[195956] in North American Network Operators' Group
Re: DHCPv6-PD -> Lack of route injection in RFC
daemon@ATHENA.MIT.EDU (valdis.kletnieks@vt.edu)
Sat Sep 23 04:17:48 2017
X-Original-To: nanog@nanog.org
From: valdis.kletnieks@vt.edu
X-Google-Original-From: Valdis.Kletnieks@vt.edu
To: Mark Andrews <marka@isc.org>
In-Reply-To: <20170922224733.0669887B0F1E@rock.dv.isc.org>
Date: Sat, 23 Sep 2017 01:51:25 -0400
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
--==_Exmh_1506145885_2694P
Content-Type: text/plain; charset=us-ascii
On Sat, 23 Sep 2017 08:47:32 +1000, Mark Andrews said:
> You know CPE devices are routers. They can tell you what routes
> DHCP has given them. That annoucement could be cryptographically
> authenticated.
This is, of course, a lot easier if the CPE already has onboard the needed
software to do that, or you have the ability to push it out.
Is anybody from Comcast or other eyeball network willing to say (even roughly)
what percent of CPE is gear they supply, versus gear that people get at Best
Buy or Walmart and just plug in, versus (if they can identify it) gear that's
been reflashed by clued customers?
(Personally, I have a Linksys that's been reflashed with Lede, and is
configured to work with what Comcast does at their end, and I'm more than happy
to reconfig/reflash with other options if Comcast changes their end. Damned if
I know how I'd find out, though, other than debugging my connection going
wonky.)
--==_Exmh_1506145885_2694P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.8.0 04/21/2017
iQEVAwUBWcX2XY0DS38y7CIcAQIjUQf+MSbq60jYbIKXZb3uBJUFCg6lloahimar
QNTMH2ht85konWLn4WtpmWNgKMyxsuhf8My4Nu0OLG18lMiccYXN1pkQEN43XSTB
rUZbdt3olTAK5lVPFEPW1WQ7q+ZIKq7Ymq2aZQPA9JcHnwH07s5kILRb4MNAU0UG
5+dMuWZnkCpzVGDErNR406MpbSiUbfrCmiZdjH/VcFRrizTZay6+xiId8sMSE9VX
CZl/NCQ23aRfzsqt5dGmvzdGxUgGgMH+3qQ768jS7A3N1U8XWKmm9va2fy585jq4
lZ2rwYZ1FJvAxcyK6mNP7Xmy7YqnrQe131e6YUUa/kEgyEwu8vCCjg==
=IWHh
-----END PGP SIGNATURE-----
--==_Exmh_1506145885_2694P--