripe.net/ripe/mail/archives/ripe-atlas/2020-December/004548.html

The original paper is available at https://ipv6hitlist.github.io/; the RIPE
Atlas campaign is a continuation that hasn't had much focus. The data's all
public; measurement results are available above or in the public bigquery
datasets.


S.



On Tue, 14 Dec 2021 at 09:54, Paul Mansfield <[email protected]>
wrote:

> it was suggested that he might be willing to give a talk at a UKNOF
> conference.
>
>

Reply via email to