> On Jun 20, 2016, at 1:30 PM, Owen DeLong <o...@delong.com> wrote:
> 
> 
>> On Jun 17, 2016, at 10:10 , Mark Milhollan <m...@pixelgate.net> wrote:
>> 
>> On Tue, 14 Jun 2016, Owen DeLong wrote:
>>> On Jun 14, 2016, at 11:57 , Ricky Beam <jfb...@gmail.com> wrote:
>> 
>>>> I've seen many "IPv6 Capable" CPEs that apply ZERO security to IPv6 
>>>> traffic. 
>>> 
>>> Those are by definition poorly designed CPE. 
>> 
>> This (open by default vs closed) has been discussed before, with plenty 
>> of people on either side.
>> 
>> 
>> /mark
> 
> I’m unaware of anyone advocating open inbound by default residential CPE.

I’m sure changing the subject line will draw out the purists at heart :)

> I’m not saying they don’t exist, but I can’t imagine how anyone could 
> possibly defend that position rationally.

I think certain things, eg: SSH would be ‘safe-ish’ to support ingress, but at 
the same time, you connect something like a Raspberry PI w/ global V6 and 
someone is doing honeypot stuff in pool.ntp.org you may get someone doing ssh 
pi/raspberry with automation before you can even change the passwords.

> I’m pretty much in favor of open by default in most things, but for inbound 
> traffic to residential CPE? Even I find that hard to rationalize.

What I find frustrating is that my current ISP requires a managed CPE where I 
can disable the IPv6 firewall so I can access devices at home over IPv6, but 
there is no way to download/upload the config, and they don’t store it on their 
side either.  This means when a device is swapped, it must be reprogrammed to 
disable this stuff, meaning I must be on-site or have something phone-home to 
disable their DHCP server and other elements.

I also can’t triage why it keeps rebooting every few days as it doesn’t tell me 
anything about debug logs, if it uploaded a core file, etc.

I’m guessing there is some ‘exotic’ L2 traffic I have that is hosing it, but 
haven’t gone so far as to tcpdump the entire network for the possible offending 
traffic.

- Jared

Reply via email to