[188659] in North American Network Operators' Group
Re: Stop IPv6 Google traffic
daemon@ATHENA.MIT.EDU (Ricky Beam)
Mon Apr 11 16:56:26 2016
X-Original-To: nanog@nanog.org
To: "Max Tulyev" <maxtul@netassist.ua>, "Rubens Kuhl" <rubensk@gmail.com>
Date: Mon, 11 Apr 2016 16:56:21 -0400
From: "Ricky Beam" <jfbeam@gmail.com>
In-Reply-To: <CAGFn2k2Afe-3R3z+cdoWtwv-EWad1oP=AwAJh39_F54nLdXnQw@mail.gmail.com>
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Sun, 10 Apr 2016 20:09:04 -0400, Rubens Kuhl <rubensk@gmail.com> wrote:
> If your users are seeing captchas, one or a few or them are likely to be
> infected to the point of generating too much requests to Google.
If that were the case, they'd be seeing the same via IPv4. And apparently,
they aren't.
This also points out the problems with *ASSUMING* you know the size of
someone's netblock. If you think "/64", then you'd be wrong. Just as
wrong as assuming all IPv4 is "/24". And on the same side of that coin
is the over-reaching "block all of Asia" blacklist. Sure, that'll kill
a heap of nonsense, but if you actually have business in Asia...
(Yes, *I* banish APNIC. "works for me", not recommended for others.)