Re: using ULA for 'hidden' v6 devices?

2012-01-31 Thread Robert E. Seastrom

Tim Chown t...@ecs.soton.ac.uk writes:

 On 26 Jan 2012, at 16:53, Owen DeLong wrote:

 On Jan 26, 2012, at 8:14 AM, Ray Soucy wrote:
 
 Does this mean we're also looking at residential allocations larger
 than a /64 as the norm?
 
 
 We certainly should be. I still think that /48s for residential is
 the right answer.
 
 My /48 is working quite nicely in my house.

 There seems to be a lot of discussion happening around a /60 or /56.
 I wouldn't assume a /48 for residential networks, or a static
 prefix.

The big question is what constitutes an end site and do we want/need
to have multiple classes of end site in the interests of conserving
IPv6 space, or do we want to have only a single class in the interests
of conserving technical person brain cells?

Food for thought:

   There are approximately 7 billion people in the world right now.  US
   billion, 10^9.

   If we defined an end site as an Internet provider access device
   that could allow subsidiary devices to connect downstream...

   AND

   Every human on the face of the earth was Avi Freedman or Vijay Gill and
   had ten cell phones that would act as APs, each of which with its own /48...

   THEN...

   We would be using between 2^36 and 2^37 end site allocations (70 billion).
   OR
   between a /11 and a /12
   OR
   right around 0.03% of the space, assuming 100% utilization efficiency.

If the goal in putting small chunks of space at residences is to
conserve space in order to fit within the RIR's policies, then it is
the policies that ought to change.

Stewardship is not the same as parsimony.

-r




Re: using ULA for 'hidden' v6 devices?

2012-01-27 Thread Mark Tinka
On Thursday, January 26, 2012 08:19:07 PM George Bonser wrote:

 I filter the entire space at the borders.  Besides, if
 someone leaks the space, most people won't accept it,
 certainly any provider worth their salt won't.  But one
 of the problems with ULA and the U part.  With RFC 1918
 everyone is using the same space.  So let's say 10
 million networks are using 10/8 and 10,000 of them are
 leaking bits of it.  IF their providers accept their
 leaks and IF their providers' peers accept it, that
 leaves only 10,000 different places a 10/8 destined
 packet could go.

Just on this subject, we're peering with networks some
may call worth their salt, and what we've been seeing
since we started peering with them is interesting. This
is an ACL applied on ingress across the peering 
interfaces (note that sequences 90 - 150 are our own APNIC 
allocations):

router-in-asia-1#sh ip access-lists filter-incoming
Extended IP access list filter-incoming
10 deny ip 10.0.0.0 0.255.255.255 any (13685079 matches)
20 deny ip 127.0.0.0 0.255.255.255 any (5380 matches)
30 deny ip 169.254.0.0 0.0.255.255 any (270500 matches)
40 deny ip 172.16.0.0 0.15.255.255 any (5367880 matches)
50 deny ip 192.0.2.0 0.0.0.255 any (3478 matches)
60 deny ip 192.42.172.0 0.0.0.255 any
70 deny ip 192.168.0.0 0.0.255.255 any (10780785 matches)
80 deny ip 198.18.0.0 0.1.255.255 any (1691 matches)
90 deny ip 61.11.208.0 0.0.15.255 any (35 matches)
100 deny ip 119.110.128.0 0.0.127.255 any (50 matches)
110 deny ip 124.158.224.0 0.0.31.255 any (4667 matches)
120 deny ip 202.76.224.0 0.0.15.255 any (7747449 matches)
130 deny ip 116.0.96.0 0.0.31.255 any (124 matches)
140 deny ip 119.110.0.0 0.0.63.255 any (67 matches)
150 deny ip 203.223.128.0 0.0.31.255 any (7665942 matches)
160 permit ip any any (3080575612 matches)
router-in-asia-1#


router-in-asia-2#sh ip access-lists filter-incoming
Extended IP access list filter-incoming
10 deny ip 10.0.0.0 0.255.255.255 any (35529145 matches)
20 deny ip 127.0.0.0 0.255.255.255 any (45 matches)
30 deny ip 169.254.0.0 0.0.255.255 any (12950353 matches)
40 deny ip 172.16.0.0 0.15.255.255 any (8902750 matches)
50 deny ip 192.0.2.0 0.0.0.255 any (4495 matches)
60 deny ip 192.42.172.0 0.0.0.255 any (7 matches)
70 deny ip 192.168.0.0 0.0.255.255 any (8805796 matches)
80 deny ip 198.18.0.0 0.1.255.255 any (3269 matches)
90 deny ip 61.11.208.0 0.0.15.255 any (20 matches)
100 deny ip 119.110.128.0 0.0.127.255 any
110 deny ip 124.158.224.0 0.0.31.255 any (4436 matches)
120 deny ip 202.76.224.0 0.0.15.255 any (6325852 matches)
130 deny ip 116.0.96.0 0.0.31.255 any (857940 matches)
140 deny ip 119.110.0.0 0.0.63.255 any (659 matches)
150 deny ip 203.223.128.0 0.0.31.255 any (6618486 matches)
160 permit ip any any (284108624 matches)
router-in-asia-2#


router-in-america#sh ip access-lists filter-incoming
Extended IP access list filter-incoming
10 deny ip 10.0.0.0 0.255.255.255 any (1226939 matches)
20 deny ip 127.0.0.0 0.255.255.255 any (36 matches)
30 deny ip 169.254.0.0 0.0.255.255 any (2464 matches)
40 deny ip 172.16.0.0 0.15.255.255 any (379730 matches)
50 deny ip 192.0.2.0 0.0.0.255 any (4 matches)
60 deny ip 192.42.172.0 0.0.0.255 any
70 deny ip 192.168.0.0 0.0.255.255 any (987273 matches)
80 deny ip 198.18.0.0 0.1.255.255 any (43 matches)
90 deny ip 61.11.208.0 0.0.15.255 any
100 deny ip 119.110.128.0 0.0.127.255 any (4 matches)
110 deny ip 124.158.224.0 0.0.31.255 any (2514 matches)
120 deny ip 202.76.224.0 0.0.15.255 any (644354 matches)
130 deny ip 116.0.96.0 0.0.31.255 any (11 matches)
140 deny ip 119.110.0.0 0.0.63.255 any (22 matches)
150 deny ip 203.223.128.0 0.0.31.255 any (641830 matches)
160 permit ip any any (84287716 matches)
router-in-america#


For our v6 ingress filters on the same interfaces, we're
seeing some matches for '3ffe::/16' and '2001:db8::/32'
from Asia and the U.S.

Mark.


signature.asc
Description: This is a digitally signed message part.


RE: using ULA for 'hidden' v6 devices?

2012-01-26 Thread George Bonser
 Use different GUA ranges for internal and external. It's easy enough to
 get an additional prefix.
 
  As others have mentioned, things like management interfaces on access
 switches, printers, and IP phones would be good candidates to hide with
 ULA.
 
 Or non-advertised, filtered GUA. Works just as well either way.
 
 Owen
 

If one is obtaining another prefix for local addressing, I see no benefit.  I 
am assuming that anyone that is using ULA is using it for things that don't 
communicate off the site such as management interfaces of things, etc.  This 
won't be a subnet you are connecting by VPN to another organization, usually, 
but even if you do the chances of collision is pretty low if you select your 
nets properly.  But for the most absolutely paranoid site, I can see some 
appeal in using ULA in conjunction with DNS64/NAT64 and see them giving the 
devices internet access via v4.  Not that I agree with the notion, mind you, 
just that I can see someone looking at that as an appealing solution for some 
things.  Even if someone managed to get through the NAT device via v4, they 
would have nothing to talk to on the other side as the other side is all v6.





Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Tim Chown
So the issue of ULAs has come up in the IETF homenet WG.  The homenet WG is 
considering routing, prefix delegation, security, naming and service discovery. 

ULA support is written into RFC6204 (basic IPv6 requirements for CPE routers) 
so home CPEs should have the capability, and should be able to generate 
random ULA prefixes.

The potential advantage of ULAs is that you have a stable internal addressing 
scheme within the homenet, while your ISP-assigned prefix may change over time. 
 You run ULAs alongside your PA prefix.  ULAs are not used for host-based NAT.  
The implication is that all homenet devices carry a ULA, though whether some do 
not also have a global PA address is open for debate.

There's a suggestion that ULAs could be used to assist security to some extent, 
allowing ULA to ULA communications as they are known to be within the homenet.

The naming and service discovery elements should remove the need to ever 
manually enter a ULA prefix; thus the temptation to use 0 instead of random 
bits for the ULA prefix should be reduced (even if the CPE allows it).

Prefix delegation of ULAs within a homenet would be done the same way as for 
the global PA prefix.

There is a proposal (not from within the homenet WG) to use ULAs with NPT66 
(RFC6296).  That obviously has some architectural implications.

Tim


RE: using ULA for 'hidden' v6 devices?

2012-01-26 Thread George Bonser
 
 The potential advantage of ULAs is that you have a stable internal
 addressing scheme within the homenet, while your ISP-assigned prefix
 may change over time.  You run ULAs alongside your PA prefix.  ULAs are
 not used for host-based NAT.  The implication is that all homenet
 devices carry a ULA, though whether some do not also have a global PA
 address is open for debate.

Yeah, there's some advantage to that.  Have a corp.foo.com domain that is the 
native domain for the internal machines while the foo.com domain that is 
visible to the outside world has outside accessible addressing.

 There's a suggestion that ULAs could be used to assist security to some
 extent, allowing ULA to ULA communications as they are known to be
 within the homenet.

Not sure how that assists security unless you simply want to limit site-site 
communications to your ULA ranges only, then sure.  In practice, sites often 
back each other up and you can have external traffic for site A using site B 
for its internet access, but that's not a big deal, just need to keep your 
internal and external traffic separated which any good admin will do as a 
matter of course, anyway.





Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Tim Chown
On 26 Jan 2012, at 11:10, George Bonser wrote:

 The potential advantage of ULAs is that you have a stable internal
 addressing scheme within the homenet, while your ISP-assigned prefix
 may change over time.  You run ULAs alongside your PA prefix.  ULAs are
 not used for host-based NAT.  The implication is that all homenet
 devices carry a ULA, though whether some do not also have a global PA
 address is open for debate.
 
 Yeah, there's some advantage to that.  Have a corp.foo.com domain that is 
 the native domain for the internal machines while the foo.com domain that is 
 visible to the outside world has outside accessible addressing.

Perhaps host.local or host.home internally and host.foo.com externally, though 
the latter could/should work internally as well.

 There's a suggestion that ULAs could be used to assist security to some
 extent, allowing ULA to ULA communications as they are known to be
 within the homenet.
 
 Not sure how that assists security unless you simply want to limit site-site 
 communications to your ULA ranges only, then sure.  In practice, sites often 
 back each other up and you can have external traffic for site A using site B 
 for its internet access, but that's not a big deal, just need to keep your 
 internal and external traffic separated which any good admin will do as a 
 matter of course, anyway.

It was a suggestion a previous homenet session, but the security aspect of 
homenet is lagging rather behind the current focus of routing and prefix 
delegation.  The usefulness of the suggestion does depend on ULA filtering at 
borders, and defining the borders.

I'm interested in views as one of the editors of the homenet architecture text.

Tim




RE: using ULA for 'hidden' v6 devices?

2012-01-26 Thread George Bonser
 It was a suggestion a previous homenet session, but the security aspect
 of homenet is lagging rather behind the current focus of routing and
 prefix delegation.  The usefulness of the suggestion does depend on ULA
 filtering at borders, and defining the borders.
 
 I'm interested in views as one of the editors of the homenet
 architecture text.
 
 Tim
 

I filter the entire space at the borders.  Besides, if someone leaks the space, 
most people won't accept it, certainly any provider worth their salt won't.  
But one of the problems with ULA and the U part.  With RFC 1918 everyone is 
using the same space.  So let's say 10 million networks are using 10/8 and 
10,000 of them are leaking bits of it.  IF their providers accept their leaks 
and IF their providers' peers accept it, that leaves only 10,000 different 
places a 10/8 destined packet could go.  In other words, 1918 becomes a maze of 
twisty caverns each one looking the same as the other.  The chances of being 
able to target any specific network is pretty darned low.  With ULA and v6, if 
it leaks and the addresses were chosen properly, the chances of targeting a 
specific network are much better.  I rather like the notion of everyone using 
the same v6 space for internal stuff and maybe using nat64/dns64 to talk to 
each other over VPN.  That way if the space leaks in only .1% of cases, the 
chances of a packet ending up at its intended destination is pretty much random 
and not guaranteed to end up in the same network an hour from now as it is now. 
 If you want LA, fine, assign ONE /32 for that and everyone uses it.  It's like 
having a million people named Bob.  If you should Bob, there's no guarantee 
you will be answered by the Bob you intended and 5 minutes from now you might 
be answered by a completely different Bob.

In other words, you turn leakage into a feature.  You make the fact that routes 
might leak add to the uncertainty by having everyone use the same nets.  The 
more people that leak, the less likely you are to reach an intended 
destination.  V6 ULA makes it MORE likely a leak will result in a security 
breach because it reduces the chances that two nets will leak the same routes.





RE: using ULA for 'hidden' v6 devices?

2012-01-26 Thread George Bonser
 In other words, you turn leakage into a feature.  You make the fact
 that routes might leak add to the uncertainty by having everyone use
 the same nets.  The more people that leak, the less likely you are to
 reach an intended destination.  V6 ULA makes it MORE likely a leak will
 result in a security breach because it reduces the chances that two
 nets will leak the same routes.
 
 

To put it another way, if you mandated that EVERY network announce the entire 
ULA space, it would make reaching any particular network in a predictable 
manner impossible.  Just as if every network announced RFC 1918 space and 
everyone accepted it, it would make that address space completely unusable for 
anything, particularly if everyone announced it and black holed it.  That might 
even be more effective than filtering it.  Everyone on the planet announces a 
route to 10/8 and everyone black holes it at their peering/transit points.  

So even if someone forgot to filter it, it wouldn't matter because it would be 
intercepted long before it ever gets to them or at least the chances of anyone 
being able to reliably reach them would be just about zero.









Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Ray Soucy
Local traffic shouldn't need to touch the CPE regardless of ULA or
GUA.  Also note that we already have the link local scope for traffic
between hosts on the same link (which is all hosts in a typical home
network); ULA only becomes useful if routing is involved which is not
the typical deployment for the home.

ULA is useful, on the other hand, if NPT is used.  NPT is not NAT, and
doesn't have any of the nastiness of NAT.

Using NPT to maintain consistent addressing internally would keep
things more simple for end-users, and would allow for things like CPE
being able to perform flow-based load-balancing between multiple
providers (which would fall more in line with the expectations of the
SMB and power-user audience).

I'm also not sure what the correct answer is to using a randomly
generated prefix vs. a predictable prefix for home networks.  ULA was
an attempt to resolve address overlap for routed private networks in
the event of mergers.  The majority of home users will never have this
concern.  Having a predictable prefix for home environments (ambiguous
local addressing?) might be useful for documentation, troubleshooting,
and support.

I think a lot of the question has to do with what the role of CPE will
be going forward.  As long as we're talking dual-stack, having
operational consistency between IPv4 and IPv6 makes sense.  If it's an
IPv6-only environment, then things become a lot more flexible (do we
even need CPE to include a firewall, or do we say host-based firewalls
are sufficient, for example).

Glad to see thoughtful consideration is being put into these topics,
though.  Thank you, Tim.




On Thu, Jan 26, 2012 at 6:15 AM, Tim Chown t...@ecs.soton.ac.uk wrote:
 On 26 Jan 2012, at 11:10, George Bonser wrote:

 The potential advantage of ULAs is that you have a stable internal
 addressing scheme within the homenet, while your ISP-assigned prefix
 may change over time.  You run ULAs alongside your PA prefix.  ULAs are
 not used for host-based NAT.  The implication is that all homenet
 devices carry a ULA, though whether some do not also have a global PA
 address is open for debate.

 Yeah, there's some advantage to that.  Have a corp.foo.com domain that is 
 the native domain for the internal machines while the foo.com domain that is 
 visible to the outside world has outside accessible addressing.

 Perhaps host.local or host.home internally and host.foo.com externally, 
 though the latter could/should work internally as well.

 There's a suggestion that ULAs could be used to assist security to some
 extent, allowing ULA to ULA communications as they are known to be
 within the homenet.

 Not sure how that assists security unless you simply want to limit site-site 
 communications to your ULA ranges only, then sure.  In practice, sites often 
 back each other up and you can have external traffic for site A using site B 
 for its internet access, but that's not a big deal, just need to keep your 
 internal and external traffic separated which any good admin will do as a 
 matter of course, anyway.

 It was a suggestion a previous homenet session, but the security aspect of 
 homenet is lagging rather behind the current focus of routing and prefix 
 delegation.  The usefulness of the suggestion does depend on ULA filtering at 
 borders, and defining the borders.

 I'm interested in views as one of the editors of the homenet architecture 
 text.

 Tim





-- 
Ray Soucy

Epic Communications Specialist

Phone: +1 (207) 561-3526

Networkmaine, a Unit of the University of Maine System
http://www.networkmaine.net/



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Jeroen Massar
On 2012-01-26 13:43 , Ray Soucy wrote:
 Local traffic shouldn't need to touch the CPE regardless of ULA or
 GUA.  Also note that we already have the link local scope for traffic
 between hosts on the same link (which is all hosts in a typical home
 network); ULA only becomes useful if routing is involved which is not
 the typical deployment for the home.

Lots of networks today already at home have separated wired and wireless
prefixes in the same home... it is getting more and more typical.

The thing is most home-kind-people tend to care that their devices can
talk to each other, they do care that those devices talk to the Internet.

 ULA is useful, on the other hand, if NPT is used.  NPT is not NAT, and
 doesn't have any of the nastiness of NAT.

The nastiness of NAT comes in at least two parts:
 - state in the NAT for tracking incoming/outgoing packets
 - NAT 'helpers': rewriting IP addresses inside packets

the latter is the worse of the two as when a protocol contains IP
addresses inside packets, eg like FTP has as the standard NAT example or
heck SIP for something more of today, then even with NPT where you just
swap out prefixes you will have a need for a helper as that internal
prefix is going to be embedded in those packets and will not be
available on the $internet for them to connect to.

As such, though the NPT trick sounds nice, it will not work and it is
still a NAT and will require helper modules for protocols that embed
addresses in their protocol. And those helper modules do squat when the
protocol is being crypted end to end, eg using SSL/TLS or even IPSEC.

[..]
 I'm also not sure what the correct answer is to using a randomly
 generated prefix vs. a predictable prefix for home networks.  ULA was
 an attempt to resolve address overlap for routed private networks in
 the event of mergers.  The majority of home users will never have this
 concern.

I guess you never tried to play a LAN version of a multi-player game
with friends that are still at home and then trying to route packets
between 192.168.0.0/24 at your own home and at the friends home, times 4
others in the same segment?

Indeed, that is why in ~1996 we where using 10.100.person.0/24 for the
100mbit segment and VPNd people together.

Indeed, that is not a majority (far from ;), but there are definitely
cases where this happens.

Also, it is mostly a non-issue, as ULA allows to be automatically
generated and various IPv6-enabled-router/IPv4-NAT boxes already do just
that: generate the ULA on bootup and store it in their config for
$lifetime. This works like a charm and is the way it was intended to work.

 Having a predictable prefix for home environments (ambiguous
 local addressing?) might be useful for documentation, troubleshooting,
 and support.

Don't let people bother with addresses, they have this wonderful thing
called Multicast DNS that gives them a nice router.local hostname etc.

(M-DNS is not something you want to have in a datacenter but for a home
network it is pretty nice)

Greets,
 Jeroen



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Owen DeLong

On Jan 26, 2012, at 2:00 AM, George Bonser wrote:

 Use different GUA ranges for internal and external. It's easy enough to
 get an additional prefix.
 
 As others have mentioned, things like management interfaces on access
 switches, printers, and IP phones would be good candidates to hide with
 ULA.
 
 Or non-advertised, filtered GUA. Works just as well either way.
 
 Owen
 
 
 If one is obtaining another prefix for local addressing, I see no benefit.  
 I am assuming that anyone that is using ULA is using it for things that don't 
 communicate off the site such as management interfaces of things, etc.  This 
 won't be a subnet you are connecting by VPN to another organization, usually, 
 but even if you do the chances of collision is pretty low if you select your 
 nets properly.  But for the most absolutely paranoid site, I can see some 
 appeal in using ULA in conjunction with DNS64/NAT64 and see them giving the 
 devices internet access via v4.  Not that I agree with the notion, mind you, 
 just that I can see someone looking at that as an appealing solution for some 
 things.  Even if someone managed to get through the NAT device via v4, they 
 would have nothing to talk to on the other side as the other side is all v6.
 

Even if you don't see an advantage to GUA, can you point to a disadvantage?

IMHO, it would be far less wasteful of addressing overall to deprecate fc00::/7 
and use unique secondary GUA prefixes for this purpose than to use ULA.

If you can't point to some specific advantage of ULA over secondary non-routed 
GUA prefixes, then, ULA doesn't have a reason to live.

I'm not sure where DNS64/NAT64 comes into play here for v6 to v6 communication. 
For IPv4, I don't see any advantage in ULA+NAT64 vs. the more reliable and 
easier RFC-1918 with NAT44 possibilities, even if you have to run multiple 
RFC-1918 domains to get enough addresses, that will generally be less 
complicated and break fewer things than a NAT64 implementation.

Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Tim Chown
Thanks for the comments Ray, a couple of comments in-line.

On 26 Jan 2012, at 12:43, Ray Soucy wrote:

 Local traffic shouldn't need to touch the CPE regardless of ULA or
 GUA.  Also note that we already have the link local scope for traffic
 between hosts on the same link (which is all hosts in a typical home
 network); ULA only becomes useful if routing is involved which is not
 the typical deployment for the home.

The assumption in homenet is that it will become so.

 ULA is useful, on the other hand, if NPT is used.  NPT is not NAT, and
 doesn't have any of the nastiness of NAT.

Well, you still have address rewriting, but prefix-based.

 I think a lot of the question has to do with what the role of CPE will
 be going forward.  As long as we're talking dual-stack, having
 operational consistency between IPv4 and IPv6 makes sense.  If it's an
 IPv6-only environment, then things become a lot more flexible (do we
 even need CPE to include a firewall, or do we say host-based firewalls
 are sufficient, for example).

The initial assumption in homenet is a stateful firewall with hosts inside the 
homenet using PCP or something similar.

Tim


Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Jima
On 2012-01-26, Owen DeLong wrote:
 If you can't point to some specific advantage of ULA over secondary
 non-routed GUA prefixes, then, ULA doesn't have a reason to live.

 My biggest concern with secondary non-routed GUA would be source address
selection.  If you're trying to talk to something in 2000::/3, it's
obvious to the OS that it should be using its address in 2000::/3 rather
than the one in fc00::/7.  When both the external and internal
addresses live in 2000::/3, more care has to be taken to ensure the
system DTRT.

 I'm not sure where DNS64/NAT64 comes into play here for v6 to v6
 communication. For IPv4, I don't see any advantage in ULA+NAT64 vs. the
 more reliable and easier RFC-1918 with NAT44 possibilities, even if you
 have to run multiple RFC-1918 domains to get enough addresses, that will
 generally be less complicated and break fewer things than a NAT64
 implementation.

 My best guess there is the ability to a) only manage a single-stack
network (I really wish more software supported IPv6 so this could be a
more feasible reality), and b) use the same NAT64 prefix across various
NAT64 instances (64:ff9b::/96 is a blocker if you actually want to allow
NAT64 to RFC1918 space).  While I can see the potential appeal of the
second point, I'm not sure I'd agree with it myself.

 Jima




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Cameron Byrne
On Jan 26, 2012 5:49 AM, Owen DeLong o...@delong.com wrote:


 On Jan 26, 2012, at 2:00 AM, George Bonser wrote:

  Use different GUA ranges for internal and external. It's easy enough to
  get an additional prefix.
 
  As others have mentioned, things like management interfaces on access
  switches, printers, and IP phones would be good candidates to hide with
  ULA.
 
  Or non-advertised, filtered GUA. Works just as well either way.
 
  Owen
 
 
  If one is obtaining another prefix for local addressing, I see no
benefit.  I am assuming that anyone that is using ULA is using it for
things that don't communicate off the site such as management interfaces of
things, etc.  This won't be a subnet you are connecting by VPN to another
organization, usually, but even if you do the chances of collision is
pretty low if you select your nets properly.  But for the most absolutely
paranoid site, I can see some appeal in using ULA in conjunction with
DNS64/NAT64 and see them giving the devices internet access via v4.  Not
that I agree with the notion, mind you, just that I can see someone looking
at that as an appealing solution for some things.  Even if someone managed
to get through the NAT device via v4, they would have nothing to talk to on
the other side as the other side is all v6.
 

 Even if you don't see an advantage to GUA, can you point to a
disadvantage?

 IMHO, it would be far less wasteful of addressing overall to deprecate
fc00::/7 and use unique secondary GUA prefixes for this purpose than to use
ULA.

 If you can't point to some specific advantage of ULA over secondary
non-routed GUA prefixes, then, ULA doesn't have a reason to live.


1. You don't want to disclose what addresses you are using on your internal
network, including to the  rir

2. You require or desire an address plan that your rir may consider
wasteful.

3. You don't want to talk to an rir for a variety of personal or business
process  reasons

4.  When troubleshooting both with network engineers familiar with the
network as well as tac engineers,  seeing the network for the first time,
ula sticks out like a sore thumb and can lead to some meaningful and
clarifying discussions about the devices and flows.

5. Routes and packets leak. Filtering at the perimeter? Which perimeter?
Mistakes happen. Ula provides a reasonable assumption that the ISP will not
route the leaked packets. It is one of many possible layers of security and
fail-safes.

Cb

 I'm not sure where DNS64/NAT64 comes into play here for v6 to v6
communication. For IPv4, I don't see any advantage in ULA+NAT64 vs. the
more reliable and easier RFC-1918 with NAT44 possibilities, even if you
have to run multiple RFC-1918 domains to get enough addresses, that will
generally be less complicated and break fewer things than a NAT64
implementation.

 Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Ray Soucy
Inline

On Thu, Jan 26, 2012 at 9:05 AM, Tim Chown t...@ecs.soton.ac.uk wrote:
 Thanks for the comments Ray, a couple of comments in-line.

 On 26 Jan 2012, at 12:43, Ray Soucy wrote:

 Local traffic shouldn't need to touch the CPE regardless of ULA or
 GUA.  Also note that we already have the link local scope for traffic
 between hosts on the same link (which is all hosts in a typical home
 network); ULA only becomes useful if routing is involved which is not
 the typical deployment for the home.

 The assumption in homenet is that it will become so.

Does this mean we're also looking at residential allocations larger
than a /64 as the norm?

 ULA is useful, on the other hand, if NPT is used.  NPT is not NAT, and
 doesn't have any of the nastiness of NAT.

 Well, you still have address rewriting, but prefix-based.

I think that the port rewriting, and as a consequence not being able
to map to specific hosts easily, was the bigger problem with NAT.

As for the comments made by others regarding helpers for NAT, there
really aren't many that are needed aside from older pre-NAT protocols
like H.323 which decided it would be a good idea to use the IP in the
packet payload for authentication.  Thankfully, over a decade of NAT
has helped end this practice.

 I think a lot of the question has to do with what the role of CPE will
 be going forward.  As long as we're talking dual-stack, having
 operational consistency between IPv4 and IPv6 makes sense.  If it's an
 IPv6-only environment, then things become a lot more flexible (do we
 even need CPE to include a firewall, or do we say host-based firewalls
 are sufficient, for example).

 The initial assumption in homenet is a stateful firewall with hosts inside 
 the homenet using PCP or something similar.

 Tim

So a CPE device with a stateful firewall that accepts a prefix via
DHCPv6-PD and makes use of SLAAC for internal network(s) is the
foundation, correct?

Then use random a ULA allocation that exists to route internally
(sounds a lot like a site-local scope; which I never understood the
reason we abandoned).

I'm just not seeing the value in adding ULA as a requirement unless
bundled with NPT for a multi-homed environment, especially if a
stateful firewall is already included.  If anything, it might slow
down adoption due to increased complexity.

-- 
Ray Soucy

Epic Communications Specialist

Phone: +1 (207) 561-3526

Networkmaine, a Unit of the University of Maine System
http://www.networkmaine.net/



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Owen DeLong

On Jan 26, 2012, at 6:39 AM, Jima wrote:

 On 2012-01-26, Owen DeLong wrote:
 If you can't point to some specific advantage of ULA over secondary
 non-routed GUA prefixes, then, ULA doesn't have a reason to live.
 
 My biggest concern with secondary non-routed GUA would be source address
 selection.  If you're trying to talk to something in 2000::/3, it's
 obvious to the OS that it should be using its address in 2000::/3 rather
 than the one in fc00::/7.  When both the external and internal
 addresses live in 2000::/3, more care has to be taken to ensure the
 system DTRT.
 

It's very easy to configure SAS to handle this. Frankly, you have the same 
challenge with ULA in many scenarios.

 I'm not sure where DNS64/NAT64 comes into play here for v6 to v6
 communication. For IPv4, I don't see any advantage in ULA+NAT64 vs. the
 more reliable and easier RFC-1918 with NAT44 possibilities, even if you
 have to run multiple RFC-1918 domains to get enough addresses, that will
 generally be less complicated and break fewer things than a NAT64
 implementation.
 
 My best guess there is the ability to a) only manage a single-stack
 network (I really wish more software supported IPv6 so this could be a
 more feasible reality), and b) use the same NAT64 prefix across various
 NAT64 instances (64:ff9b::/96 is a blocker if you actually want to allow
 NAT64 to RFC1918 space).  While I can see the potential appeal of the
 second point, I'm not sure I'd agree with it myself.
 

But with NAT64, you're supporting both stacks, you just move the problem around.

Having done experiments with both methods, I assure you it is a true statement 
based on experience. NAT64 really offers more problems than it solves, not the 
least of which is the stateful DNS interaction problem.


Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Owen DeLong

On Jan 26, 2012, at 7:35 AM, Cameron Byrne wrote:

 
 On Jan 26, 2012 5:49 AM, Owen DeLong o...@delong.com wrote:
 
 
  On Jan 26, 2012, at 2:00 AM, George Bonser wrote:
 
   Use different GUA ranges for internal and external. It's easy enough to
   get an additional prefix.
  
   As others have mentioned, things like management interfaces on access
   switches, printers, and IP phones would be good candidates to hide with
   ULA.
  
   Or non-advertised, filtered GUA. Works just as well either way.
  
   Owen
  
  
   If one is obtaining another prefix for local addressing, I see no 
   benefit.  I am assuming that anyone that is using ULA is using it for 
   things that don't communicate off the site such as management interfaces 
   of things, etc.  This won't be a subnet you are connecting by VPN to 
   another organization, usually, but even if you do the chances of 
   collision is pretty low if you select your nets properly.  But for the 
   most absolutely paranoid site, I can see some appeal in using ULA in 
   conjunction with DNS64/NAT64 and see them giving the devices internet 
   access via v4.  Not that I agree with the notion, mind you, just that I 
   can see someone looking at that as an appealing solution for some things. 
Even if someone managed to get through the NAT device via v4, they would 
   have nothing to talk to on the other side as the other side is all v6.
  
 
  Even if you don't see an advantage to GUA, can you point to a disadvantage?
 
  IMHO, it would be far less wasteful of addressing overall to deprecate 
  fc00::/7 and use unique secondary GUA prefixes for this purpose than to use 
  ULA.
 
  If you can't point to some specific advantage of ULA over secondary 
  non-routed GUA prefixes, then, ULA doesn't have a reason to live.
 
 
 1. You don't want to disclose what addresses you are using on your internal 
 network, including to the  rir
 
Seriously?
 2. You require or desire an address plan that your rir may consider wasteful.
 
Have you looked at current IPv6 policies? It's pretty hard to imagine 
implementing one.
 3. You don't want to talk to an rir for a variety of personal or business 
 process  reasons
 
Meh. I have little or no sympathy for this.
 4.  When troubleshooting both with network engineers familiar with the 
 network as well as tac engineers,  seeing the network for the first time,  
 ula sticks out like a sore thumb and can lead to some meaningful and 
 clarifying discussions about the devices and flows.
 
I can see this, but, to me it seems like a double edged sword. Most things that 
stick out like a sore thumb are inflamed and painful. I don't see this as an 
exception.
 5. Routes and packets leak. Filtering at the perimeter? Which perimeter? 
 Mistakes happen. Ula provides a reasonable assumption that the ISP will not 
 route the leaked packets. It is one of many possible layers of security and 
 fail-safes.
 
Routes only leak if the routes exist on the border routers in the first place. 
If I were using multiple GUA prefixes and one was intended not to cross the 
border, I wouldn't feed it to the border routers to begin with. You can't leak 
what you don't know.

Owen



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Owen DeLong

On Jan 26, 2012, at 8:14 AM, Ray Soucy wrote:

 Inline
 
 On Thu, Jan 26, 2012 at 9:05 AM, Tim Chown t...@ecs.soton.ac.uk wrote:
 Thanks for the comments Ray, a couple of comments in-line.
 
 On 26 Jan 2012, at 12:43, Ray Soucy wrote:
 
 Local traffic shouldn't need to touch the CPE regardless of ULA or
 GUA.  Also note that we already have the link local scope for traffic
 between hosts on the same link (which is all hosts in a typical home
 network); ULA only becomes useful if routing is involved which is not
 the typical deployment for the home.
 
 The assumption in homenet is that it will become so.
 
 Does this mean we're also looking at residential allocations larger
 than a /64 as the norm?
 

We certainly should be. I still think that /48s for residential is the right 
answer.

My /48 is working quite nicely in my house.

 ULA is useful, on the other hand, if NPT is used.  NPT is not NAT, and
 doesn't have any of the nastiness of NAT.
 
 Well, you still have address rewriting, but prefix-based.
 
 I think that the port rewriting, and as a consequence not being able
 to map to specific hosts easily, was the bigger problem with NAT.
 

No, the need for ALGs is the biggest problem with NAT. NPT does not resolve 
that issue.

Yes, port rewriting and other issues are also problematic, but, they are less 
problematic than the need for ALGs.

 As for the comments made by others regarding helpers for NAT, there
 really aren't many that are needed aside from older pre-NAT protocols
 like H.323 which decided it would be a good idea to use the IP in the
 packet payload for authentication.  Thankfully, over a decade of NAT
 has helped end this practice.

Yes, it has blocked innovation in protocols that can't easily engineer around 
NAT. Hopefully we can stop doing that soon.

 
 I think a lot of the question has to do with what the role of CPE will
 be going forward.  As long as we're talking dual-stack, having
 operational consistency between IPv4 and IPv6 makes sense.  If it's an
 IPv6-only environment, then things become a lot more flexible (do we
 even need CPE to include a firewall, or do we say host-based firewalls
 are sufficient, for example).
 
 The initial assumption in homenet is a stateful firewall with hosts inside 
 the homenet using PCP or something similar.
 
 Tim
 
 So a CPE device with a stateful firewall that accepts a prefix via
 DHCPv6-PD and makes use of SLAAC for internal network(s) is the
 foundation, correct?
 

I would expect it to be a combination of SLAAC, DHCPv6, and/or DHCPv6-PD. Which 
combination may be vendor dependent, but, hopefully the norm will include 
support for downstream routers and possibly chosen address style configuration 
(allowing the user to pick an address for their host and configure it at the 
CPE) which would require DHCP support.

 Then use random a ULA allocation that exists to route internally
 (sounds a lot like a site-local scope; which I never understood the
 reason we abandoned).
 

I can actually see this as a reasonable use of ULA, but, I agree site-local 
scope would have been a better choice. The maybe you can maybe you cant route 
it nature of ULA is, IMHO it's only advantage over site-local and at the same 
time the greatest likelihood that it will be misused in a variety of harmful 
ways, not the least of which is to bring the brain-damage of NAT forward into 
the IPv6 enterprise.

 I'm just not seeing the value in adding ULA as a requirement unless
 bundled with NPT for a multi-homed environment, especially if a
 stateful firewall is already included.  If anything, it might slow
 down adoption due to increased complexity.

I don't believe it adds visible complexity. I think it should be relatively 
transparent to the end-user.

Basically, you have one prefix for communications within the house (ULA) and 
another prefix for communications outside. The prefix for external sessions may 
not be stable (may change periodically for operational or German reasons), but, 
the internal prefix remains stable and you can depend on it for configuring 
access to (e.g. printers, etc.).

Sure, service discovery (mDNS, et. al) should obviate the need for most such 
configuration, but, there will likely always be something that doesn't quite 
get SD right somehow.

Also, the ULA addresses don't mysteriously stop working when your connection to 
your ISP goes down, so, at least your LAN stuff doesn't die from ISP death.

Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Douglas Otis

On 1/26/12 7:35 AM, Cameron Byrne wrote:

 1. You don't want to disclose what addresses you are using on your
 internal network, including to the rir

 2. You require or desire an address plan that your rir may consider
 wasteful.

 3. You don't want to talk to an rir for a variety of personal or
 business process reasons

 4. When troubleshooting both with network engineers familiar with
 the network as well as tac engineers, seeing the network for the
 first time, ula sticks out like a sore thumb and can lead to some
 meaningful and clarifying discussions about the devices and flows.

 5. Routes and packets leak. Filtering at the perimeter? Which
 perimeter? Mistakes happen. Ula provides a reasonable assumption that
 the ISP will not route the leaked packets. It is one of many possible
 layers of security and fail-safes.

 Cb

Dear Cameron,

For a reference to something taking advantage of ULAs per RFC4193 See:
http://tools.ietf.org/html/rfc6281#page-11

Regards,
Doug Otis





Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Cameron Byrne
On Jan 26, 2012 8:44 AM, Owen DeLong o...@delong.com wrote:


 On Jan 26, 2012, at 6:39 AM, Jima wrote:

  On 2012-01-26, Owen DeLong wrote:
  If you can't point to some specific advantage of ULA over secondary
  non-routed GUA prefixes, then, ULA doesn't have a reason to live.
 
  My biggest concern with secondary non-routed GUA would be source address
  selection.  If you're trying to talk to something in 2000::/3, it's
  obvious to the OS that it should be using its address in 2000::/3 rather
  than the one in fc00::/7.  When both the external and internal
  addresses live in 2000::/3, more care has to be taken to ensure the
  system DTRT.
 

 It's very easy to configure SAS to handle this. Frankly, you have the
same challenge with ULA in many scenarios.

  I'm not sure where DNS64/NAT64 comes into play here for v6 to v6
  communication. For IPv4, I don't see any advantage in ULA+NAT64 vs. the
  more reliable and easier RFC-1918 with NAT44 possibilities, even if you
  have to run multiple RFC-1918 domains to get enough addresses, that
will
  generally be less complicated and break fewer things than a NAT64
  implementation.
 
  My best guess there is the ability to a) only manage a single-stack
  network (I really wish more software supported IPv6 so this could be a
  more feasible reality), and b) use the same NAT64 prefix across various
  NAT64 instances (64:ff9b::/96 is a blocker if you actually want to allow
  NAT64 to RFC1918 space).  While I can see the potential appeal of the
  second point, I'm not sure I'd agree with it myself.
 

 But with NAT64, you're supporting both stacks, you just move the problem
around.

 Having done experiments with both methods, I assure you it is a true
statement based on experience. NAT64 really offers more problems than it
solves, not the least of which is the stateful DNS interaction problem.


I have a very different opinion. Nat64/ dns64 fits my needs great

Horses for courses.

Cb

 Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Cameron Byrne
On Jan 26, 2012 8:49 AM, Owen DeLong o...@delong.com wrote:


 On Jan 26, 2012, at 7:35 AM, Cameron Byrne wrote:


 On Jan 26, 2012 5:49 AM, Owen DeLong o...@delong.com wrote:
 
 
  On Jan 26, 2012, at 2:00 AM, George Bonser wrote:
 
   Use different GUA ranges for internal and external. It's easy
enough to
   get an additional prefix.
  
   As others have mentioned, things like management interfaces on
access
   switches, printers, and IP phones would be good candidates to hide
with
   ULA.
  
   Or non-advertised, filtered GUA. Works just as well either way.
  
   Owen
  
  
   If one is obtaining another prefix for local addressing, I see no
benefit.  I am assuming that anyone that is using ULA is using it for
things that don't communicate off the site such as management interfaces of
things, etc.  This won't be a subnet you are connecting by VPN to another
organization, usually, but even if you do the chances of collision is
pretty low if you select your nets properly.  But for the most absolutely
paranoid site, I can see some appeal in using ULA in conjunction with
DNS64/NAT64 and see them giving the devices internet access via v4.  Not
that I agree with the notion, mind you, just that I can see someone looking
at that as an appealing solution for some things.  Even if someone managed
to get through the NAT device via v4, they would have nothing to talk to on
the other side as the other side is all v6.
  
 
  Even if you don't see an advantage to GUA, can you point to a
disadvantage?
 
  IMHO, it would be far less wasteful of addressing overall to deprecate
fc00::/7 and use unique secondary GUA prefixes for this purpose than to use
ULA.
 
  If you can't point to some specific advantage of ULA over secondary
non-routed GUA prefixes, then, ULA doesn't have a reason to live.
 

 1. You don't want to disclose what addresses you are using on your
internal network, including to the  rir

 Seriously?


Yes.

 2. You require or desire an address plan that your rir may consider
wasteful.

 Have you looked at current IPv6 policies? It's pretty hard to imagine
implementing one.


Yes. Think m2m as 1 example

 3. You don't want to talk to an rir for a variety of personal or
business process  reasons

 Meh. I have little or no sympathy for this.


Of course. The view from inside the system is different from outside the
system.

 4.  When troubleshooting both with network engineers familiar with the
network as well as tac engineers,  seeing the network for the first time,
ula sticks out like a sore thumb and can lead to some meaningful and
clarifying discussions about the devices and flows.

 I can see this, but, to me it seems like a double edged sword. Most
things that stick out like a sore thumb are inflamed and painful. I don't
see this as an exception.


Ymmv

 5. Routes and packets leak. Filtering at the perimeter? Which perimeter?
Mistakes happen. Ula provides a reasonable assumption that the ISP will not
route the leaked packets. It is one of many possible layers of security and
fail-safes.

 Routes only leak if the routes exist on the border routers in the first
place. If I were using multiple GUA prefixes and one was intended not to
cross the border, I wouldn't feed it to the border routers to begin with.
You can't leak what you don't know.


Like many things, we can disagree on this too. Net net, folks need to
consider their own requirements. Ula is a tool. If it has a place in your
toolbox, great .

Cb
 Owen



RE: using ULA for 'hidden' v6 devices?

2012-01-26 Thread George Bonser
 Even if you don't see an advantage to GUA, can you point to a
 disadvantage?

Just a matter of convenience.  If you have a lot of management IPs or some 
other IP addresses that are never going to need internet access (an array of 
10,000 sensors or something) you don't need to dip into your global allocation 
to address them.  If it is routed within the organization but never goes to the 
Internet, ULA is ok.  If it doesn't get routed at all, link local will do fine. 
  It's good to keep in mind that more things than computers with web browsers 
are going to get an IP address.

 IMHO, it would be far less wasteful of addressing overall to deprecate
 fc00::/7 and use unique secondary GUA prefixes for this purpose than to
 use ULA.

Possibly so.  I do, however, see some utility in having a block of addresses 
that can't be reliably routed over the Internet.  Heck, for traffic that might 
get routed within a site between local networks but not routed off the site 
(even within the organization's network between sites), there's some utility of 
having each site use the same subnet.  That would ensure that traffic destined 
for that address range doesn't leave the site regardless of any configuration 
errors someone might make in filtration.  

 If you can't point to some specific advantage of ULA over secondary
 non-routed GUA prefixes, then, ULA doesn't have a reason to live.

The only advantage is using an address range that can't be reliably routed over 
the Internet and that is important in the minds of some.  GUA addresses can be 
reliably routed, that's their purpose.  While there is a possibility ULA could 
possibly be routed over the internet, the cascade of mistakes that it would 
take for that to happen makes it unlikely.  I don't accept ULA routes at my 
peering/transit routers and I would imagine most other networks are configured 
the same.  In addition, I have the entire block of space static routed to null0 
so even if I do get traffic for it (in either direction, in or out), it just 
goes into the hole.  

 I'm not sure where DNS64/NAT64 comes into play here for v6 to v6
 communication. 

No, I wasn't intending that for v6 to v6.  Let's say you have some devices that 
you want to give ULA but they *will* need Internet access infrequently for 
something such as software updates or statistics reporting or something.  You 
could arrange to do that using NAT64/DNS64 to a v4 destination.  Again, I am 
not advocating configuring such a thing, it's just a thought experiment where 
I'm trying to anticipate what some clever network might do at some point and 
the sorts of issues we might run into.

For example, there are a lot of places that have policies that mandate certain 
systems may not use public address space.  Those policies were developed by 
corporate bureaucrats, not engineers.  The engineers don't make policy but are 
tasked to implement policy and there are probably many creative ways in which 
those policy goals will be met.

If they use v6 ULA but infrequently need to reach someone offsite, they might 
be tempted to use NAT64 to reach it.  It isn't so much about providing 
security as it is providing barriers to making unwanted traffic easy to 
route.  If you pick an address range that isn't routable in a predictable 
fashion, it just adds another barrier of entry.  It is like living in a town 
named One Way Street.  People see signs pointing toward it all over the place 
but following them leads you no closer to your destination.  If you use GUA, 
one mistake could make something very reliably reachable by the entire world.  
That scares some people.  The consensus should be that the contingency plan be, 
as someone else mentioned, don't make mistakes.  Well, people make em all the 
time.   I would rather get a call from a peer complaining about receiving a ULA 
route than learning that someone accidently opened up an important internal FTP 
site to the world.

Let me turn it around.  What advantage does GUA give you for a subnet that is 
never going to communicate outside the organization?  Configuring LUA is no 
more or less difficult than GUA.  

 For IPv4, I don't see any advantage in ULA+NAT64 vs. the
 more reliable and easier RFC-1918 with NAT44 possibilities, even if you
 have to run multiple RFC-1918 domains to get enough addresses, that
 will generally be less complicated and break fewer things than a NAT64
 implementation.

Agreed.  For v4 to v4 that will likely be the case for years.



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Tim Chown

On 26 Jan 2012, at 16:53, Owen DeLong wrote:

 On Jan 26, 2012, at 8:14 AM, Ray Soucy wrote:
 
 Does this mean we're also looking at residential allocations larger
 than a /64 as the norm?
 
 
 We certainly should be. I still think that /48s for residential is the right 
 answer.
 
 My /48 is working quite nicely in my house.

There seems to be a lot of discussion happening around a /60 or /56.  I 
wouldn't assume a /48 for residential networks, or a static prefix.

 So a CPE device with a stateful firewall that accepts a prefix via
 DHCPv6-PD and makes use of SLAAC for internal network(s) is the
 foundation, correct?
 
 I would expect it to be a combination of SLAAC, DHCPv6, and/or DHCPv6-PD. 
 Which combination may be vendor dependent, but, hopefully the norm will 
 include support for downstream routers and possibly chosen address style 
 configuration (allowing the user to pick an address for their host and 
 configure it at the CPE) which would require DHCP support.

Yes, the assumption is multi-subnet in the homenet, with a method for 
(efficient) prefix delegation internally.

 Then use random a ULA allocation that exists to route internally
 (sounds a lot like a site-local scope; which I never understood the
 reason we abandoned).
 
 I can actually see this as a reasonable use of ULA, but, I agree site-local 
 scope would have been a better choice. The maybe you can maybe you cant route 
 it nature of ULA is, IMHO it's only advantage over site-local and at the same 
 time the greatest likelihood that it will be misused in a variety of harmful 
 ways, not the least of which is to bring the brain-damage of NAT forward into 
 the IPv6 enterprise.

Site-locals didn't include the random prefix element, thus increasing the 
chance of collision should two site-local sites communicate.  See RFC3879 for 
the issues.

 I'm just not seeing the value in adding ULA as a requirement unless
 bundled with NPT for a multi-homed environment, especially if a
 stateful firewall is already included.  If anything, it might slow
 down adoption due to increased complexity.
 
 I don't believe it adds visible complexity. I think it should be relatively 
 transparent to the end-user.
 
 Basically, you have one prefix for communications within the house (ULA) and 
 another prefix for communications outside. The prefix for external sessions 
 may not be stable (may change periodically for operational or German 
 reasons), but, the internal prefix remains stable and you can depend on it 
 for configuring access to (e.g. printers, etc.).
 
 Sure, service discovery (mDNS, et. al) should obviate the need for most such 
 configuration, but, there will likely always be something that doesn't quite 
 get SD right somehow.
 
 Also, the ULA addresses don't mysteriously stop working when your connection 
 to your ISP goes down, so, at least your LAN stuff doesn't die from ISP death.

Consider also long-lived connections for example.  

I don't think there's a conclusion as yet in homenet about ULAs, nor will a 
conclusion prevent people doing as they please if they really want to.

Tim


Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Chuck Anderson
On Thu, Jan 26, 2012 at 07:53:18PM +, George Bonser wrote:
  Even if you don't see an advantage to GUA, can you point to a
  disadvantage?
 
 Just a matter of convenience.  If you have a lot of management IPs or some 
 other IP addresses that are never going to need internet access (an array of 
 10,000 sensors or something) you don't need to dip into your global 
 allocation to address them.  If it is routed within the organization but 
 never goes to the Internet, ULA is ok.  If it doesn't get routed at all, link 
 local will do fine.   It's good to keep in mind that more things than 
 computers with web browsers are going to get an IP address.

Link-local won't do fine in many cases due to poor application
compatibilty with address scopes.



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Mark Andrews

In message 20120127015842.gh6...@angus.ind.wpi.edu, Chuck Anderson writes:
 On Thu, Jan 26, 2012 at 07:53:18PM +, George Bonser wrote:
   Even if you don't see an advantage to GUA, can you point to a
   disadvantage?
  
  Just a matter of convenience.  If you have a lot of management IPs or some 
 other IP addresses that are never going to need internet access (an array of 
 10,000 sensors or something) you don't need to dip into your global allocatio
 n to address them.  If it is routed within the organization but never goes to
  the Internet, ULA is ok.  If it doesn't get routed at all, link local will d
 o fine.   It's good to keep in mind that more things than computers with web 
 browsers are going to get an IP address.
 
 Link-local won't do fine in many cases due to poor application
 compatibilty with address scopes.

Link local is a right royal pain for applications.  The DNS does
not support it.  It requires passing arount 150 bits of address
information instead of 128.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Owen DeLong

On Jan 26, 2012, at 3:31 PM, Tim Chown wrote:

 
 On 26 Jan 2012, at 16:53, Owen DeLong wrote:
 
 On Jan 26, 2012, at 8:14 AM, Ray Soucy wrote:
 
 Does this mean we're also looking at residential allocations larger
 than a /64 as the norm?
 
 
 We certainly should be. I still think that /48s for residential is the right 
 answer.
 
 My /48 is working quite nicely in my house.
 
 There seems to be a lot of discussion happening around a /60 or /56.  I 
 wouldn't assume a /48 for residential networks, or a static prefix.
 

I wouldn't assume anything. That doesn't change the fact that it is, really, 
the best thing to do.

 So a CPE device with a stateful firewall that accepts a prefix via
 DHCPv6-PD and makes use of SLAAC for internal network(s) is the
 foundation, correct?
 
 I would expect it to be a combination of SLAAC, DHCPv6, and/or DHCPv6-PD. 
 Which combination may be vendor dependent, but, hopefully the norm will 
 include support for downstream routers and possibly chosen address style 
 configuration (allowing the user to pick an address for their host and 
 configure it at the CPE) which would require DHCP support.
 
 Yes, the assumption is multi-subnet in the homenet, with a method for 
 (efficient) prefix delegation internally.
 

Where the definition of (efficient) is highly flexible and almost certainly 
does not refer to bit conservation.

 Then use random a ULA allocation that exists to route internally
 (sounds a lot like a site-local scope; which I never understood the
 reason we abandoned).
 
 I can actually see this as a reasonable use of ULA, but, I agree site-local 
 scope would have been a better choice. The maybe you can maybe you cant 
 route it nature of ULA is, IMHO it's only advantage over site-local and at 
 the same time the greatest likelihood that it will be misused in a variety 
 of harmful ways, not the least of which is to bring the brain-damage of NAT 
 forward into the IPv6 enterprise.
 
 Site-locals didn't include the random prefix element, thus increasing the 
 chance of collision should two site-local sites communicate.  See RFC3879 for 
 the issues.
 

True, but, it would have been easy enough to correct that or provide registered 
site-specific site local addressing if that was desired.

 I'm just not seeing the value in adding ULA as a requirement unless
 bundled with NPT for a multi-homed environment, especially if a
 stateful firewall is already included.  If anything, it might slow
 down adoption due to increased complexity.
 
 I don't believe it adds visible complexity. I think it should be relatively 
 transparent to the end-user.
 
 Basically, you have one prefix for communications within the house (ULA) and 
 another prefix for communications outside. The prefix for external sessions 
 may not be stable (may change periodically for operational or German 
 reasons), but, the internal prefix remains stable and you can depend on it 
 for configuring access to (e.g. printers, etc.).
 
 Sure, service discovery (mDNS, et. al) should obviate the need for most such 
 configuration, but, there will likely always be something that doesn't quite 
 get SD right somehow.
 
 Also, the ULA addresses don't mysteriously stop working when your connection 
 to your ISP goes down, so, at least your LAN stuff doesn't die from ISP 
 death.
 
 Consider also long-lived connections for example.  
 

Long lived connections are still doomed unless you go to the complexity of 
BGP-based multihoming, LISP, or something similar to one of those two. 
Personally, I use BGP multihoming for my home and it's working pretty well. 
YMMV.

 I don't think there's a conclusion as yet in homenet about ULAs, nor will a 
 conclusion prevent people doing as they please if they really want to.
 

Sad, but true.

Owen




Re: using ULA for 'hidden' v6 devices?

2012-01-26 Thread Valdis . Kletnieks
On Thu, 26 Jan 2012 19:47:15 PST, Owen DeLong said:
 Where the definition of (efficient) is highly flexible and almost
 certainly does not refer to bit conservation.

There's a reason we put 128 bits in there. :)


pgpZa0WH9QExQ.pgp
Description: PGP signature


Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Cameron Byrne
On Jan 25, 2012 7:52 AM, Justin M. Streiner strei...@cluebyfour.org
wrote:

 Is anyone using ULA (RFC 4193) address space for v6 infrastructure that
does not need to be exposed to the outside world?  I understand the concept
of having fc00::/8 being doled out by the RIRs never went anywhere, and
using space out of fd00::/8 can be a bit of a crap-shoot because of the
likelihood of many organizations that do so not following the algorithm for
picking a /48 that is outlined in the RFC.

 There would appear to be reasonable arguments for and against using ULA.
I'm just curious about what people are doing in practice.


Yes. Uses may include the DNS  interface that you only want your customers
to query or pretty much any service, as you said, that does not need to
be connected to the internet.

Beware of ULA haters.

Cb

 jms



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Jay Ford

On Wed, 25 Jan 2012, Justin M. Streiner wrote:
Is anyone using ULA (RFC 4193) address space for v6 infrastructure that does 
not need to be exposed to the outside world?  I understand the concept of 
having fc00::/8 being doled out by the RIRs never went anywhere, and using 
space out of fd00::/8 can be a bit of a crap-shoot because of the likelihood 
of many organizations that do so not following the algorithm for picking a 
/48 that is outlined in the RFC.


There would appear to be reasonable arguments for and against using ULA. I'm 
just curious about what people are doing in practice.


Yep.  It works great for strictly local devices which don't need Internet 
access.



Jay Ford, Network Engineering Group, Information Technology Services
University of Iowa, Iowa City, IA 52242
email: jay-f...@uiowa.edu, phone: 319-335-, fax: 319-335-2951



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Dale W. Carder

On Jan 25, 2012, at 9:51 AM, Justin M. Streiner wrote:
 Is anyone using ULA (RFC 4193) address space for v6 infrastructure that does 
 not need to be exposed to the outside world?  I understand the concept of 
 having fc00::/8 being doled out by the RIRs never went anywhere, and using 
 space out of fd00::/8 can be a bit of a crap-shoot because of the likelihood 
 of many organizations that do so not following the algorithm for picking a 
 /48 that is outlined in the RFC.
 
 There would appear to be reasonable arguments for and against using ULA. I'm 
 just curious about what people are doing in practice.

Our site would be in the against ULA camp.  For that matter we had
survived until very recently in the anti-1918 camp, too.  So, take
that as an inherent bias.

We have one customer in particular with a substantial non-publicly 
reachable v6 deployment with globally assigned addresses.  I believe
there is no need to replicate the headaches of rfc1918 in the next 
address-family eternity. 

Dale



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Ray Soucy
We've used RFC1918 space for years (without NAT) for non-routed device
management (switches, printers, IP phones, etc).

The same idea applies to ULA.  Just another tool in the box.

The idea behind the random bits was to avoid conflicts should organizations
making use of ULA merge.

Locally managed means locally manage, though.  The RFC is more of
a suggestion than a requirement at that point.

Since it's unenforceable, and the standards require it
to function regardless, I do suspect that many will opt for a random
value of zero to keep the notation short and sweet, despite the RFC, or
develop an internal addressing schema for ULA space that works for them
operationally.




On Wed, Jan 25, 2012 at 10:51 AM, Justin M. Streiner 
strei...@cluebyfour.org wrote:

 Is anyone using ULA (RFC 4193) address space for v6 infrastructure that
 does not need to be exposed to the outside world?  I understand the concept
 of having fc00::/8 being doled out by the RIRs never went anywhere, and
 using space out of fd00::/8 can be a bit of a crap-shoot because of the
 likelihood of many organizations that do so not following the algorithm for
 picking a /48 that is outlined in the RFC.

 There would appear to be reasonable arguments for and against using ULA.
 I'm just curious about what people are doing in practice.

 jms




-- 
Ray Soucy

Epic Communications Specialist

Phone: +1 (207) 561-3526

Networkmaine, a Unit of the University of Maine System
http://www.networkmaine.net/


Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Dave Pooser
On 1/25/12 10:28 AM, Nick Hilliard n...@foobar.org wrote:

I wish you luck selling this notion to enterprise network people, most of
who appear to believe that rfc1918 address space is a feature, not a bug.

Until they've gone through an MA where they had to connect multiple sites
using overlapping RFC1918 space, of course. Then the idea of globally
unique addressing, even if it's not globally routable, starts looking
awfully useful.
-- 
Dave Pooser
Manager of Information Services
Alford Media  http://www.alfordmedia.com





Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Justin M. Streiner

On Wed, 25 Jan 2012, Ray Soucy wrote:


We've used RFC1918 space for years (without NAT) for non-routed device
management (switches, printers, IP phones, etc).


And we've done the same.


The idea behind the random bits was to avoid conflicts should organizations
making use of ULA merge.


I'm also thinking down the road to possible cases where an internal host 
needs to be able to communicate with an internal host at another 
organization over a VPN tunnel, and a convincing argument can't be made 
for using public addresses - something that's pretty common today in 
the v4 world.  The thought of having to something equivalent to NAT-T for 
v6 doesn't fill my heart (or my VPN termination devices) with joy...


Along somewhat similar lines, I don't know if any of the relevant 
regulatory bodies have made any specific comments related to securing 
networks that are interconnected using v6.  Also being in the higher-ed 
world, I'm thinking along the lines of HIPAA, GLB, SOX, and friends.  The 
answer might be out there - I just haven't looked into it yet.



Locally managed means locally manage, though.  The RFC is more of
a suggestion than a requirement at that point.


Right, though it's a shame that the registry-assigned ULA concept didn't 
take off.



Since it's unenforceable, and the standards require it
to function regardless, I do suspect that many will opt for a random
value of zero to keep the notation short and sweet, despite the RFC, or
develop an internal addressing schema for ULA space that works for them
operationally.


So it stands a good chance of turning into the wild west ;)

jms



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Justin M. Streiner

On Wed, 25 Jan 2012, Dale W. Carder wrote:


We have one customer in particular with a substantial non-publicly
reachable v6 deployment with globally assigned addresses.  I believe
there is no need to replicate the headaches of rfc1918 in the next
address-family eternity.


The one big issue I could see with doing that is that the vulnerability 
exposure, particularly from the outside world, is larger if devices that 
don't need public addresses have them.  For example, if a network engineer 
or NOC person accidentally removes a hide my public infrastructure from 
the outside world from an interface on a border router...


As others have mentioned, things like management interfaces on access 
switches, printers, and IP phones would be good candidates to hide with 
ULA.


jms



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Ray Soucy
On Wed, Jan 25, 2012 at 12:55 PM, Justin M. Streiner
strei...@cluebyfour.org wrote:
 So it stands a good chance of turning into the wild west ;)

Isn't this what's made the Internet great? ;-)

-- 
Ray Soucy

Epic Communications Specialist

Phone: +1 (207) 561-3526

Networkmaine, a Unit of the University of Maine System
http://www.networkmaine.net/



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Mark Andrews

In message pine.lnx.4.64.1201251037480.16...@whammy.cluebyfour.org, Justin M
. Streiner writes:
 Is anyone using ULA (RFC 4193) address space for v6 infrastructure that 
 does not need to be exposed to the outside world?  I understand the 
 concept of having fc00::/8 being doled out by the RIRs never went 
 anywhere, and using space out of fd00::/8 can be a bit of a crap-shoot 
 because of the likelihood of many organizations that do so not following 
 the algorithm for picking a /48 that is outlined in the RFC.
 
 There would appear to be reasonable arguments for and against using ULA. 
 I'm just curious about what people are doing in practice.
 
 jms

A lot has to do with whether you have PA addresses of not.  As for picking
a random prefix I suspect most home CPE devices will do the right thing.
It's also easy to do the right thing.  I just did

dd if=/dev/random count=1 bs=5 | od -x

and pulled the hex dig digits out to construct the ULA I use at home.  A
little bit prettier version is below.

#!/bin/sh
dd bs=5 count=1 if=/dev/random 2 /dev/null |
od -t x1 |
awk 'NF == 6 { print f8 $2 : $3 $4 : $5 $6 }'

If you don't want to use /dev/random

(ifconfig -a ; date ; netstat -na) | md5 |
sed 's/\(..\)\(\)\(\).*/f8\1:\2:\3/'

There are lots of ways to generate a suitable prefix.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: using ULA for 'hidden' v6 devices?

2012-01-25 Thread Owen DeLong

On Jan 25, 2012, at 10:03 AM, Justin M. Streiner wrote:

 On Wed, 25 Jan 2012, Dale W. Carder wrote:
 
 We have one customer in particular with a substantial non-publicly
 reachable v6 deployment with globally assigned addresses.  I believe
 there is no need to replicate the headaches of rfc1918 in the next
 address-family eternity.
 
 The one big issue I could see with doing that is that the vulnerability 
 exposure, particularly from the outside world, is larger if devices that 
 don't need public addresses have them.  For example, if a network engineer or 
 NOC person accidentally removes a hide my public infrastructure from the 
 outside world from an interface on a border router...
 

Use different GUA ranges for internal and external. It's easy enough to get an 
additional prefix.

 As others have mentioned, things like management interfaces on access 
 switches, printers, and IP phones would be good candidates to hide with ULA.

Or non-advertised, filtered GUA. Works just as well either way.

Owen