[167389] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [nznog] Web Servers: Dual-homing or DNAT/Port Forwarding?

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Dec 10 20:33:10 2013

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <CAD6AjGTUcy3iPYc+w61cW4CRw56y3HoUW6tMFBhS68x3ZOy7XA@mail.gmail.com>
Date: Tue, 10 Dec 2013 20:32:49 -0500
To: "cb.list6" <cb.list6@gmail.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 10, 2013, at 8:27 PM, cb.list6 <cb.list6@gmail.com> wrote:

> Correct. IPv6 correctly supports the end to end model.

Yes, if you know the IP address of my printer you can use up my toner =
(it=92s already low) and paper.  Then again, It=92s IPv6 so good luck =
finding it.  The first nibble is 2.  Let me know when you=92ve found it.

:)

I=92ve actually had to deal with too many networks that perform MITM or =
other activities that I actually find it useful to VPN to get a public, =
unfiltered IP address.

The days of a machine that are hit with malware in minutes/seconds are =
done.  The background radiation is still there, but it=92s far more =
effective to use other methods (spam, social networks, ad networks, =
etc)=85

Doesn=92t mean that=92s the only way, but many of the =91easily =
exploitable=92 methods from a decade ago are no longer there.

- Jared=


home help back first fref pref prev next nref lref last post