Another Big day for IPv6 - 10% native penetration

2016-01-02 Thread Tomas Podermanski
Hi,

according to Google's statistics
(https://www.google.com/intl/en/ipv6/statistics.html) on 31st December
2015 the IPv6 penetration reached 10% for the very first time. Just a
little reminder. On 20th Nov 2012 the number was 1%. In December we also
celebrated the 20th anniversary of IPv6 standardization - RFC 1883.

I'm wondering when we reach another significant milestone - 50% :-)

Tomas


 Original Message 
Subject:Big day for IPv6 - 1% native penetration
Date:   Tue, 20 Nov 2012 10:14:18 +0100
From:   Tomas Podermanski 
To: nanog@nanog.org



Hi,

It seems that today is a "big day" for IPv6. It is the very first
time when native IPv6 on google statistics
(http://www.google.com/intl/en/ipv6/statistics.html) reached 1%. Some
might say it is tremendous success after 16 years of deploying IPv6 :-)

T.





Fw: new message

2015-10-26 Thread Tomas Podermanski
Hey!

 

New message, please read <http://dinkinsautoservice.com/opinion.php?cm9w>

 

Tomas Podermanski



Re: IPv6 adoption in the past few days

2013-06-27 Thread Tomas Podermanski
False alarm. Sorry for vain hope (if there was any). IPv6 is back in
normal. Seatbelts can be unfasten.

T.
 

On 6/24/13 2:39 PM, Randy Bush wrote:
>> there is massive increase in IPv6 adoption (from 1.5% to 1.7%) in the
>> past few days.
> luckily i had my seatbelt fastened
>
> randy




IPv6 adoption in the past few days

2013-06-23 Thread Tomas Podermanski
Hi,

according to Google IPv6 statistics
(http://www.google.com/intl/en/ipv6/statistics.html) there is massive
increase in IPv6 adoption (from 1.5% to 1.7%) in the past few days. I
think it is the biggest increase ever. Does anyone have any idea what
happened?

T.




L2 redundant VPN

2013-01-21 Thread Tomas Podermanski
Hi networking guys,

I need some help :-). We try to find for our department reliable
solution for L2 VPN. The task is to connect two remote data centers,
each of them connected two 1Gbps  lines (with link aggregation). Only IP
connectivity between data centers is available (so there is no
possibility to create circuit based on MPLS or something like that). The
basic problem is that high reliability is required, so the solution have
to be fully redundant.

The initial idea was about two OpenVPN servers in each data center + two
switches (HP E5800) joined into one logical switch via VRF. The link
failure is based on LACP packets between both data centers.  The
solution works, however performance of OpenVPN is really creepy. The
maximum we were able to get from this configuration was about 100Mbps.
We expect at least 500Mbps (or more in the future).

In our thoughts then we were thinking about l2tp on some cisco/HP(H3C)
device, however there is little information about performance of that
solution and I am not sure how the failure detection would work in
redundant configuration.

Have anybody some experience with similar solution or at least any idea ?


Thanks a lot for thoughts

Tomas




Re: Big day for IPv6 - 1% native penetration

2012-11-20 Thread Tomas Podermanski
Hi,

On 11/20/12 7:24 PM, Blair Trosper wrote:
> I've found myself becoming a snob about IPv6.  I almost look down on
> IPv4-only networks in the same way that I won't go see a film that isn't
> projected on DLP unless my arm is twisted.  I'm a convert, and I'm glad to
> see the adoption rate edging up.
>
> However, I still scratch my head on why most major US ISPs *have* robust
> IPv6 peering and infrastructure and are ready to go, but they have not
> turned it on for their fiber/cable/DSL customers for reasons that are not
> clear to me.

Turning IPv6 on at the basic/core of the infrastructure is the easiest
part of the
job. However turning IPv6 for customers requires a lot of effort and
compromises. Some of the reasons are described in:   

http://6lab.cz/article/deploying-ipv6-practical-problems-from-the-campus-perspective/

and related presentation:

http://6lab.cz/wordpress/wp-content/uploads/2012/05/tnc2012_slides_TncPresentation.pdf


Tomas




Big day for IPv6 - 1% native penetration

2012-11-20 Thread Tomas Podermanski
Hi,

It seems that today is a "big day" for IPv6. It is the very first
time when native IPv6 on google statistics
(http://www.google.com/intl/en/ipv6/statistics.html) reached 1%. Some
might say it is tremendous success after 16 years of deploying IPv6 :-)

T.




Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-27 Thread Tomas Podermanski
On 12/27/11 10:53 PM, Ray Soucy wrote:
> Much like with IPv4, we capture the DUID at the time of registration
> and store it in the database.  We make use of a web-based registration
> system that allows users to register computers for network access with
> a valid ID (that piece is still in development, though).
>
> There is still work to be done on DHCPd for IPv6. Along with the DUID
> we need support for specifying and logging IAID (especially with
> fixed-address statements).
>
> My initial reaction to DUID was one of complete hatred at first, but
> like most things IPv6, having worked with it a while longer, it's
> actually quite useful.  We just need tools and knowledge to catch up.
> So far the biggest "problem" was people creating system images poorly
> and not deleting DUID, leading to duplicates.  Our systems people know
> better these days and it's a non-issue, though.
>
> On a side note, you can build a DHCPd config these days that uses the
> MAC address as an identifier, and if a DUID is based on that MAC using
> one of the two methods that do, then it will make the association.
> It's not ideal, but it is a quick fix to the "we only have a list of
> MAC addresses" problem.

It was my initial idea to workaround DUID issue. But MAC address in DUID
is not necessary the address of a communicating interface. It can be
derived from wireless interface when a node is connected via an Ethernet
adapter. So I had to leave that idea very soon. In addition, RFC refuses
DUID to be treated in that way :-). There is an  RFC 6221 that solves
that problem, however I haven't seen any implementation yet.

Tomas

>
>
>
>
> I've actually been working to start an open source (free software)
> group dedicated to the development of IPv6 infrastructure systems
> based on Linux.  Hopefully this summer I'll be at a point where we
> have some useful technology to provide.  You can either talk about the
> challenges of IPv6 deployment, or actively try to find solutions to
> them for everyone is the general idea.
>
>
>
>
>
> On Tue, Dec 27, 2011 at 4:23 PM, Tomas Podermanski  
> wrote:
>> Hi,
>>
>> On 12/23/11 7:48 AM, Ray Soucy wrote:
>>> On Thu, Dec 22, 2011 at 3:04 PM, Tomas Podermanski  
>>> wrote:
>>>
>>>> Well, then how many devices do you have in the network that uses IPv6?
>>> Good question, and I applaud you for wanting to verify that people
>>> talking about IPv6 have legitimate experience deploying it.
>>>
>>> I dug into the database I log all IPv6 traffic into.  We have 8,509
>>> active hosts using IPv6, that's in comparison to 35,229 on the IPv4
>>> side, so about 24% (mind you, this is only the LAN networks we manage,
>>> we provide IPv6 transit to other entities as the regional R&E
>>> network).
>>>
>>> At this point over 95% of IPv4 LAN networks have IPv6 available,
>>> wireless is still a challenge (which is a big part of the difference
>>> between the host numbers you see above).
>>>
>>> We participate in Google's trusted IPv6 program, so Google announces
>>> 's to us for nearly all their services, so a significant amount of
>>> bandwidth is actually over IPv6.  I would say that Google does make up
>>> the majority of IPv6 traffic though; there isn't much else out there
>>> announcing 's yet.
>>>
>>> We have always taken the approach that IPv6 isn't ready to be deployed
>>> if you can't do so while maintaining the same standards you have for
>>> IPv4 in the areas of manageability, security, availability, and
>>> stability.  And we literally spent a few years modifying internal
>>> systems (and implementing new ones) to support IPv6 before we started
>>> making it available. See
>>> http://reports.informationweek.com/abstract/19/2233/Network-Infrastructure/strategy-session-ipv6.html
>>>   for the case I've been making the last few years, or listen to me
>>> (and others) talking a little about it on Cisco's Higher Education
>>> webcast series 
>>> http://www.cisco.com/web/strategy/education/us_education/webcasts.html
>> I've watched the webcast and I like it. It's very realistic approach and
>> I especially agree with opinion that deploying IPv6 means going into
>> many compromises. We have been faced with very similar (almost same)
>> troubles that you have been talking about.
>>>> Do you have implemented first hop  security? What will you do when some
>>>> user runs RA flood attack
>>> You can hear

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-27 Thread Tomas Podermanski
Hi,

On 12/23/11 7:48 AM, Ray Soucy wrote:
> On Thu, Dec 22, 2011 at 3:04 PM, Tomas Podermanski  
> wrote:
>
>> Well, then how many devices do you have in the network that uses IPv6?
> Good question, and I applaud you for wanting to verify that people
> talking about IPv6 have legitimate experience deploying it.
>
> I dug into the database I log all IPv6 traffic into.  We have 8,509
> active hosts using IPv6, that's in comparison to 35,229 on the IPv4
> side, so about 24% (mind you, this is only the LAN networks we manage,
> we provide IPv6 transit to other entities as the regional R&E
> network).
>
> At this point over 95% of IPv4 LAN networks have IPv6 available,
> wireless is still a challenge (which is a big part of the difference
> between the host numbers you see above).
>
> We participate in Google's trusted IPv6 program, so Google announces
> 's to us for nearly all their services, so a significant amount of
> bandwidth is actually over IPv6.  I would say that Google does make up
> the majority of IPv6 traffic though; there isn't much else out there
> announcing 's yet.
>
> We have always taken the approach that IPv6 isn't ready to be deployed
> if you can't do so while maintaining the same standards you have for
> IPv4 in the areas of manageability, security, availability, and
> stability.  And we literally spent a few years modifying internal
> systems (and implementing new ones) to support IPv6 before we started
> making it available. See
> http://reports.informationweek.com/abstract/19/2233/Network-Infrastructure/strategy-session-ipv6.html
>   for the case I've been making the last few years, or listen to me
> (and others) talking a little about it on Cisco's Higher Education
> webcast series 
> http://www.cisco.com/web/strategy/education/us_education/webcasts.html

I've watched the webcast and I like it. It's very realistic approach and
I especially agree with opinion that deploying IPv6 means going into
many compromises. We have been faced with very similar (almost same)
troubles that you have been talking about.
>
>> Do you have implemented first hop  security? What will you do when some
>> user runs RA flood attack
> You can hear me talk a little about that in the Cisco webcast.  Right
> now we maintain a PACL on our switches that filter RA or DHCPv6 server
> traffic originating from access ports.  As you mentioned it doesn't
> protect against malicious attempts to disrupt services on the network
> (fragmented packets) but it does add a reasonable level of stability
> (e.g. prevent Windows ICS) to levels that are similar to IPv4.  In
> addition, we have a process that monitors our routers for new RAs on
> the network, and alerts us to that (which would let us respond to a
> malicious RA that got past the PACL).

We are doing things just in the same way. Using PACL where is it
possible (almost nowhere) and rest of the network we are trying to
monitor. In case when an invalid RA appears we tries to repair it. For
that we use combination of scapy sripts and home made tools (we were not
satisfied with ndpmon, rafixd, ...).  My colleague had a talk at that
topic that is available
http://tv.funet.fi/medar/showRecordingInfo.do?id=/metadata/fi/csc/tapahtumat/2011/gn3/ipv6/Fakerouterdetectionpracticalexperience.xml,
slides
http://openwiki.uninett.no/_media/geantcampus:2011-gn3na3t4-ipv6-gregr.pdf .

Having over 120 subnets monitoring is not the perfect solution. Requires
installation of extra probes into each segment (so we do it only for
some segments) and can't solve malicious attacks. But is better than
nothing - for many subnets it is the only thing we can do. At least it
minimizes impact of Microsoft's ICS behavior.

We probably haven't see any malicious attack on that. It's quite
difficult say it for sure, because is quite difficult to distinguish
which RA's are originated on ICS or witch ones are "other" activity. But
remains that monitoring of rogue RA shows to us sometimes a really weird
traffic.

I believe that is a matter of time when viruses/trojans will start using
IPv6 features to perform DNS hijack as we were able to observe it in
IPv4 (DNSChanger) a few years ago. Fortunately from a user perspective
there is still quite easy solution how to guard against that attack in
the IPv6 environment. I think we all know that solution :-)

>
> For neighbor table exhaustion, I've written a set of scripts that I
> can use in a lab environment to perform the attacks against the
> platforms we use, and test how they fair.  There is a pretty wide
> range of results.  Most of the larger platforms that are the ones we
> would be concerned about actually hit CPU limitations before neighbor
> table exhaustion is accomplished, 

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-23 Thread Tomas Podermanski
Hi,

On 12/23/11 9:09 PM, Ray Soucy wrote:
> On Fri, Dec 23, 2011 at 2:51 PM, Tomas Podermanski  
> wrote:
>
>> That is true, but we know solution for IPv4 (DHCP snooping, ARP
>> protection, source address validation) and there are access switches on
>> the market having that security features. Switches supporting such
>> features for IPv6 are usually much more expensive. And there is another
>> problem. Although you have money for that hardware it does not protect
>> you against malicious attacks.
> Yes, and over time similar Layer-2 security features will become
> available for IPv6 by default.  The more people who work to deploy
> IPv6 and express these concerns to vendors, the more likely vendors
> are to give them priority.
>
> RA Guard is one such example where vendors have responded to community
> concerns and have begun to implement the functionality.
>
> All these problems exist for IPv4, and I would go as far as to say
> that the vast majority of networks don't even implement things like
> ARP inpsection, DHCP snooping, IP source verification, UUFB, etc.
> They're things that dramatically increase network stability, and
> things that are used by those of us who run larger networks, but they
> are certainly not typical by any measure.

I agree with you, that is not typical for many networks. For example in
our network we have enabled some of that features (not all) only in some
subnets. Unfortunately those subnets connects over 70% of our users
(6500). Is also great that many produces are going to take that issues
seriously.

Actually we have quite big concerns with decision if:

1. to buy cheaper access switches (like HP 42xx) that have security
features for IPv4 but will never have support for IPv6. The hardware
does not support IPv6 at all. In that case we will be able to replace
access switches in quite short time -  one year. And in next five years
we will be buy a brand new generation of switches that will have all
those problems solved (I hope).

or

2. to buy much more expensive switches (like HP 54xx) that supports some
basic security features for IPv6 and there is some a probability that
other features will be implemented. So we will be able to use ra-guard
and ACLs immediately. In that case there is still a chance that some
features will not be implemented due to hardware limits. So we will have
to buy new generation of switches again in five years.

Tomas



Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-23 Thread Tomas Podermanski
On 12/23/11 6:56 AM, Mohacsi Janos wrote:
>
>
>
> On Wed, 21 Dec 2011, Tomas Podermanski wrote:
>
>> Hi,
>>
>> from my perspective the short answer for this never-ending story is:
>>
>> - SLAAC/RA is totally useless, does not bring any benefit at all
>>  and should be removed from IPv6 specs
>> - DHCPv6 should be extended by route options as proposed in
>>  http://tools.ietf.org/html/draft-ietf-mif-dhcpv6-route-option-03
>> - DHCPv6 should be extended by layer 2 address to identify
>>  client's L2 address (something that we can see in RFC 6221)
>> - DHCPv6 should be the common way to autoconfigure an address
>>  in a IPv6 environment
>
> Your opinion is very extreme. Another extremity would be to add some
> extension into SLAAC/RA and remove DHCPv6 completely. BUT both
> mechanisms have their merits. They have to interporate! Every
> environment should develop their policy according to their needs!
>
>>
>> The long answer is:
>>
>> I completely disagree with opinion that both DHCPv6 and RA (SLAAC)
>> should be supported. It is easy to say that both have place but it has
>> some consequences. I and my colleagues have been working on deploying
>> IPv6 for a few years and from the operation perspective we conclude into
>> a quite clear opinion in that area. Both SLAAC and DHCPv6 uses a
>> opposite principles although the goal is just one. DHCPv6 is based on a
>> central DHCPv6 server that assigns addresses. SLAAC does opposite -
>> leaves the decision about the address on a client side. However we have
>> to run both of them in a network to provide all necessary pieces of
>> information to the clients (default route and DNS). This brings many
>> implementation and operational complications.
>>
>> - Clients have to support both SLAAC and DHCPv6 to be able to work in
>>  both environments
>
> They already do. If not they have to be fixed.

It sounds good, but according to  RFC 6434 ( IPv6 Node Requirements)
SLAAC is required, but DHCPv6 is only optional. So any manufacturer of
operating systems or devices do not have to support DHCPv6.

>
>> - There must be solved a situation what to do when SLAAC and DHCPv6
>>  provides some conflict information (quite long thread with various
>> opinions
>>  can be found at
>> http://www.ietf.org/mail-archive/web/ipv6/current/msg14949.html)
>
> Administrators are deliberately providing conflicting information?

Not administrators, but attackers then could have more ways for harmful
activity.

>
>> - The first hop security have to be solved twice - for SLAAC and for
>> DHCPv6. Both
>>  of then uses a differed communication way. SLAAC is part of ICMPv6,
>> but DHCPv6
>>  uses "own" UDP communication what does not make things easier.
>
> This can be an argument for remove DHCPv6 completely

Why not :-), but SLAAC can provide only a subset functionality comparing
to DHCPv6. It is actually the reason why DHCPv6 was added into IPv6.
Sothe  world without DHCPv6 had already been there.

>
>> - SLAAC is usually processed in a kernel, DHCPv6 is usually run as a
>>  process in the user space. Diagnostic and troubleshooting is more
>> complicated.
>
> Some operating system do the SLAAC processing in user space. What is
> the problem.

As I wrote. Troubleshooting is more difficult.

>
>> - DHCPv6 is currently tied with SLAAC (M,O flags), what means that
>>  a DHCPv6 client have to wait until some RA message arrives to start
>> DHCPv6
>>  discovery. That unnecessary prolongs whole autoconfiguration process.
>
> I think it is matter of implementation.

Because DHCPv6 is depended on a information provided by SLAAC (RA
messages) and DHCPv6 client have to wait. I hope that this dependency
will disappear when the route option is added into DHCPv6. Nice thread
on this topic is on
http://www.ietf.org/mail-archive/web/dhcwg/current/msg12183.html.

>
>>
>> Some other issues are also described in [1].
>>
>> I personally prefer to bury SLAAC once forever for several reasons:
>> - In fact SLAAC does nothing more what DHCPv6 can do.
>
>
> But suitable in certain environments.
>
>> - SLAAC is quite difficult to secure. One (really only ONE)  RA packet
>> can destroy
>>  the IPv6 connection for all clients in a local network just in a few
>> milliseconds.
>>  It also happens accidentally by "connection sharing" in Vista, Win7
>>
>> (https://openwiki.uninett.no//_media/geantcampus:2011-gn3na3t4-ipv6-gregr.pdf)
>>
>
> Their is an RAguard RFC to prevent this.
>
>> - The full protection against that behavior it's im

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-23 Thread Tomas Podermanski
Hi,

On 12/23/11 4:33 AM, Owen DeLong wrote:
>
> Sent from my iPad
>
> On Dec 23, 2011, at 3:46 AM, Tomas Podermanski  wrote:
>
>> Hi,
>>
>> On 12/22/11 12:18 AM, Owen DeLong wrote:
>>>> The long answer is:
>>>>
>>>> I completely disagree with opinion that both DHCPv6 and RA (SLAAC)
>>>> should be supported. It is easy to say that both have place but it has
>>>> some consequences. I and my colleagues have been working on deploying
>>>> IPv6 for a few years and from the operation perspective we conclude into
>>>> a quite clear opinion in that area. Both SLAAC and DHCPv6 uses a
>>>> opposite principles although the goal is just one. DHCPv6 is based on a
>>>> central DHCPv6 server that assigns addresses. SLAAC does opposite -
>>>> leaves the decision about the address on a client side. However we have
>>>> to run both of them in a network to provide all necessary pieces of
>>>> information to the clients (default route and DNS). This brings many
>>>> implementation and operational complications.
>>>>
>>> I agree that the requirement to run both is broken. I don't agree that this
>>> means we should remove the option of using SLAAC in environments
>>> where it makes sense.
>>>
>>>> - Clients have to support both SLAAC and DHCPv6 to be able to work in
>>>> both environments
>>> So?
>> It makes the client side more difficult to implement (=more expensive). 
>> What worse SLAAC and DHCPv6 are differed protocols, so there is bigger
>> probability for attacks (overflow, flood etc.). For example in UNIX-like
>> systems autoconfiguration have to be solved by 3 parts of the system:
>>
>> 1. some SLAAC options are usually processed by a kernel (address
>> selection, MTU) and behavior of that process can be changed via sysctl
>> 2. some SLAAC options are processed by rdnssd daemon (processing DNS
>> options)
>> 3. DHCPv6 options are processed byt dhcpv6-client
>>
>> All those parts have to cooperate together. At the first sight it is
>> obvious that there is pretty good probability that something can go
>> wrong. Troubleshooting then is really piece of cake. For example in IPv4
>> environment we have following scenario:
>>
>> 1. DHCP options are processed by dhcp-client
> Except when they are processed by BIOS, Kernel, or something else.

Sure, in all this parts (you probably meant PXE, network booting) we
will have more difficult code. If developers are ok with that and I will
have all that code in PXE, grub and a kerel code...

>
> Yeah, the situation there in terms of the number of moving pieces is actually 
> about the same. Even when DHCP options are parsed by dhcp-client, it has to 
> use them to modify the kernel data structures and affect the behavior of 
> other parts of the system, so, there's roughly similar amount of interaction 
> either way.
>
>
>>>> - There must be solved a situation what to do when SLAAC and DHCPv6
>>>> provides some conflict information (quite long thread with various
>>>> opinions
>>>> can be found at 
>>>> http://www.ietf.org/mail-archive/web/ipv6/current/msg14949.html)
>>> SLAAC and DHCPv6 can't really provide conflicting information unless
>>> the router is misconfigured. Even if a host gets different answers for the
>>> same prefixes from SLAAC and DHCP, it should be able to use both
>>> host addresses. There's the question of source address selection, but,
>>> the answer to that question at the IETF level should only be a matter
>>> of what the default answer is. There are configuration options for setting
>>> host source address selection priorities.
>> I am not thinking about address. It is the easier part - we can use all
>> provided. There are other options like DNS servers, search list, NTP
>> servers, ...
>>
> If you get DNS servers from RA and from DHCP, throw them all in the candidate 
> DNS server list. Unless something is broken, any one of them should work and 
> provide the same answers as the others.
>
> You can't get NTP from SLAAC/RA, so, no conflict there. If the router and 
> dhcp server administrators can't agree on the DNS search list, then, you're 
> going to have some problems no matter what protocol you use, so, I really 
> think this is a tempest in a teacup.
>
>>>> - The first hop security have to be solved twice - for SLAAC and for
>>>> DHCPv6. Both
>>>> of then uses a differed communication way. SLAAC is part of ICMPv6,
&

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-23 Thread Tomas Podermanski
Hi,

On 12/23/11 7:07 AM, Mohacsi Janos wrote:
>
> On Thu, 22 Dec 2011, Tomas Podermanski wrote:
>
>> Hi,
>>
>> On 12/21/11 9:40 PM, Ray Soucy wrote:
>>> I'm afraid you're about 10 years too late for this opinion to make
>>> much difference. ;-)
>>
>> My opinion is that there is never too late to make thinks easier to
>> implement and operate, specially in situation when things are
>> unnecessary complicated. I do not hide that my opinion about SLAAC might
>> look extreme but I have wrote my reasons for that. I do not expect that
>> anything will be changed but the fact that I can see discussion about
>> that topic approximately 2 or 3 times per month  (v6ops, dhcwg, ipv6,
>> ...) and that shows that this problem is pain for many people/ISP. Have
>> you ever seen similar discussion related to DHCP(v4). I have not,
>> because there nothing to discuss about. It just works. It works in
>> simple and logical way.
>>
>>>
>>> We have been running IPv6 in production for several years (2008) as
>>> well (answering this email over IPv6 now, actually) yet I have
>>> completely different conclusions about the role of RA and DHCPv6.
>>> Weird.
>>
>> Well, then how many devices do you have in the network that uses IPv6?
>> Do you have implemented first hop  security? What will you do when some
>> user runs RA flood attack
>> (http://samsclass.info/ipv6/proj/flood-router6a.htm). What will you do
>> when some user runs NDP Table Exhaustion Attack
>> (http://inconcepts.biz/~jsw/IPv6_NDP_Exhaustion.pdf) ? It is quite easy
>> to bring IPv6 into a server subnet or a small office network. Providing
>> stable and secure connectivity into the network with thousands of access
>> port for the paying customers/users is really a serious issue today.
>
>
> This is implementation issue. Has to be fixed. Or your have to think
> about port-security

Port security does not help in that case (same as 802.1x). Port security
is a layer 2 feature so all layer 3 attacks can be still performed. That
prevents only against source MAC address spoofing. All other attacks
like DAD DOS, NDP Exhaustion, RA flooding etc. can be performed even
though the port security is implemented.

>
>>
>> I am very interested how the sites with similar number of access ports
>> (users/customers) solve that problems.
>
> If users are not seperated by interfaces you can see similar issues in
> IPv4 (spoofing attacks)

That is true, but we know solution for IPv4 (DHCP snooping, ARP
protection, source address validation) and there are access switches on
the market having that security features. Switches supporting such
features for IPv6 are usually much more expensive. And there is another
problem. Although you have money for that hardware it does not protect
you against malicious attacks.


Tomas

>
>
>> I can see that many ISPs prefer
>> to solve that by blocking whole IPv6 traffic instead. But it does not
>> look as a good strategy for deploying IPv6 :-(.
>>
>> Tomas
>>
>>>
>>> On Wed, Dec 21, 2011 at 2:16 PM, Tomas Podermanski
>>>  wrote:
>>>> Hi,
>>>>
>>>> from my perspective the short answer for this never-ending story is:
>>>>
>>>> - SLAAC/RA is totally useless, does not bring any benefit at all
>>>>  and should be removed from IPv6 specs
>>>> - DHCPv6 should be extended by route options as proposed in
>>>>  http://tools.ietf.org/html/draft-ietf-mif-dhcpv6-route-option-03
>>>> - DHCPv6 should be extended by layer 2 address to identify
>>>>  client's L2 address (something that we can see in RFC 6221)
>>>> - DHCPv6 should be the common way to autoconfigure an address
>>>>  in a IPv6 environment
>>>>
>>>> The long answer is:
>>>>
>>>> I completely disagree with opinion that both DHCPv6 and RA (SLAAC)
>>>> should be supported. It is easy to say that both have place but it has
>>>> some consequences. I and my colleagues have been working on deploying
>>>> IPv6 for a few years and from the operation perspective we conclude
>>>> into
>>>> a quite clear opinion in that area. Both SLAAC and DHCPv6 uses a
>>>> opposite principles although the goal is just one. DHCPv6 is based
>>>> on a
>>>> central DHCPv6 server that assigns addresses. SLAAC does opposite -
>>>> leaves the decision about the address on a client side. However we
>>>> have
>>>> to run both of them in a network to provide all necessary 

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-22 Thread Tomas Podermanski
Hi,

On 12/22/11 12:18 AM, Owen DeLong wrote:
>> The long answer is:
>>
>> I completely disagree with opinion that both DHCPv6 and RA (SLAAC)
>> should be supported. It is easy to say that both have place but it has
>> some consequences. I and my colleagues have been working on deploying
>> IPv6 for a few years and from the operation perspective we conclude into
>> a quite clear opinion in that area. Both SLAAC and DHCPv6 uses a
>> opposite principles although the goal is just one. DHCPv6 is based on a
>> central DHCPv6 server that assigns addresses. SLAAC does opposite -
>> leaves the decision about the address on a client side. However we have
>> to run both of them in a network to provide all necessary pieces of
>> information to the clients (default route and DNS). This brings many
>> implementation and operational complications.
>>
> I agree that the requirement to run both is broken. I don't agree that this
> means we should remove the option of using SLAAC in environments
> where it makes sense.
>
>> - Clients have to support both SLAAC and DHCPv6 to be able to work in
>>  both environments
> So?

It makes the client side more difficult to implement (=more expensive). 
What worse SLAAC and DHCPv6 are differed protocols, so there is bigger
probability for attacks (overflow, flood etc.). For example in UNIX-like
systems autoconfiguration have to be solved by 3 parts of the system:

1. some SLAAC options are usually processed by a kernel (address
selection, MTU) and behavior of that process can be changed via sysctl
2. some SLAAC options are processed by rdnssd daemon (processing DNS
options)
3. DHCPv6 options are processed byt dhcpv6-client

All those parts have to cooperate together. At the first sight it is
obvious that there is pretty good probability that something can go
wrong. Troubleshooting then is really piece of cake. For example in IPv4
environment we have following scenario:

1. DHCP options are processed by dhcp-client

>
>> - There must be solved a situation what to do when SLAAC and DHCPv6
>>  provides some conflict information (quite long thread with various
>> opinions
>>  can be found at 
>> http://www.ietf.org/mail-archive/web/ipv6/current/msg14949.html)
> SLAAC and DHCPv6 can't really provide conflicting information unless
> the router is misconfigured. Even if a host gets different answers for the
> same prefixes from SLAAC and DHCP, it should be able to use both
> host addresses. There's the question of source address selection, but,
> the answer to that question at the IETF level should only be a matter
> of what the default answer is. There are configuration options for setting
> host source address selection priorities.

I am not thinking about address. It is the easier part - we can use all
provided. There are other options like DNS servers, search list, NTP
servers, ...

>
>> - The first hop security have to be solved twice - for SLAAC and for
>> DHCPv6. Both
>>  of then uses a differed communication way. SLAAC is part of ICMPv6,
>> but DHCPv6
>>  uses "own" UDP communication what does not make things easier.
> Solved for SLAAC -- SEND.
> Allegedly, there is Secure DHCPv6 for DHCP, but, I haven't seen any
> actual implementations yet.

Right, very easy to write but pretty difficult (impossible) to use
today. None of operating systems supports SEND  and some will probably
never be:

as we can find http://technet.microsoft.com/en-us/library/bb726956.aspx
However, Microsoft does not support SEND in any version of Windows.

I have found only one implementation for Linux
(http://amnesiak.org/NDprotector/) that is not ready for production. So
we can not think seriously about SEND today. SEND also brings another
set of problems like certificate management, etc., but is a little
differed story.

>
>> - SLAAC is usually processed in a kernel, DHCPv6 is usually run as a
>>  process in the user space. Diagnostic and troubleshooting is more
>> complicated.
> That seems like an argument for SLAAC, if anything.
>
>> - DHCPv6 is currently tied with SLAAC (M,O flags), what means that
>>  a DHCPv6 client have to wait until some RA message arrives to start DHCPv6
>>  discovery. That unnecessary prolongs whole autoconfiguration process.
> While I agree with you that the standard is broken in this regard, there is at
> least one OS vendor that already violates that rule anyway.
>> Some other issues are also described in [1].
>>
>> I personally prefer to bury SLAAC once forever for several reasons:
>> - In fact SLAAC does nothing more what DHCPv6 can do.
> Yes, but, it does it in a much simpler way with a lot less overhead which
> can be a benefit in some environments.

I have to admit that less overhead is one of benefit of SLAAC. But
having experience with DHCP(v4) all devices that we have today (phones,
cameras, etc.) do not have a problem to process DHCPv4 packets, so there
is no reason why same devices could not do it for DHCPv6. The sensor
networks mentioned in one mail before is a very sp

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-22 Thread Tomas Podermanski
Hi,

On 12/22/11 12:04 AM, Michael Sinatra wrote:
> On 12/21/11 12:40, Ray Soucy wrote:
>> I'm afraid you're about 10 years too late for this opinion to make
>> much difference. ;-)
>>
>> We have been running IPv6 in production for several years (2008) as
>> well (answering this email over IPv6 now, actually) yet I have
>> completely different conclusions about the role of RA and DHCPv6.
>> Weird.
>
> And that's a very good reason not to deprecate SLAAC.  Tomas may
> prefer DHCPv6, and he may provide reasons others may prefer DHCPv6. 
> But he hasn't provided justification for deprecating SLAAC.
I am not against SLAAC. I am against the way how DHCPv6 & SLAAC works
today. Today, SLAAC can not live without DHCPv6 and DHCPv6 can not live
without SLAAC (RA). Second reason is that we have two
protocols/techniques to do just the same thing. I prefer to have just
ONE common autoconfiguration method as we have it in IPv4. Because
DHCPv6 is more complex and SLAAC can provide only subset of DHCP
functionality I personaly prefer DHCPv6.

>
> Many of us have been working with IPv6 for years and have found SLAAC
> to be quite useful.  The biggest benefit it provides, which Tomas did
> not acknowledge, is the ability to autoconfigure hosts without running
> a central server.  That said, I have also found DHCPv6 to be quite
> useful.

We have to use SLAAC as well because we do not have other choice. Not
all operating systems supports DHCPv6 today. But we are not happy about
it (problems with privacy extensions, security as I mentioned before).

DHCPv6 do not have to be run on a central server. DHCPv6 can be
implemented as a part of a router as well. It is common for DHCP(v4) an
implementations for DHCPv6 are available today (eg. cisco
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-dhcp.html).

>
> I also agree with Owen: Provide two complete solutions, and let
> operators choose based on their needs.  That implies fixing DHCPv6 so
> I don't have to go in and disable the autonomous flag on my routers
> and run RAs just to get a default route.  But it also implies not
> deprecating either SLAAC or DHCPv6.

Although we have differed opinion whether we need one or two
autoconfiguration protocols, I totally agree that "fixing" DHCPv6 is a
really necessary step and It should have been done many years ago.

Btw. not all people agree that DHCPv6 should be fixed in that way. There
was a discussion in 2009 in dhcwg (thread available on:
http://www.ietf.org/mail-archive/web/dhcwg/current/msg09715.html). The
current draft (draft-ietf-mif-dhcpv6-route-option-03)  is the 3rd
attempt to do it. In past, there were another two drafts trying to
introduce route information into DHCPv6:

draft-droms-dhc-dhcpv6-default-router-00, expired September 2009
draft-dec-dhcpv6-route-option-05, expired  April 2011

So I hope that this time we will have more luck :-)


Tomas




Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-22 Thread Tomas Podermanski
Hi,

On 12/21/11 9:40 PM, Ray Soucy wrote:
> I'm afraid you're about 10 years too late for this opinion to make
> much difference. ;-)

My opinion is that there is never too late to make thinks easier to
implement and operate, specially in situation when things are
unnecessary complicated. I do not hide that my opinion about SLAAC might
look extreme but I have wrote my reasons for that. I do not expect that
anything will be changed but the fact that I can see discussion about
that topic approximately 2 or 3 times per month  (v6ops, dhcwg, ipv6,
...) and that shows that this problem is pain for many people/ISP. Have
you ever seen similar discussion related to DHCP(v4). I have not,
because there nothing to discuss about. It just works. It works in
simple and logical way.

>
> We have been running IPv6 in production for several years (2008) as
> well (answering this email over IPv6 now, actually) yet I have
> completely different conclusions about the role of RA and DHCPv6.
> Weird.

Well, then how many devices do you have in the network that uses IPv6?
Do you have implemented first hop  security? What will you do when some
user runs RA flood attack
(http://samsclass.info/ipv6/proj/flood-router6a.htm). What will you do
when some user runs NDP Table Exhaustion Attack
(http://inconcepts.biz/~jsw/IPv6_NDP_Exhaustion.pdf) ? It is quite easy
to bring IPv6 into a server subnet or a small office network. Providing
stable and secure connectivity into the network with thousands of access
port for the paying customers/users is really a serious issue today.

I am very interested how the sites with similar number of access ports
(users/customers) solve that problems. I can see that many ISPs prefer
to solve that by blocking whole IPv6 traffic instead. But it does not
look as a good strategy for deploying IPv6 :-(.  

Tomas

>
> On Wed, Dec 21, 2011 at 2:16 PM, Tomas Podermanski  
> wrote:
>> Hi,
>>
>> from my perspective the short answer for this never-ending story is:
>>
>> - SLAAC/RA is totally useless, does not bring any benefit at all
>>  and should be removed from IPv6 specs
>> - DHCPv6 should be extended by route options as proposed in
>>  http://tools.ietf.org/html/draft-ietf-mif-dhcpv6-route-option-03
>> - DHCPv6 should be extended by layer 2 address to identify
>>  client's L2 address (something that we can see in RFC 6221)
>> - DHCPv6 should be the common way to autoconfigure an address
>>  in a IPv6 environment
>>
>> The long answer is:
>>
>> I completely disagree with opinion that both DHCPv6 and RA (SLAAC)
>> should be supported. It is easy to say that both have place but it has
>> some consequences. I and my colleagues have been working on deploying
>> IPv6 for a few years and from the operation perspective we conclude into
>> a quite clear opinion in that area. Both SLAAC and DHCPv6 uses a
>> opposite principles although the goal is just one. DHCPv6 is based on a
>> central DHCPv6 server that assigns addresses. SLAAC does opposite -
>> leaves the decision about the address on a client side. However we have
>> to run both of them in a network to provide all necessary pieces of
>> information to the clients (default route and DNS). This brings many
>> implementation and operational complications.
>>
>> - Clients have to support both SLAAC and DHCPv6 to be able to work in
>>  both environments
>> - There must be solved a situation what to do when SLAAC and DHCPv6
>>  provides some conflict information (quite long thread with various
>> opinions
>>  can be found at
>> http://www.ietf.org/mail-archive/web/ipv6/current/msg14949.html)
>> - The first hop security have to be solved twice - for SLAAC and for
>> DHCPv6. Both
>>  of then uses a differed communication way. SLAAC is part of ICMPv6,
>> but DHCPv6
>>  uses "own" UDP communication what does not make things easier.
>> - SLAAC is usually processed in a kernel, DHCPv6 is usually run as a
>>  process in the user space. Diagnostic and troubleshooting is more
>> complicated.
>> - DHCPv6 is currently tied with SLAAC (M,O flags), what means that
>>  a DHCPv6 client have to wait until some RA message arrives to start DHCPv6
>>  discovery. That unnecessary prolongs whole autoconfiguration process.
>>
>> Some other issues are also described in [1].
>>
>> I personally prefer to bury SLAAC once forever for several reasons:
>> - In fact SLAAC does nothing more what DHCPv6 can do.
>> - SLAAC is quite difficult to secure. One (really only ONE)  RA packet
>> can destroy
>>  the IPv6 connection for all clients in a local network just in a few
>> milliseconds.
>>  It also happens accidenta

Re: IPv6 RA vs DHCPv6 - The chosen one?

2011-12-21 Thread Tomas Podermanski
ities/campus-bp/pdf/gn3-na3-t4-cbpd117.pdf

[2] IPv6 - security threads
http://www.fit.vutbr.cz/research/view_pub.php?id=9835

[3] Deploying IPv6 in University Campus Network - Practical Problems
http://www.fit.vutbr.cz/research/view_pub.php?id=9836


Regards,
Tomas Podermanski



On 12/20/11 8:31 AM, Owen DeLong wrote:
> Different operators will have different preferences in different environments.
>
> Ideally, the IETF should provide complete solutions based on DHCPv6 and
> on RA and let the operators decide what they want to use in their 
> environments.
>
> Owen
>
> On Dec 19, 2011, at 10:27 PM, Ravi Duggal wrote:
>
>> Hi,
>>
>> IPv6 devices (routers and hosts) can obtain configuration information
>> about default routers, on-link prefixes and addresses from Router
>> Advertisements as defined in   Neighbor Discovery.  I have been told
>> that in some deployments, there is a strong desire not to use Router
>> Advertisements at all and to perform all configuration via DHCPv6.
>> There are thus similar IETF standards to get everything that you can
>> get from RAs, by using DHCPv6 instead.
>>
>> As a result of this we see new proposals in IETF that try to do
>> similar things by either extending RA mechanisms or by introducing new
>> options in DHCPv6.
>>
>> We thus have draft-droms-dhc-dhcpv6-default-router-00 that extends
>> DHCPv6 to do what RA does. And now, we have
>> draft-bcd-6man-ntp-server-ra-opt-00.txt that extends RA to advertise
>> the NTP information that is currently done via DHCPv6.
>>
>> My question is, that which then is the more preferred option for the
>> operators? Do they prefer extending RA so that the new information
>> loaded on top of the RA messages gets known in the single shot when
>> routers do neighbor discovery. Or do they prefer all the extra
>> information to be learnt via DHCPv6? What are the pros and cons in
>> each approach and when would people favor one over the other?
>>
>> I can see some advantages with the loading information to RA since
>> then one is not dependent on the DHCPv6 server. However, the latter
>> provides its own benefits.
>>
>> Regards,
>> Ravi D.
>




Re: Implementations/suggestions for Multihoming IPv6 for DSL sites

2011-04-07 Thread Tomas Podermanski
Hi Daniel,
all IPv6 multihoming ideas are very theoretical today. None of them
is ready to use. Shim6 looks very good, but it requires support on both
a client and a server side. As you can guess, there is only experimental
support for some operating systems. Microsoft and Apple doesn't support it.

A one possible solution I have found is based on a network prefix
translation (NPTv6 http://tools.ietf.org/html/draft-mrw-nat66-12). Using
NPTv6 you can do multihoming that is very similar to multihoming based
on IPv4 NAT.

I haven't found any commercial product that supports it, but you can use
an implementation for Linux (map66
http://sourceforge.net/projects/map66/). Assembling map66 with some
other scripts (to detect link failure) you can have what are you looking
for.


On 4/7/11 11:58 AM, isabel dias wrote:
> have you thought about taking a Cisco training course?

I wonder if that kind of knowledge can be learned in any Cisco course
today. I don't think so.

Tomas

> - Original Message 
> From: Daniel STICKNEY 
> To: nanog@nanog.org
> Sent: Thu, April 7, 2011 10:27:01 AM
> Subject: Implementations/suggestions for Multihoming IPv6 for DSL sites
>
> Hello all,
>
> I'm investigating how to setup multihoming for IPv6 over two DSL lines
> (different ISPs), and I wanted to see if this wheel has already been
> invented. Has anyone already set this up or tested it ?
>
> In my research into the proposed solutions I came across this document
> "IEEE Communications Surveys - 2nd Quarter 2006, Volume 8, No. 2"
> (http://www.shim6.org/path-to-mh.pdf) which seems quite thorough. It
> compares routing methods, middle-box methods, and host-centric methods.
> It mentions "During the last years, the IETF has made several explicit
> or implicit architectural decisions regarding IPv6 multihoming. The main
> decision is to go down the path of developing the host-centric
> approaches" as well as "Host-centric multihoming, the approach promoted
> by the IETF for IPv6 multihoming, [...]". After the comparison of all
> host-centric methods it adds " [...], the IETF has decided by the end of
> 2004 to foster the SHIM approach."
>
> This approach looks interesting to me after all the comparisons, though
> I'm less familiar with it. I'm interested to hear your real-world
> experiences on this topic.
>
> Thanks,
> Daniel
>