[148936] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: using ULA for 'hidden' v6 devices?

daemon@ATHENA.MIT.EDU (Douglas Otis)
Thu Jan 26 12:07:34 2012

Date: Thu, 26 Jan 2012 09:07:14 -0800
From: Douglas Otis <dotis@mail-abuse.org>
To: nanog@nanog.org
In-Reply-To: <CAD6AjGTzJ=taP9X4i7YSfD+JPF8bmPB5Vn5T-B3oU0C3-CxAdQ@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 1/26/12 7:35 AM, Cameron Byrne wrote:
>  1. You don't want to disclose what addresses you are using on your
>  internal network, including to the rir
>
>  2. You require or desire an address plan that your rir may consider
>  wasteful.
>
>  3. You don't want to talk to an rir for a variety of personal or
>  business process reasons
>
>  4. When troubleshooting both with network engineers familiar with
>  the network as well as tac engineers, seeing the network for the
>  first time, ula sticks out like a sore thumb and can lead to some
>  meaningful and clarifying discussions about the devices and flows.
>
>  5. Routes and packets leak. Filtering at the perimeter? Which
>  perimeter? Mistakes happen. Ula provides a reasonable assumption that
>  the ISP will not route the leaked packets. It is one of many possible
>  layers of security and fail-safes.
>
>  Cb
Dear Cameron,

For a reference to something taking advantage of ULAs per RFC4193 See:
http://tools.ietf.org/html/rfc6281#page-11

Regards,
Doug Otis




home help back first fref pref prev next nref lref last post