Re: Why used DHCPv6 when RA has RDNSS and DNSSL?

2020-04-06 Thread Sander Steffann
Hi Ole,

> Op 2 apr. 2020, om 12:10 heeft otr...@employees.org het volgende geschreven:
> 
>> DHCPv6 took itself out of the running when it failed to provide the
>> default gateway to its clients.
> 
> I just posted an updated version of what was the "Universal RA option" draft.
> It is now the "Universal IPv6 Configuration Option", which includes support 
> for default gateway in DHCPv6.
> 
> https://datatracker.ietf.org/doc/draft-troan-6man-universal-ra-option/?include_text=1

Ha! You finally accepted my idea from years ago :)  One set of options with two 
distribution protocols (one push and one pull model)

Cheers,
SAnder



signature.asc
Description: Message signed with OpenPGP


Re: IPv6 ingress filtering

2019-05-16 Thread Sander Steffann
Hi David,

> While I happen to agree with you 2002::/16 SHOULD NOT be filtered, and RFC 
> 7526 is quite clear that 2002::/16 is still valid. However, it is perfectly 
> permissible to filter it, if that is the policy a network operator wishes to 
> enforce.

With the 6to4 anycast relays deprecated the only 6to4 traffic should be src 
2002::/16 and dst 2002::/16. Sites that are not using 6to4 themselves can 
filter 2002::/16. Everybody else will only see IPv4+proto41 traffic, which is 
not impacted by that filter.

Cheers,
Sander



signature.asc
Description: Message signed with OpenPGP


Re: CPE Residential IPv6 Security Poll

2016-09-27 Thread Sander Steffann
Hi,

> For what it's worth, the Swisscom approach seems sensible to me. At
> least if I understand it correctly, in that they by default only block
> ports associated with application protocols known to be insecure, meant
> for home network use only, etc. All other ports and protocols not on
> the blacklist are let through in both directions. As far as I know this
> has been working out fine for them.

I like that approach as well. It might be generalised into "ports <= x are 
blocked by default and can be opened manually, ports > x are open by default". 
Whether x=1024, x=1 or x=16384 can be discussed. If usually services aren't 
listening on those high-numbered ports then the firewall blocking incoming 
packets for them doesn't make much of a difference anyway.

Cheers,
Sander



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: CPE Residential IPv6 Security Poll

2016-09-20 Thread Sander Steffann
Hi,

> Should we again push our vendors for PCP/UPnP support?

Sounds like a chicken&egg problem that needs to be solved. Applications won't 
implement PCP/UPnP support for IPv6 because no router is offering the service, 
and routers won't implement it because no application is going to use it.

I think we need to push the router side to support it, so that it becomes 
interesting for applications to try to use it (and give developers the ability 
to test it).

Cheers,
Sander



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: A=1 L=0 PIO

2016-08-16 Thread Sander Steffann
Hi Mikael,

> I'm trying to figure out what a "normal" currently deployed in the field IPv6 
> host would do if it receives an RA with PIO /64 where L=0 and A=1.

On an implementation level what I have seen on Linux is that the L flag 
determines whether the route 2001:db8::/64 -> eth0 is installed or not.

Cheers,
Sander



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: Estonian IPv6 deployment report

2014-12-22 Thread Sander Steffann
Hi,

> As statistics go, there are 3+ active IPv6 subscribers (almost 15% of our 
> customer base, based on our public numbers), 81% of them have have at least 
> one IPv6 enabled device in the LAN, 70% have more than one. Most IPv6 traffic 
> is generated by Google+Youtube, Facebook and Akamai. Not bad for a country 
> with 1.3M people.

Congratulations!

> Next up: mobile network :)

:-)

Cheers!
Sander



Re: Some very nice broken IPv6 networks at Google and Akamai

2014-11-10 Thread Sander Steffann
Hi Philipp,

> Op 10 nov. 2014 om 21:09 heeft Philipp Kern  het volgende 
> geschreven:
> 
>> On Mon, Nov 10, 2014 at 07:36:22PM +0100, Sander Steffann wrote:
>> I guess most users wouldn't really notice a 1-RTT delay.
> 
> Depends on the RTT. In mobile networks it generally sucks.

Good point :)
Sander



Re: Some very nice broken IPv6 networks at Google and Akamai

2014-11-10 Thread Sander Steffann
Hi Lorenzo,

Op 9 nov. 2014, om 22:10 heeft Lorenzo Colitti  het 
volgende geschreven:
> On Sat, Nov 8, 2014 at 11:48 PM, Jeroen Massar  wrote:
>> The issue with IPv6 access to Google should now be resolved.  Please let
>> us know if you're still having problems.
>> 
>> The fun question of course is: what/why/how the heck happened?
> 
> Another fun question is why folks are relying on PMTUD instead of adjusting 
> their MTU settings (e.g., via RAs). But relying on PMTUD still imposes a 
> 1-RTT penalty on every TCP connection to an IPv6 address you haven't talked 
> to in the last few minutes. Why would you do that to your connection?

I guess most users wouldn't really notice a 1-RTT delay. But I agree that it is 
less than optimal that every outbound connection from a network behind a 
non-1500-MTU link has to suffer this penalty. Unfortunately the current choices 
seem to be to either limit the link MTU (and making traffic to e.g. the local 
NAS suffer as well) or suffer the 1-RTT penalty.

> As to what happened: what happened here is that some Google servers 
> temporarily stopped doing MSS clamping. That was an outage, and AIUI it has 
> since been fixed. (Some parts of) Google infrastructure do not do PMTUD for 
> the latency reasons above and for reasons similar to those listed in 
> https://tools.ietf.org/html/draft-v6ops-jaeggli-pmtud-ecmp-problem-00 .

Thank you for the information. Great to have real data instead of guesses and 
speculation :)

Cheers!
Sander



Re: Google IPv6 measurements in Europe appear heading down...

2014-10-23 Thread Sander Steffann
Hi Erik,

> Not seeing this in the Akamai data.  See for Germany and Belgium.

Your graphs show the best results (even going over 30% occasionally for 
Belgium) so let's go with your data. :)

Cheers,
Sander

/me likes picking the data that best represents what I *want* to see ;)



Re: wake on lan / wol with linux in IPv6-LAN (without IPv4)

2014-09-22 Thread Sander Steffann
Hi Andrew,

> Please help me understand.
> 
> The standards' purpose is to facilitate the interoperability.
> 
> "MLD snooping" happens within a single device.
> 
> Its only result in a correct implementation must be "if you join the
> group, you should get the traffic, if you did not, you should not"
> function.
> 
> A result of composition of multiple independent correct
> implementations of this function remains the same - "if you join the
> group, you should get the traffic, if you did not, you should not".
> 
> So, which undefined behaviors that prevent the interop today do you
> think would need to be standardized ?

Maybe it's as simple as writing down what you described :)  Standards don't 
have to be complicated. Maybe it can describe how a device should operate in 
certain failure scenarios like when 1000 hosts join 500 multicast groups each 
and the switch runs out of memory/CPU/etc. The most 'interesting' 
interoperability problems occur when different devices behave in different ways 
in weird situations :)

And maybe it is just as simple as you describe :)

Cheers,
Sander



Re: wake on lan / wol with linux in IPv6-LAN (without IPv4)

2014-09-21 Thread Sander Steffann
Hi Mikael,

Op 21 sep. 2014, om 07:45 heeft Mikael Abrahamsson  het 
volgende geschreven:
> On Wed, 17 Sep 2014, Enno Rey wrote:
> 
>> it should be noted that RFC 4541 is an "Informational" one and I don't think 
>> any normative value for a kind-of vendor-proprietary thing called "MLD 
>> snooping" might be attached to it ;-)
> 
> I would like to see IGMP and MLD snooping properly standardized.

Big +1
Sander



Re: Something with filters

2014-08-27 Thread Sander Steffann
Hi,

> Especially a check for a zero'd address is really not that hard; it is
> just crazyness that that is not checked for.
> 
> If possible, please file this problem with your relevant technical
> contacts and account managers, as it is just nonsense that that packet
> is allowed to travel over the Internet.

Reminds me of someone showing me a packet with link-local source address and 
global destination address traveling several hops... :)

Cheers,
Sander



Re: why don't we start an ipv6 smtp server whitelist?

2014-08-25 Thread Sander Steffann
Hi,

> ..so, why don't spamhaus or some other well-known email related community 
> don't start an ipv6 mail servers whitelist trying to take onboard gmail, 
> yahoo, aol, microsoft, and other big mail provider?
> 
> for postmasters it will be only one more little work to do (subscribe MTAs to 
> the whitelist), but it will also help them having servers with a better score 
> on antispams and it will push the ipv6 deployment (if my servers has ipv6 I 
> may be whitelisted and have a better score, so I have a plus running ipv6)
> 
> ok, now write me all the bugs in this idea :)

Something similar has already been tried: http://www.ipv6whitelist.eu
That attempt has failed, but you might be able to learn from their experience.

Cheers,
Sander



Re: IPv6 Assignment for Server

2014-06-18 Thread Sander Steffann
Hi,

> This is TB is just a government organization which was established to
> study/develop in field of technology.
> And TB is one of some services that still be in implement phase.

Ah, so there is still time to fix things :)  One of the great things of IPv6 is 
that addresses are plentiful. Especially when doing studies and development 
this is important. We don't want to force people to learn IPv6 with unnecessary 
limitations, the users need to be able to make use of the main feature of IPv6.

I have worked with government entities before in cases like this. Feel free to 
give them my email address :)  And I'm sure there are more people on this list 
that can assist!

Cheers,
Sander



Re: IPv6 Assignment for Server

2014-06-18 Thread Sander Steffann
Hi,

> Sorry for my mistake, I should write Tunnel Broker instead of ISP.
> Due to the ISPs doesn't deploy the IPv6 yet, so I have to access via TB.
> And some TB doesn't provide a lot of IPv6 address.

Every IPv6 tunnel broker I know gives you a /48, which is 65536 /64s. Can you 
please let me know which tunnel broker you are using? They are doing it wrong...

Cheers,
Sander



Re: Residential subscribers: numbered or unnumbered?

2014-03-25 Thread Sander Steffann
Hi Philip,

> Until recently, I was under the impression that most people were using 
> numbered v6 links to residential subscribers, allocating the WAN address 
> using DHCPv6.  However, recently two people have told me about a number of 
> providers that are doing unnumbered instead.
> 
> So for anyone who has deployed or is planning to deploy residential IPv6, I 
> am curious to know which way you are going, and more importantly why you 
> selected that approach? My interest is primarily in IPoE, but I don't mind 
> hearing about PPPoE as well.

I'm doing unnumbered PPPoE to residential, which works fine. Each customer gets 
a prefix through DHCPv6-PD. The PPPoE routers (ASR1k) talk DHCPv6-PD to the 
customer and RADIUS to our management system. It automatically injects the 
route for the delegated prefix towards the link + link-local address of the 
customer.

The reason for this is simplicity in the addressing plan. This way we have one 
prefix per customer, which we completely delegate to them. If the link was 
numbered we would need another /64 for the link. Which would mean that we have 
to assign and track two prefixes to each customer: the link /64 and the 
delegated /56. We would very probably never see any traffic from the /64, but 
we do need to track it (legal stuff etc).

> Additional questions for those who have chosen the unnumbered approach or are 
> using SLAAC to number the WAN address.
> * What are you doing wrt having an address to ping to confirm the CPE is 
> reachable?

The CPEs we give to customers have a pingable address from the delegated prefix 
(prefix::1). And we can always see if the CPE is online by checking the PPPoE 
session.

> * For those doing unnumbered, do all CPEs implement the same algorithm for 
> selecting the loopback address according to WAA-7 in RFC 7084?

As far as I know: yes. Almost all customers use the CPE that we provide though, 
so I might just be lucky :)

Cheers,
Sander



Re: Poll on SMTP over IPv6 Usage

2014-02-14 Thread Sander Steffann
A) Using Postfix (product) from Wietse (vendor)
B) Using AS57771 and AS12414 (service provider or “cloud solution”)
C) Elected not to implement SMTP over IPv6 at this time because N.A. Fully IPv6 
capable (reason)

Sander



Re: MTU handling in 6RD deployments

2014-01-16 Thread Sander Steffann
Hi,

> In the reverse direction, when a 6RD BR forwards a packet to a CE
> router that it hasn't ping'd before (or hasn't ping'd recently),
> have it ping the CE with a 1520 byte ping. If it gets a reply, set
> the MTU to the CE to infinity. If it doesn't get a reply, set the
> MTU to 1480 (or maybe 1472). Again, no fragmentation and reassembly.
> 
> The only state in the BR then is an MTU value for each CE that it
> talks to - in the same way ordinary IPv4 nodes maintain a path MTU
> cache for the destinations they talk to. 

Since we assume that 6RD packets between the BR and the CE go over 
infrastructure that the ISP controls, wouldn't it be easier to just try to send 
bigger (IPv4) packets from the BR to the CE with the DF bit set, and look for 
PTB messages? On the public internet relying on PTBs might be a bad idea, but 
on controlled infrastructure you might be able to reply on those. If you can 
raise the MTU to 1520 you should be able to make PTBs work, right? ;-)  It 
might save an extra roundtrip with a ping and use standard ICMP messages and 
associated state.

Cheers,
Sander



Re: T-Mobile goes IPv6-only on Android 4.4+ devices

2013-11-05 Thread Sander Steffann
Hey Lorenzo,

Op 5 nov. 2013, om 08:45 heeft Lorenzo Colitti  het 
volgende geschreven:

> On Tue, Nov 5, 2013 at 4:41 PM, Tore Anderson  wrote:
>> Some cool news to start the day with:
>> 
>> http://www.dslreports.com/shownews/TMobile-Goes-IPv6-Only-on-Android-44-Devices-126506
> 
> Yesss!
> 
> Nice to see that they link to the commit that turned it on - authored by 
> yours truly. :-)

Thanks! :-)

Met vriendelijke groet,
Sander Steffann



Re: Over-utilisation of v6 neighbour slots

2013-11-01 Thread Sander Steffann
Hi Erik,

> Looking at our data, looking at an IPv6 FTTH deployment's dedicated
> resolvers, averaging over 7 days, I'm seeing:
> 
>Safari + 10.6  =>  ~89% IPv6 native preference
>Safari + 10.7  =>  ~38% IPv6 native preference (somewhat lower sample set)
>Safari + 10.8  =>  ~39% IPv6 native preference
>Safari + 10.9  =>  ~47% IPv6 native preference
> 
> This hasn't been rigorously reviewed, of course.
> 
> Perhaps Mavericks is a bit better, but not much...

:-(
Sander



Re: What is Brocade up to here?

2013-10-28 Thread Sander Steffann
Hi,

>> It's been broken for months, too.  Happy Eyeballs seems to work pretty well 
>> for the internet.
> 
> Did they just fix it?

I did send them a heads-up, so they might.
Sander



Re: ipv6 source address selection

2013-10-20 Thread Sander Steffann
Hi Mikael,

> I don't understand why the host would choose source address in 
> 2001:db8:1:1000:/64 when pinging 2001:db8:1:1001:1/128 because of this, but 
> use 2001:db8:1:8000::/64 when pinging the rest of the Internet

Still Longest prefix matching :-)  Don't think of prefixes as 
prefixes-in-your-routing-table but 
longest-matching-string-of-bits-from-the-beginning-the-addresses.

When pinging 2001:db8:1:1001::1/128 then:
- A source in 2001:db8:1:1000::/64 will have 63 bits the same as the destination
- A source in 2001:db8:1:8000::/64 will have 48 bits the same as the destination

So the address in 2001:db8:1:1000::/64 will have the longest matching prefix 
and will be used.

When pinging 2001:4860:4860::/128 then:
- A source in 2001:db8:1:1000::/64 will have 17 bits the same as the destination
- A source in 2001:db8:1:8000::/64 will have 17 bits the same as the destination

So for longest prefix matching they are equal. As this is the last source 
address selection rule in the RFC the OS will just decide which address to use, 
which commonly is the most recently configured address.

Cheers,
Sander



Re: Automatic source routing

2013-09-25 Thread Sander Steffann
Hi,

> My reading of his original email was that he was *sending* pings, not 
> receiving them. Perhaps I was mistaken.

Sorry, you are correct. He wrote:

> Unfortunately, when performing, for instance, a ping from one specific 
> interface or source address, the ping always use the most recent default 
> router.

He is however sending from a specific source address, so it is still not 
related to source address selection ;-)

Cheers!
Sander



Re: Automatic source routing

2013-09-25 Thread Sander Steffann
Hi,

> But I note that the OP is *currently* testing with a single hosts w/ two 
> interfaces, so host-based source address selection is what's in play here, 
> not (s,d) routing.

It's not source address selection if the host is replying to an incoming (ICMP 
ping) packet. The source address is fixed, and the OP wants the host to route 
the outgoing packet through the correct interface.

Cheers,
Sander



Re: Automatic source routing

2013-09-25 Thread Sander Steffann
Hi Ole,

> I'm doing the same as you are with a Cisco IOS router. which also has some 
> shortcomings that I'm working on ironing out.

Woohoo! :-)
Sander



Re: Sunsetting Teredo Experiment [IETF slides]

2013-08-04 Thread Sander Steffann
Hi Nick,

> I think he meant:
> 
> http://lists.test-ipv6.com/mailman/listinfo/v6providers
> 
> This seems to be a closed access list for v6 providers, but only
> significant ones.  If you're anything other than significant, apparently
> you don't qualify.

Well, I am on that list, so the barrier is not *that* high ;-)
Sander



Re: teredo.ipv6.microsoft.com off?

2013-07-11 Thread Sander Steffann
Hi,

> Anyone found out what happened with teredo.ipv6.microsoft.com ?
> 
> http://translate.google.com/translate?hl=en&sl=de&u=http://www.heise.de/netze/meldung/IPv6-Tunnel-Microsofts-Teredo-Server-nicht-erreichbar-1915972.html&prev=/search%3Fq%3Dteredo%2Bmicrosoft%2Bipv6%26safe%3Doff%26sa%3DX%26biw%3D1303%26bih%3D803%26tbs%3Dqdr:w
> 
> Since yesterday we have quite an increase of NXDOMAIN in relevant dns 
> requests.
> 
> Has Microsoft made the big step?

Almost :-)   This is what is happening now:

> As an attempt to "measure" the impact of this sunsetting, we would like to
> switch off the service for a few days. Resultant feedback and telemetry will
> help us inform the future of the Teredo service and its default configuration
> on Windows. We intend to conduct this experiment from  approximately July 9
> 0:0:00 UTC, to July 15 0:0:00 UTC.

So it will come back, but it *is* the start of the sunsetting process.

Cheers,
Sander



Re: Linux 3.9 routing oddity

2013-07-06 Thread Sander Steffann
Hi Hannes,

>> "We didn't find an RFC that tells us to build a working implementation, so 
>> we decided not to..."
> 
> Of coure I did notice the misbehaviour if we compile without
> CONFIG_IPV6_ROUTER_PREF and am working on a solution. I hoped to send
> out a second patch soon after the first one, but it became more subtle
> (and meanwhile lack time until the end of the weekend :( ).

Thanks, good to hear that! I got the impression that it wouldn't be fixed.

> This is a more complex issue to fix as I did not want to break the
> round-robin selection of routes with unkown nud states in the default
> router list. Also I am looking to resolve some usability issues: on
> executing ``ip route get'' we actually do trigger active nud validation
> on the nexthops. This could be a PITA because we do actually change the
> results by that (a second ``ip route get'' could yield different results).

Yeah, 'get' commands with side effects can really confuse people. They would 
confuse me :)

>>> So I assume that the bug would still be there.
>> 
>> Sigh...
> 
> I'll keep you notified as soon as I have a working solution.

Thank you! Sorry for my remark earlier, I misjudged the situation.

Cheers,
Sander



Re: Linux 3.9 routing oddity

2013-07-04 Thread Sander Steffann
Hi,

> "If we don't compile with CONFIG_IPV6_ROUTER_PREF (RFC4191 support) a
> neighbour is only valid if its nud_state is NUD_VALID. I did not find
> any references that we should probe the router on route insertion time
> via the other RFCs. So skip this route in that case."

"We didn't find an RFC that tells us to build a working implementation, so we 
decided not to..."

> So I assume that the bug would still be there.

Sigh...

Thanks for chasing this Pierre,
Sander



Re: Linux 3.9 routing oddity

2013-07-02 Thread Sander Steffann
Hi,

> What do you think / rfc says about this?

What you describe sounds like a very serious bug to me.
Sander



Re: Point-to-point /64

2013-06-02 Thread Sander Steffann
Hi,

Op 3 jun. 2013, om 00:26 heeft Brian E Carpenter  
het volgende geschreven:
> On 03/06/2013 10:06, Steinar H. Gunderson wrote:
>> 2013/6/2 Brian E Carpenter :
 I'm not sure about other switches, but for the Catalyst 3750/3750G, it
 means some quirks with IPv6 ACLs.  The 3750/3750D can do ACLs on full
 /128's, but only if the lower 64 bits are EUI64.
>>> Huh? How can it possibly know that? (see draft-ietf-6man-ug)
>> 
>> Presumably he means that the middle bits are ff:fe.
> 
> And the UG bits are 10. But none of that proves that the identifier
> is EUI64. It only proves that it *might* be EUI64.

I think I understand the following: the 'optimisation' that Cisco makes here is 
that *if* the middle bits are ff:fe and UG is 10, then they accept an ACL with 
that address, and they don't actually store the 'known' bits but use the space 
to store other information in the TCAM. It would have to reject any ACL that 
tries to match on the full 128 bits where those specific bits are not 10 and 
ff:fe.

Darren: am I understanding this correctly?

Cheers,
Sander



Re: Point-to-point /64

2013-06-01 Thread Sander Steffann
Hi,

> In the case of /127 or /128 you'd always  hit the router's host stack. 

But that is already protected by CoPP, right? :-)
Sander



Re: Point-to-point /64

2013-06-01 Thread Sander Steffann
Hi,

> /127 is actually what IETF recommends in RFC6164 
> (http://tools.ietf.org/html/rfc6164)
> /126 is not officially supported in this RFC.
> 
> I have used /127 on "real" P2P links as well as Ethernet links connecting 2 
> routers.

I can confirm this. I use /127s on point to point links and it works great. I 
have been using it on Juniper and Cisco. No problems at all. They seem to 
follow RFC6164.

I reserve the whole /64 but configure a /127. When choosing which /127 out of 
the /64 to use I usually pick ::a and ::b which makes it nice and readable for 
the admins. Much nicer than :: and ::1 (which would also violate the SHOULD NOT 
of RFC6164 section 6a) anyway :-)

Cheers,
Sander



Re: Cisco IOS IPv6 TCP MSS adjustment (from orignial thread: option 212 for 6RD)

2013-05-10 Thread Sander Steffann
Hi Trevor,

> I thought it would be worth giving an update on a couple matters arising from 
> this original thread.
> 
> - The behaviour Mikael noticed, where MSS adjustment wasn't working for TCP 
> over IPv6, was a bug that was specific to the 7300 platform. The fix is now 
> committed and will ship in the next maintenance update of 15.2(4)M.
> 
> - Partly as a result of the feedback received on the original thread, there 
> is a revised implementation of TCP MSS adjustment planned initially for 
> 15.3(3)M for ISR platforms, which will allow MSS for TCP over IPv4 and IPv6  
> to be adjusted independently. This implementation will then appear on the 
> ASR1000 series in a subsequent release, currently intended to be 15.4(1)S. 
> [usual disclaimer about not taking these plans as commitments applies, if you 
> have a need for any of these capabilities in a particular timeframe, please 
> work with your account team to get formal agreements for delivery]

Thanks for the info. Much appreciated!
Sander



Re: http://www.6assist.net/ - call for test

2013-05-10 Thread Sander Steffann
Hi,

>> One of them is Lebanon. All international connections must go
>> through the incumbent telco, and they don't/won't do IPv6. Annoying,
>> insane, but a fact of life for the ISPs in such countries. So all
>> the ISPs that do IPv6 have to do it with tunnels to HE, OCCAID etc.
> 
> So a list with difficult countries and cities and the problematic
> carriers, somewhere on a webpage ? And some bigwigs from the ISOC/IETF/ITU 8-)
> or so that start to get in touch with the problematic carriers ?
> 
> Or does that sound too easy ?

I know in Lebanon it involves political games. I'm not sure that any pressure 
from the technical community would help there...

I'm including Nabil in the CC. He knows :-)
Sander



Re: http://www.6assist.net/ - call for test

2013-05-10 Thread Sander Steffann
Hi,

>> I think we all understand that any tunnel connectivity is worst than a
>> native. But still there are a lot of places where it is unable to get a
>> native IPv6 connectivity even for ISPs.
> 
> Which locations are those, lets discuss that, find those ISPs and help
> them get native connectivity.

One of them is Lebanon. All international connections must go through the 
incumbent telco, and they don't/won't do IPv6. Annoying, insane, but a fact of 
life for the ISPs in such countries. So all the ISPs that do IPv6 have to do it 
with tunnels to HE, OCCAID etc.

> We killed that experimental thing called the 6bone in 2006, that is 7+
> years...
> 
> If you want to help ISPs get connectivity, get them on this list, and I
> am sure there are a couple of ISPs here who are more than happy to get
> them connected.
> 
> Indeed, in the beginning this will become a tunnel to those transits,
> but at one point that can be replaced.

I wish this was true for all countries :-(

Cheers,
Sander



Re: IPv6 Addressing Question

2013-04-06 Thread Sander Steffann
Hi Eric,

> For your information, Michael (in cc) and I wrote an IETF draft presenting 
> the pros and cons of this approach:
>  
>  http://tools.ietf.org/html/draft-ietf-opsec-lla-only-03
> 
> Comments are welcome

Good document!
Sander



Re: IPv6 Addressing Question

2013-04-06 Thread Sander Steffann
Hi,

> To be explicit, using a link local completely breaks traceroute,
> since ICMP replies sourced from a link local address must be
> discarded by the next hop, according to RFC 4291 section 2.5.6.

IIRC the router will reply from the loopback address when the interface doesn't 
have a global address, right?
Sander



Re: IPv6 Addressing Question

2013-04-06 Thread Sander Steffann
Hi Mike,

> IPv6 routing protocols seem in some cases to exclusively use automatic link 
> local addresses. Even for manual configuration, link locals deal with the ND 
> exhaustion attack problem in the core quite nicely, while also simplifying 
> address management.
> 
> Are there practical reasons for global addresses on router interfaces?

Pinging interface endpoints for debugging and monitoring, being able to see 
which interface is used in a traceroute, stuff like that. Routing protocols can 
work perfectly fine without global addresses, but netadmins have a harder time 
with just link locals :-)  But true: it is something that I have tested in the 
lab, and it does reduce the attack surface of the network a bit.

Cheers,
Sander