[170449] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IPv6 Security [Was: Re: misunderstanding scale]

daemon@ATHENA.MIT.EDU (Luke S. Crawford)
Thu Mar 27 13:25:57 2014

Date: Thu, 27 Mar 2014 10:25:34 -0700
From: "Luke S. Crawford" <lsc@prgmr.com>
To: Owen DeLong <owen@delong.com>
In-Reply-To: <836694A3-D37D-495C-83DC-AEDD045E1FC4@delong.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org



>> It might make sense to just give everyone their own vlan and their own /64;  that would, of course, bring its own problems and complexities (namely that I've gotta have the capability to deal with more customers than I can have native vlans -  not impossible to get around, but significant added complexity.)
>
> I don’t see the point of that.


why not?  After carefully considering everything you have told me, this 
sounds like the way forward to do it the "IPv6 way"   -  privacy IPs 
would work fine, and I could filter every port such that only packets 
from that /64 were allowed out and only addresses to that /64 would be 
allowed in.    Nobody would be able to spoof or listen in on their 
neighbor;  yeah, my router would have to send a lot of RAs, but routers 
that handle the amount of traffic my customers send are cheap.  I have a 
lot of customers, sure, but they are small.

Sure, it's going to cost me in routing complexity, but it looks like the 
only thing I can do that will actually solve my problems and use IPv6 
the way IPv6 is expecting to be used.

I'd then have to figure out how to make their ipv4 /32 work, but I can 
think of several possibilities that might work.  If nothing else, I 
could give them one interface for IPv6 and one for IPv4, and leave the 
IPv4 interface the current system.





home help back first fref pref prev next nref lref last post