[157390] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 169.254.0.0/16

daemon@ATHENA.MIT.EDU (Majdi S. Abbas)
Thu Oct 18 11:19:46 2012

Date: Thu, 18 Oct 2012 11:18:56 -0400
From: "Majdi S. Abbas" <msa@latt.net>
To: "Darren O'Connor" <darrenoc@outlook.com>
In-Reply-To: <DUB002-W583621160A1929804206CEDE770@phx.gbl>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Oct 17, 2012 at 06:59:09PM +0100, Darren O'Connor wrote:
> I've just set up a vpn tunnel to Amazon's AWS and as part of the config 
> they required me to configure to /30 tunnels using addressing from the 
> 169.254.0.0/16 space.

	Yeah, they do that for Direct Connect.

> RFC3927 basically says that this address should only be used as a temp 
> measure until the interface has a proper private or public address.

	So? :)

> So what's the consensus then? Is their a problem using this space as 
> link-local address for routers here and there (I mean we have 65K 
> addresses wasted in this block) or is it a strict no-no? And if no, why 
> is Amazon using it?

	RFCs are just paper.  As for why they use it.. the common private
use reserved blocks (10/8, 172.16/12, 192.168/16) are all in use 
internally in their customers networks.  This is probably the easiest
way to avoid addressing conflicts.

	Since these networks are all isolated, I don't see a great deal
of harm in it (probably less than overlapping more commonly used private
blocks.)

	--msa


home help back first fref pref prev next nref lref last post