[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: stable addressing



Eric,

I'm disappointed that you bring up the N-word in the very same thread I started in order to find a way to make it possible to use stable addressing in a clean way.

On 20-apr-04, at 1:35, Fleischman, Eric wrote:

For whatever it's worth, my Boeing coworkers and I currently expect to maintain a Boeing-unique address space in IPv6 (such as we currently have for IPv4)

If you are in fact acting as an ISP you should be able to get a /32 just like any other ISP. If you plan to assign address space to 200 "customers" in the next two years you qualify. However, having one large address block isn't always advantageous to enterprises, as this also means that you may receive traffic for locatioon A in location B and vice versa. I know there are people who want their own block and then announce more specifics in different locations but I'm afraid that's not exactly in line with our plans to keep the size of the global routing table manageable.


On the other hand, in support of your posting, we also don't want outsiders to know about our internal networks. We currently plan to handle this by deploying NATs for IPv6, such as we currently do for IPv4 (i.e., like many other Fortune 100 companies, we use NATs for security, not for addresses).

Expect things to break if you do. In IPv4 software vendors are forced to add NAT workarounds to their products because NAT is very widespread in v4, but it's unlikely it will be in v6 as well, so I imagine there won't be many NAT workarounds for IPv6.


While I doubt if our security people are willing to discard the use of NATs as a security mechanism,

Think about it this way: if you have 100 boxes in a /24, it takes an atttacker with a dial-up connection all of two seconds to find them. If you have 100 boxes in a /64, it takes takes an attacker with 10 Gbps nearly a year to scan just the 48-bit MAC address derived addresses, and about 20000 years to scan all the RFC 3041 addresses. I suggest your security people learn a few new tricks for IPv6 rather than keep doing what they're doing today with 96 extra bits.