[188659] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Stop IPv6 Google traffic

daemon@ATHENA.MIT.EDU (Ricky Beam)
Mon Apr 11 16:56:26 2016

X-Original-To: nanog@nanog.org
To: "Max Tulyev" <maxtul@netassist.ua>, "Rubens Kuhl" <rubensk@gmail.com>
Date: Mon, 11 Apr 2016 16:56:21 -0400
From: "Ricky Beam" <jfbeam@gmail.com>
In-Reply-To: <CAGFn2k2Afe-3R3z+cdoWtwv-EWad1oP=AwAJh39_F54nLdXnQw@mail.gmail.com>
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Sun, 10 Apr 2016 20:09:04 -0400, Rubens Kuhl <rubensk@gmail.com> wrote:
> If your users are seeing captchas, one or a few or them are likely to be
> infected to the point of generating too much requests to Google.

If that were the case, they'd be seeing the same via IPv4. And apparently,
they aren't.

This also points out the problems with *ASSUMING* you know the size of
someone's netblock. If you think "/64", then you'd be wrong. Just as
wrong as assuming all IPv4 is "/24". And on the same side of that coin
is the over-reaching "block all of Asia" blacklist. Sure, that'll kill
a heap of nonsense, but if you actually have business in Asia...

(Yes, *I* banish APNIC. "works for me", not recommended for others.)

home help back first fref pref prev next nref lref last post