[148916] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: using ULA for 'hidden' v6 devices?

daemon@ATHENA.MIT.EDU (George Bonser)
Thu Jan 26 07:29:04 2012

From: George Bonser <gbonser@seven.com>
To: Tim Chown <tjc@ecs.soton.ac.uk>, NANOG list <nanog@nanog.org>
Date: Thu, 26 Jan 2012 12:28:04 +0000
In-Reply-To: <596B74B410EE6B4CA8A30C3AF1A155EA09C93566@RWC-MBX1.corp.seven.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> In other words, you turn leakage into a feature.  You make the fact
> that routes might leak add to the uncertainty by having everyone use
> the same nets.  The more people that leak, the less likely you are to
> reach an intended destination.  V6 ULA makes it MORE likely a leak will
> result in a security breach because it reduces the chances that two
> nets will leak the same routes.
>=20
>=20

To put it another way, if you mandated that EVERY network announce the enti=
re ULA space, it would make reaching any particular network in a predictabl=
e manner impossible.  Just as if every network announced RFC 1918 space and=
 everyone accepted it, it would make that address space completely unusable=
 for anything, particularly if everyone announced it and black holed it.  T=
hat might even be more effective than filtering it.  Everyone on the planet=
 announces a route to 10/8 and everyone black holes it at their peering/tra=
nsit points. =20

So even if someone forgot to filter it, it wouldn't matter because it would=
 be intercepted long before it ever gets to them or at least the chances of=
 anyone being able to reliably reach them would be just about zero.








home help back first fref pref prev next nref lref last post