* [gentoo-user] /etc/hosts include file?
@ 2013-03-07 22:24 Alan McKinnon
2013-03-07 23:50 ` Michael Mol
` (2 more replies)
0 siblings, 3 replies; 48+ messages in thread
From: Alan McKinnon @ 2013-03-07 22:24 UTC (permalink / raw
To: gentoo-user
Anyone know if there's a way to get /etc/hosts to support the notion of
an include file? I did my homework and found nothing, maybe someone else
knows more.
I really do need this, I have an app that discovers things on the
network and knows their address. This makes it's automated way into DNS
but takes a few days, and another app needs to use the fqdn right now.
So /etc/hosts is the way to go for the interim three days.
I've worked around it by creating /etc/hosts.d/ containing a header and
a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
hosts file is a symlink to that. It's a sub-directory as none of these
apps run as root and only root can modiy the real hosts file.
This works well enough, but a supported include mechanism would make
life so much simpler, not to mention easier for my colleagues to
understand what the blazes I set up :-)
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-07 22:24 [gentoo-user] /etc/hosts include file? Alan McKinnon
@ 2013-03-07 23:50 ` Michael Mol
2013-03-08 0:29 ` Michael Mol
2013-03-08 4:30 ` Pandu Poluan
2 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-07 23:50 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1192 bytes --]
On Mar 7, 2013 5:28 PM, "Alan McKinnon" <alan.mckinnon@gmail.com> wrote:
>
> Anyone know if there's a way to get /etc/hosts to support the notion of
> an include file? I did my homework and found nothing, maybe someone else
> knows more.
>
> I really do need this, I have an app that discovers things on the
> network and knows their address. This makes it's automated way into DNS
> but takes a few days, and another app needs to use the fqdn right now.
> So /etc/hosts is the way to go for the interim three days.
>
> I've worked around it by creating /etc/hosts.d/ containing a header and
> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
> hosts file is a symlink to that. It's a sub-directory as none of these
> apps run as root and only root can modiy the real hosts file.
>
> This works well enough, but a supported include mechanism would make
> life so much simpler, not to mention easier for my colleagues to
> understand what the blazes I set up :-)
>
>
>
> --
> Alan McKinnon
> alan.mckinnon@gmail.com
>
>
>
See resolv.conf and nsswitch.conf
More details later...but nsswitch, at least, is how one can mix hosts, DNS,
NIS and winbind on the same box...
[-- Attachment #2: Type: text/html, Size: 1562 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-07 22:24 [gentoo-user] /etc/hosts include file? Alan McKinnon
2013-03-07 23:50 ` Michael Mol
@ 2013-03-08 0:29 ` Michael Mol
2013-03-08 8:32 ` Alan McKinnon
2013-03-08 15:39 ` Florian Philipp
2013-03-08 4:30 ` Pandu Poluan
2 siblings, 2 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-08 0:29 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1984 bytes --]
On 03/07/2013 05:24 PM, Alan McKinnon wrote:
> Anyone know if there's a way to get /etc/hosts to support the notion of
> an include file? I did my homework and found nothing, maybe someone else
> knows more.
>
> I really do need this, I have an app that discovers things on the
> network and knows their address. This makes it's automated way into DNS
> but takes a few days, and another app needs to use the fqdn right now.
> So /etc/hosts is the way to go for the interim three days.
>
> I've worked around it by creating /etc/hosts.d/ containing a header and
> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
> hosts file is a symlink to that. It's a sub-directory as none of these
> apps run as root and only root can modiy the real hosts file.
>
> This works well enough, but a supported include mechanism would make
> life so much simpler, not to mention easier for my colleagues to
> understand what the blazes I set up :-)
No, there's not an "include" directive.
There are, however, two other ways to get hostnames recognized.
The first is /etc/resolv.conf . You can point your host at a local DNS
server which is aware of the discovered hosts, and which forwards the
rest of the queries. (This is how Samba 4's internal DNS server
operates; anything it knows, it responds to. Everything else, it forwards.)
Read the manpage for resolv.conf...there's a lot of stuff in there
you'll want to know as you start coping with IPv6. (And some useful
stuff if you want to favor a particular IP range...)
The second is /etc/nsswitch.conf . nsswitch.conf is how you inject
samba-discovered, NIS-offered -- or whatever provider you care to inject
-- hostname databases into the system resolver. You could have it query
your provided database first, moving on to other sources if your
provided database doesn't have what you're looking for. (I'm actually
kinda surprised avahi doesn't come with an nss plugin...)
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-07 22:24 [gentoo-user] /etc/hosts include file? Alan McKinnon
2013-03-07 23:50 ` Michael Mol
2013-03-08 0:29 ` Michael Mol
@ 2013-03-08 4:30 ` Pandu Poluan
2013-03-08 8:23 ` Alan McKinnon
2 siblings, 1 reply; 48+ messages in thread
From: Pandu Poluan @ 2013-03-08 4:30 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1445 bytes --]
On Mar 8, 2013 5:27 AM, "Alan McKinnon" <alan.mckinnon@gmail.com> wrote:
>
> Anyone know if there's a way to get /etc/hosts to support the notion of
> an include file? I did my homework and found nothing, maybe someone else
> knows more.
>
> I really do need this, I have an app that discovers things on the
> network and knows their address. This makes it's automated way into DNS
> but takes a few days, and another app needs to use the fqdn right now.
> So /etc/hosts is the way to go for the interim three days.
>
> I've worked around it by creating /etc/hosts.d/ containing a header and
> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
> hosts file is a symlink to that. It's a sub-directory as none of these
> apps run as root and only root can modiy the real hosts file.
>
> This works well enough, but a supported include mechanism would make
> life so much simpler, not to mention easier for my colleagues to
> understand what the blazes I set up :-)
>
>
>
> --
> Alan McKinnon
> alan.mckinnon@gmail.com
>
>
>
An option would be to create a cron job which generates the hosts file
every minute. The cron job should also insert a header on top of the hosts
file telling:
+ this file (hosts) is dynamically generated
+ by a system cron job
+ the cron job's script location
Besides, you said you're going to need this workaround only for a couple of
days, so installing Samba4 might be an overkill.
Rgds,
--
[-- Attachment #2: Type: text/html, Size: 1864 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-08 4:30 ` Pandu Poluan
@ 2013-03-08 8:23 ` Alan McKinnon
0 siblings, 0 replies; 48+ messages in thread
From: Alan McKinnon @ 2013-03-08 8:23 UTC (permalink / raw
To: gentoo-user
On 08/03/2013 06:30, Pandu Poluan wrote:
>
> On Mar 8, 2013 5:27 AM, "Alan McKinnon" <alan.mckinnon@gmail.com
> <mailto:alan.mckinnon@gmail.com>> wrote:
>>
>> Anyone know if there's a way to get /etc/hosts to support the notion of
>> an include file? I did my homework and found nothing, maybe someone else
>> knows more.
>>
>> I really do need this, I have an app that discovers things on the
>> network and knows their address. This makes it's automated way into DNS
>> but takes a few days, and another app needs to use the fqdn right now.
>> So /etc/hosts is the way to go for the interim three days.
>>
>> I've worked around it by creating /etc/hosts.d/ containing a header and
>> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
>> hosts file is a symlink to that. It's a sub-directory as none of these
>> apps run as root and only root can modiy the real hosts file.
>>
>> This works well enough, but a supported include mechanism would make
>> life so much simpler, not to mention easier for my colleagues to
>> understand what the blazes I set up :-)
>>
>>
>>
>> --
>> Alan McKinnon
>> alan.mckinnon@gmail.com <mailto:alan.mckinnon@gmail.com>
>>
>>
>>
>
> An option would be to create a cron job which generates the hosts file
> every minute. The cron job should also insert a header on top of the
> hosts file telling:
>
> + this file (hosts) is dynamically generated
> + by a system cron job
> + the cron job's script location
>
> Besides, you said you're going to need this workaround only for a couple
> of days, so installing Samba4 might be an overkill.
I'm already doing something very much like that, I reckon I'll leave it
in place, and document it in the grand CYA tradition.
To be clear, it's not a temporary workaround - it's permanent. I do
network discovery every 12 hours and can find up to 7000 things on the
network, so now I know their hostname and address. This eventually makes
it's way into DNS, but DNS by design updates slowly and a second app (an
audit app) needs to resolve the names immediately. That's why hosts is
the perfect interim solution; in 3 days when the DNS update happens the
entry is removed from the hosts file.
--
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-08 0:29 ` Michael Mol
@ 2013-03-08 8:32 ` Alan McKinnon
2013-03-08 13:40 ` Michael Mol
2013-03-08 15:39 ` Florian Philipp
1 sibling, 1 reply; 48+ messages in thread
From: Alan McKinnon @ 2013-03-08 8:32 UTC (permalink / raw
To: gentoo-user
On 08/03/2013 02:29, Michael Mol wrote:
> On 03/07/2013 05:24 PM, Alan McKinnon wrote:
>> Anyone know if there's a way to get /etc/hosts to support the notion of
>> an include file? I did my homework and found nothing, maybe someone else
>> knows more.
>>
>> I really do need this, I have an app that discovers things on the
>> network and knows their address. This makes it's automated way into DNS
>> but takes a few days, and another app needs to use the fqdn right now.
>> So /etc/hosts is the way to go for the interim three days.
>>
>> I've worked around it by creating /etc/hosts.d/ containing a header and
>> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
>> hosts file is a symlink to that. It's a sub-directory as none of these
>> apps run as root and only root can modiy the real hosts file.
>>
>> This works well enough, but a supported include mechanism would make
>> life so much simpler, not to mention easier for my colleagues to
>> understand what the blazes I set up :-)
>
> No, there's not an "include" directive.
>
> There are, however, two other ways to get hostnames recognized.
>
> The first is /etc/resolv.conf . You can point your host at a local DNS
> server which is aware of the discovered hosts, and which forwards the
> rest of the queries. (This is how Samba 4's internal DNS server
> operates; anything it knows, it responds to. Everything else, it forwards.)
>
> Read the manpage for resolv.conf...there's a lot of stuff in there
> you'll want to know as you start coping with IPv6. (And some useful
> stuff if you want to favor a particular IP range...)
And the day started off so well. Then you had to come along and mention
IPv6.... :-)
IPv6 is wonderfully easy to use client-side and reasonably easy to plug
into an existing network (the routers mostly know what to do already).
The fun starts when you need to write an app that tracks and does range
allocations at ISP scale, all while keeping the PTRs in line too. Sadly
for me, my team works in that area and such a magic app is one of our
deliverables
One day when I've climbed down off the walls and my fingernails have
grown back, I might be up to relating what it is taking to get that
done.... :-)
>
> The second is /etc/nsswitch.conf . nsswitch.conf is how you inject
> samba-discovered, NIS-offered -- or whatever provider you care to inject
> -- hostname databases into the system resolver. You could have it query
> your provided database first, moving on to other sources if your
> provided database doesn't have what you're looking for. (I'm actually
> kinda surprised avahi doesn't come with an nss plugin...)
One day I should read nsswitch's man page completely. I never needed to
know more than "dns files" for the hosts directives and that shadow does
user. All those other lookup schemes are things I never use.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-08 8:32 ` Alan McKinnon
@ 2013-03-08 13:40 ` Michael Mol
2013-03-08 13:54 ` Alan McKinnon
0 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-08 13:40 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3605 bytes --]
On 03/08/2013 03:32 AM, Alan McKinnon wrote:
> On 08/03/2013 02:29, Michael Mol wrote:
>> On 03/07/2013 05:24 PM, Alan McKinnon wrote:
>>> Anyone know if there's a way to get /etc/hosts to support the notion of
>>> an include file? I did my homework and found nothing, maybe someone else
>>> knows more.
>>>
>>> I really do need this, I have an app that discovers things on the
>>> network and knows their address. This makes it's automated way into DNS
>>> but takes a few days, and another app needs to use the fqdn right now.
>>> So /etc/hosts is the way to go for the interim three days.
>>>
>>> I've worked around it by creating /etc/hosts.d/ containing a header and
>>> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
>>> hosts file is a symlink to that. It's a sub-directory as none of these
>>> apps run as root and only root can modiy the real hosts file.
>>>
>>> This works well enough, but a supported include mechanism would make
>>> life so much simpler, not to mention easier for my colleagues to
>>> understand what the blazes I set up :-)
>>
>> No, there's not an "include" directive.
>>
>> There are, however, two other ways to get hostnames recognized.
>>
>> The first is /etc/resolv.conf . You can point your host at a local DNS
>> server which is aware of the discovered hosts, and which forwards the
>> rest of the queries. (This is how Samba 4's internal DNS server
>> operates; anything it knows, it responds to. Everything else, it forwards.)
>>
>> Read the manpage for resolv.conf...there's a lot of stuff in there
>> you'll want to know as you start coping with IPv6. (And some useful
>> stuff if you want to favor a particular IP range...)
>
> And the day started off so well. Then you had to come along and mention
> IPv6.... :-)
>
> IPv6 is wonderfully easy to use client-side and reasonably easy to plug
> into an existing network (the routers mostly know what to do already).
> The fun starts when you need to write an app that tracks and does range
> allocations at ISP scale, all while keeping the PTRs in line too. Sadly
> for me, my team works in that area and such a magic app is one of our
> deliverables
My mouth is watering...
>
> One day when I've climbed down off the walls and my fingernails have
> grown back, I might be up to relating what it is taking to get that
> done.... :-)
I don't suppose you knew I'm a huge IPv6 advocate, and travel around my
state giving free training sessions...
I would absolutely love to hear about the problems you're facing.
Further, I'd love to help you get past them...and can put you in touch
with experts who might also be able to help.
>
>>
>> The second is /etc/nsswitch.conf . nsswitch.conf is how you inject
>> samba-discovered, NIS-offered -- or whatever provider you care to inject
>> -- hostname databases into the system resolver. You could have it query
>> your provided database first, moving on to other sources if your
>> provided database doesn't have what you're looking for. (I'm actually
>> kinda surprised avahi doesn't come with an nss plugin...)
>
> One day I should read nsswitch's man page completely. I never needed to
> know more than "dns files" for the hosts directives and that shadow does
> user. All those other lookup schemes are things I never use.
I've never mucked with NIS, but I muck with samba from time to time.
If you're already in a developer context, I'd suggest writing an NSS
plugin the system resolver can check on. That's the angle I'd take in
your circumstance.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-08 13:40 ` Michael Mol
@ 2013-03-08 13:54 ` Alan McKinnon
2013-03-08 19:50 ` [Bulk] " Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Alan McKinnon @ 2013-03-08 13:54 UTC (permalink / raw
To: gentoo-user
On 08/03/2013 15:40, Michael Mol wrote:
>> IPv6 is wonderfully easy to use client-side and reasonably easy to plug
>> > into an existing network (the routers mostly know what to do already).
>> > The fun starts when you need to write an app that tracks and does range
>> > allocations at ISP scale, all while keeping the PTRs in line too. Sadly
>> > for me, my team works in that area and such a magic app is one of our
>> > deliverables
> My mouth is watering...
>
>> >
>> > One day when I've climbed down off the walls and my fingernails have
>> > grown back, I might be up to relating what it is taking to get that
>> > done.... :-)
> I don't suppose you knew I'm a huge IPv6 advocate, and travel around my
> state giving free training sessions...
>
> I would absolutely love to hear about the problems you're facing.
> Further, I'd love to help you get past them...and can put you in touch
> with experts who might also be able to help.
>
>
I too am a huge fan of IPv6. It will all at once fix two things:
1. The craziness of trying to conserve IPv4 space
2. NAT. Finally, a good solid techical reason to make NAT just go away
and stay away. Permanently. Forever.
Without getting into huge amounts of boring detail on the list, the
major problem is finding software that can fulfil our backend needs.
We're an ISP and we sell address space. We also allocate space
internally to our own customers and need to keep accurate records as to
who has what. There are some good packages on the market that function
as a DNS backend where you enter the relevant IPv6 data and it takes
care of the forward and reverse entries. We need something a bit more
than that, we need the software to do block allocation. So it must not
be a mere record of stuff, it must be the authoritative source of
reference for that stuff, and it must understand the people involved and
their roles (what they may allocate etc).
The best package we found so far is one from Cricket Liu's company (I
forget the app name for the moment, it was a while ago) but it doesn't
do allocation and the backend db isn't really designed for that.
And I nearly forgot to mention, I also need magic post-allocation hooks
in the code. I'm determined to get to a point where unallocated blocks
will be black-holed by the core routers. They must only start passing
the traffic once a properly assigned block has been allocated and
recorded as such. If you ever worked at ISP level, you will immediately
understand why that is rather important :-)
Speak later.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [gentoo-user] /etc/hosts include file?
2013-03-08 0:29 ` Michael Mol
2013-03-08 8:32 ` Alan McKinnon
@ 2013-03-08 15:39 ` Florian Philipp
1 sibling, 0 replies; 48+ messages in thread
From: Florian Philipp @ 2013-03-08 15:39 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1592 bytes --]
Am 08.03.2013 01:29, schrieb Michael Mol:
> On 03/07/2013 05:24 PM, Alan McKinnon wrote:
>> Anyone know if there's a way to get /etc/hosts to support the notion of
>> an include file? I did my homework and found nothing, maybe someone else
>> knows more.
>>
>> I really do need this, I have an app that discovers things on the
>> network and knows their address. This makes it's automated way into DNS
>> but takes a few days, and another app needs to use the fqdn right now.
>> So /etc/hosts is the way to go for the interim three days.
>>
>> I've worked around it by creating /etc/hosts.d/ containing a header and
>> a data file. cat the two and redirect to /etc/hosts.d/hosts and the real
>> hosts file is a symlink to that. It's a sub-directory as none of these
>> apps run as root and only root can modiy the real hosts file.
>>
>> This works well enough, but a supported include mechanism would make
>> life so much simpler, not to mention easier for my colleagues to
>> understand what the blazes I set up :-)
>
> No, there's not an "include" directive.
>
> There are, however, two other ways to get hostnames recognized.
>
> The first is /etc/resolv.conf . You can point your host at a local DNS
> server which is aware of the discovered hosts, and which forwards the
> rest of the queries. (This is how Samba 4's internal DNS server
> operates; anything it knows, it responds to. Everything else, it forwards.)
>
dnsmasq also works like this and is probably easier to set up. FWIW it
also supports include files.
Regards,
Florian Philipp
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 263 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 13:54 ` Alan McKinnon
@ 2013-03-08 19:50 ` Kevin Chadwick
2013-03-08 19:55 ` Michael Mol
0 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-08 19:50 UTC (permalink / raw
To: gentoo-user
> 1. The craziness of trying to conserve IPv4 space
> 2. NAT. Finally, a good solid techical reason to make NAT just go away
> and stay away. Permanently. Forever.
It's a great shame that isn't all it fixed (ipv5), then your job
wouldn't have been so hard and there wouldn't be any reason for many of
us to cling to ipv4 of which there are many strong reasons that are far
far worse than NAT.
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 19:50 ` [Bulk] " Kevin Chadwick
@ 2013-03-08 19:55 ` Michael Mol
2013-03-08 21:49 ` Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-08 19:55 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 583 bytes --]
On 03/08/2013 02:50 PM, Kevin Chadwick wrote:
>> 1. The craziness of trying to conserve IPv4 space
>> 2. NAT. Finally, a good solid techical reason to make NAT just go away
>> and stay away. Permanently. Forever.
>
> It's a great shame that isn't all it fixed (ipv5), then your job
> wouldn't have been so hard and there wouldn't be any reason for many of
> us to cling to ipv4 of which there are many strong reasons that are far
> far worse than NAT.
>
>
IPv5 never really existed.
http://www.oreillynet.com/onlamp/blog/2003/06/what_ever_happened_to_ipv5.html
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 19:55 ` Michael Mol
@ 2013-03-08 21:49 ` Kevin Chadwick
2013-03-08 22:36 ` Pandu Poluan
2013-03-09 0:13 ` Walter Dnes
0 siblings, 2 replies; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-08 21:49 UTC (permalink / raw
To: gentoo-user
> >> 1. The craziness of trying to conserve IPv4 space
> >> 2. NAT. Finally, a good solid techical reason to make NAT just go away
> >> and stay away. Permanently. Forever.
> >
> > It's a great shame that isn't all it fixed (ipv5), then your job
> > wouldn't have been so hard and there wouldn't be any reason for many of
> > us to cling to ipv4 of which there are many strong reasons that are far
> > far worse than NAT.
> >
> >
>
> IPv5 never really existed.
>
> http://www.oreillynet.com/onlamp/blog/2003/06/what_ever_happened_to_ipv5.html
First I've heard of ST or an actual ipv5 but sounds like they had
dropped a layer. Having options like tcp or udp is a good thing.
What would have been best, could have been done years ago and not cost
lots of money and even more in security breaches and what I meant by
ipv5 and would still be better to switch to even today with everyone
being happy to switch to it is simply ipv4 with more bits for address
space.
If I got an ISP who only offers me IPV6 I would drop the ISP before the
IPV4!
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 21:49 ` Kevin Chadwick
@ 2013-03-08 22:36 ` Pandu Poluan
2013-03-09 0:50 ` Kevin Chadwick
2013-03-09 0:13 ` Walter Dnes
1 sibling, 1 reply; 48+ messages in thread
From: Pandu Poluan @ 2013-03-08 22:36 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1424 bytes --]
On Mar 9, 2013 4:51 AM, "Kevin Chadwick" <ma1l1ists@yahoo.co.uk> wrote:
>
> > >> 1. The craziness of trying to conserve IPv4 space
> > >> 2. NAT. Finally, a good solid techical reason to make NAT just go
away
> > >> and stay away. Permanently. Forever.
> > >
> > > It's a great shame that isn't all it fixed (ipv5), then your job
> > > wouldn't have been so hard and there wouldn't be any reason for many
of
> > > us to cling to ipv4 of which there are many strong reasons that are
far
> > > far worse than NAT.
> > >
> > >
> >
> > IPv5 never really existed.
> >
> >
http://www.oreillynet.com/onlamp/blog/2003/06/what_ever_happened_to_ipv5.html
>
> First I've heard of ST or an actual ipv5 but sounds like they had
> dropped a layer. Having options like tcp or udp is a good thing.
>
> What would have been best, could have been done years ago and not cost
> lots of money and even more in security breaches and what I meant by
> ipv5 and would still be better to switch to even today with everyone
> being happy to switch to it is simply ipv4 with more bits for address
> space.
>
> If I got an ISP who only offers me IPV6 I would drop the ISP before the
> IPV4!
>
Unfortunately, your logic is flawed.
Where would you put the additional bits of address?
That would involve rewriting the IP Header.
And while we're at it, why not *totally* remake IP based on decades of
observation & experience?
Hence, IPv6.
Rgds,
--
[-- Attachment #2: Type: text/html, Size: 1937 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 21:49 ` Kevin Chadwick
2013-03-08 22:36 ` Pandu Poluan
@ 2013-03-09 0:13 ` Walter Dnes
2013-03-09 0:41 ` Michael Mol
2013-03-09 0:45 ` Kevin Chadwick
1 sibling, 2 replies; 48+ messages in thread
From: Walter Dnes @ 2013-03-09 0:13 UTC (permalink / raw
To: gentoo-user
On Fri, Mar 08, 2013 at 09:49:23PM +0000, Kevin Chadwick wrote
> What would have been best, could have been done years ago and not cost
> lots of money and even more in security breaches and what I meant by
> ipv5 and would still be better to switch to even today with everyone
> being happy to switch to it is simply ipv4 with more bits for address
> space.
This should be FAQ entry zero for the IPV6 FAQ... *NO* you can *NOT*
add more bits to IPV4, and still have it backwards compatable. It won't
work... period... end of story. Every piece of hardware and software
that deals with IPV4 has the concept of 32 bits *HARD-CODED* into it.
Switching over to IPV4-extended would be just as painfull as switching
over to IPV6.
We will be running out of IPV4 address space shortly so we do need to
upgrade. Having said that, I don't understand all the hate for NAT. At
the risk of being called an elitist, I'll say that 95% of average
internet users have no business running servers; heck many of them can't
even keep *CLIENTS* properly secured. If IPV6-NAT in my home causes me
any problem, that's my problem.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 0:13 ` Walter Dnes
@ 2013-03-09 0:41 ` Michael Mol
2013-03-10 1:42 ` Walter Dnes
2013-03-09 0:45 ` Kevin Chadwick
1 sibling, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-09 0:41 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1788 bytes --]
On 03/08/2013 07:13 PM, Walter Dnes wrote:
> On Fri, Mar 08, 2013 at 09:49:23PM +0000, Kevin Chadwick wrote
>
>> What would have been best, could have been done years ago and not cost
>> lots of money and even more in security breaches and what I meant by
>> ipv5 and would still be better to switch to even today with everyone
>> being happy to switch to it is simply ipv4 with more bits for address
>> space.
>
> This should be FAQ entry zero for the IPV6 FAQ... *NO* you can *NOT*
> add more bits to IPV4, and still have it backwards compatable. It won't
> work... period... end of story. Every piece of hardware and software
> that deals with IPV4 has the concept of 32 bits *HARD-CODED* into it.
> Switching over to IPV4-extended would be just as painfull as switching
> over to IPV6.
>
> We will be running out of IPV4 address space shortly so we do need to
> upgrade. Having said that, I don't understand all the hate for NAT. At
> the risk of being called an elitist, I'll say that 95% of average
> internet users have no business running servers; heck many of them can't
> even keep *CLIENTS* properly secured. If IPV6-NAT in my home causes me
> any problem, that's my problem.
>
The trouble with NAT is that it destroys peer-to-peer protocols. The
first was FTP in Active mode. SIP has been heavily damaged as well.
Anyone who's used IRC is familiar with the problems NAT introduces to
DCC. Anyone who's ever played video games online, or who's tried hosting
a Teamspeak or Ventrillo server, has had NAT get in their way as well.
Seriously, why should my voice packets have to travel across three or
more states in order to bounce through Google Voice servers, if I'm
talking to my wife on her laptop in the next city over?
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 0:13 ` Walter Dnes
2013-03-09 0:41 ` Michael Mol
@ 2013-03-09 0:45 ` Kevin Chadwick
2013-03-09 3:21 ` Michael Mol
1 sibling, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-09 0:45 UTC (permalink / raw
To: gentoo-user
> > What would have been best, could have been done years ago and not cost
> > lots of money and even more in security breaches and what I meant by
> > ipv5 and would still be better to switch to even today with everyone
> > being happy to switch to it is simply ipv4 with more bits for address
> > space.
>
> This should be FAQ entry zero for the IPV6 FAQ... *NO* you can *NOT*
> add more bits to IPV4, and still have it backwards compatable. It won't
> work... period... end of story. Every piece of hardware and software
> that deals with IPV4 has the concept of 32 bits *HARD-CODED* into it.
> Switching over to IPV4-extended would be just as painfull as switching
> over to IPV6.
No it would not, the headers would be different. All the hardware would
have already updated because there would be no bad sides and it would
have been released something like 15 years ago. But lets not discuss
them as we would be here for an eternity and there are already whole
websites dedicated to just that.
I re-iterate it would be worth hardware not being backwards compatible
again to go to ipv4 with large address space today.
http://www.hackingipv6networks.com/past-trainings/hip2011-hacking-ipv6-networks.pdf
That's just on security. There's a whole bad side to it's functionality
too.
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-08 22:36 ` Pandu Poluan
@ 2013-03-09 0:50 ` Kevin Chadwick
2013-03-09 3:27 ` Michael Mol
0 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-09 0:50 UTC (permalink / raw
To: gentoo-user
> Unfortunately, your logic is flawed.
>
> Where would you put the additional bits of address?
>
> That would involve rewriting the IP Header.
>
Your assumption that I do not know that is flawed. I did a review of
ipv6 before it was released and determined ipv4 to be superior then.
That was before I was shown some of the bad sides more recently.
> And while we're at it, why not *totally* remake IP based on decades of
> observation & experience?
>
Who's observations and who's experience. Not everyones that's for damn
sure.
> Hence, IPv6.
Lookup ipvshit
I'll give you a hint.
The guy who wrote most of the pf firewall that MAC OSX now uses as well
as QNX, the latest version originating from OpenBSD and being far better
than iptables has bought up lots of ipv4 just to stay away from ipvshit.
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 0:45 ` Kevin Chadwick
@ 2013-03-09 3:21 ` Michael Mol
2013-03-09 12:53 ` Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-09 3:21 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 14781 bytes --]
On 03/08/2013 07:45 PM, Kevin Chadwick wrote:
>>> What would have been best, could have been done years ago and
>>> not cost lots of money and even more in security breaches and
>>> what I meant by ipv5 and would still be better to switch to even
>>> today with everyone being happy to switch to it is simply ipv4
>>> with more bits for address space.
>>
>> This should be FAQ entry zero for the IPV6 FAQ... *NO* you can
>> *NOT* add more bits to IPV4, and still have it backwards
>> compatable. It won't work... period... end of story. Every piece
>> of hardware and software that deals with IPV4 has the concept of 32
>> bits *HARD-CODED* into it. Switching over to IPV4-extended would be
>> just as painfull as switching over to IPV6.
>
> No it would not, the headers would be different. All the hardware
> would have already updated because there would be no bad sides and
> it would have been released something like 15 years ago. But lets
> not discuss them as we would be here for an eternity and there are
> already whole websites dedicated to just that.
I don't know, you just dropped the 2-3 most trollish anti-IPv6 posts
I've ever seen.
>
> I re-iterate it would be worth hardware not being backwards
> compatible again to go to ipv4 with large address space today.
"IPv4 with large address space" would have taken just as long to deploy;
it's the hardware support that's held us back the most.
>
> http://www.hackingipv6networks.com/past-trainings/hip2011-hacking-ipv6-networks.pdf
>
> That's just on security. There's a whole bad side to it's
> functionality too.
>
Let's discuss security. I'll walk through the slide deck.
"We have much less experience with IPv6 than with IPv4"
That's a meaningless statement...
"IPv6 implementations are much less mature than their IPv4 counterparts."
Only in hardware Software has been much better. Windows has had full
IPv6 support since Vista. Linux has
had full IPv6 support for a few years, including IPSec. The software
implementations are written...the stuff that's still arriving is
feature-add.
Offload engines and managed switches haven't switched over because
clients were more interested in putting off a transition (the same
transition you'd have to go through for IPv4 with extended address
space) than paying for the upgrades. This would have happened with any
IPv4 replacement.
"Security products (firewalls, NIDS, etc.) have less support for IPv6
than for
IPv4"
Dedicated commercial products, yes. General-purpose products? Like I
said, Windows Vista made IPv6 a first-class protocol, including firewall
support. Linux's implementation is a bit quirky. I don't care for the
separation between iptables and ip6tables; I think people tend to write
an iptables script and forget to set up a firewall of any kind for IPv6.
Most of the builder tools (i.e. fwbuilder), require seperate setup
between the two, too.
That's why I use sanewall (formerly firehol); defined rules apply to
both IPv4 and IPv6.
"The complexity of the resulting network will greatly increase during
the transition/co-existence period:"
Yes, and that would apply to any transition period.
"Lack of trained human resources"
That's why people like me go out and do training sessions. (I'll be at
Penguicon again this year, if anyone else was thinking about going...)
That's why Hurricane Electric offers free online certification programs.
Regarding flow labels:
"Currently unused by many stacks – others use it improperly"
Honestly, I don't know about this. It's not something most people will
need to work with.
"Might be leveraged to perform “dumb” (stealth) address scans"
I don't understand the relevance; you get the same information by
observing the packet flow without the flow label.
"Might be leveraged to perform Denial of Service attacks"
So might absolutely anything.
Regarding hop limit:
"Could be leveraged for Detecting the Operating System of a remote node"
So can IPv4's TTL, which it's analogous to.
"Could be leveraged for Fingerprinting a remote physical device"
So can IPv4's TTL, which it's analogous to.
"Could be leveraged for Locating a node in the network topology"
tcptraceroute does this with IPv4 TTLs. And traceroute has been doing
this with IPV4's ICMP echo for decades.
"Could be leveraged for Evading Network Intrusion Detection Systems (NIDS)"
Just like IPv4 TTL.
"Could be leveraged for Reducing the attack exposure of some
hosts/applications"
Not sure what's being said here, but we're talking about a feature
directly analogous to IPv4 TTL.
(skipping the remainder of the section, as there's nothing in there
that's bad that's unique to IPv6)
(skipping the next several sections, as they're just general technical
training material, and don't discuss security implications)
Re Fragmentation security implications that are different from IPv4:
"The Identification field is much larger: chances of “IP ID collisions”
are reduced"
Good thing.
"Note: Overlapping fragments have been recently forbidden (RFC 5722) –
but they are still allowed by many Oses"
This will improve.
"IPv6 Idle scan"
Noted as being applicable to IPv4.
(skipping some general technical material aimed at sysadmin use for
securing their systems)
(skipping description of IPv6 headers; basic technical information)
(skipping suggested countermeasures for theorized attacks)
"IPv6 can be easily leveraged for evading firewalls."
Not if the firewall is set up properly to begin with. Part of that is
described in the preceding 'countermeasures' section. Most of the
remainder is leveraging the same source, dest, port and state data
that's known in IPv4. Finally, use IPSec if possible. (Right now, IPSec
is largely useful as a VPN technique natively supported by by layer 3)
"Most likely, firewalls will block packets with extension headersEs muy
probable que se haga común el filtrado (en firewalls) de paquetes que
contengan en encabezados de extensión"
Not really; firewalls will continue to be based on known factors, and
most of the interesting known factors are in the first header, not the
extension headers.
"The result will be: less flexibility, possibly preventing any use of
IPv6 exntesion headers"
Extension headers will be used where appropriate.
(skip more benign material)
"Some ICMPv6 messages are assumed to indicate “hard errors”. Some stacks
used to abort TCP connections when hard errors were
received. BSD-derived and Linux implementations don’t--Good!"
I believe Windows's stack is based on BSD. I don't know of any stacks
which do. (None are listed, either)
(skip portion which notes straightforward solutions)
(skip benign material)
Re ICMPv6 Echo Request/Echo response
"Also usually exploited for network reconnaissance"
A.K.A. 'traceroute', a known entity in IPv4.
(skip benign material)
Re Node Information Query/Response
"My take: unless you really need your nodes to support Node Information
messages, disable it (i.e., “sysctl –w net.inet6.icmp6.nodeinfo=0)."
Or even firewall it off at your network edge, like you would any
unblessed, unsolicited inbound traffic.
(skip benign material)
Re Address Resolution Games
"Neighbor Cache Poisoning attacks – the v6 version of V4’s ARP cache
poisoning"
Says it for me...same as IPv4's ARP poisoning. (Incidentally, this is
the attack bandied about the most by people arguing that IPv6 is insecure)
"Advertising “special” link-layer addresses, e.g.,"
That's probably a bug in the implementation. It will be fixed.
"Some implementations (FreeBSD, NetBSD) don’t enforce limits on the
number of entries that can be created in the Neighbor Cache"
Certainly that will change soon.
(Skipping MitM and DoS discussion, as it's analogous to IPv4's ARP
poisoning)
"Not much support in layer-2 security boxes to mitigate these attacks"
This is improving. It hadn't shown up yet because commercial purchasers
had been dragging their feet in demanding their vendors support IPv6 in
the first place.
(skip more benign material)
"Disable an Existing Router"
Depends on the attacker being on the local network, and is what RAGuard
is for.
"Exploit DAD for Denial of Service"
This is the first interesting attack I've seen mentioned in the slide
deck (and I'm on slide 109 out of 167, getting to it).
I don't think there's a way to mitigate against it, except to prevent
the attacker from getting on layer 2 network in the first place.
(Entirely doable with things like 802.1x.)
"Advertise Malicious Network Parameters"
Again, what RAGuard is for.
Re Autoconf Addresses & Privacy
"There were concerns that autoconf addresses hurt privacy, as they could
be used to correlate network activity"
Not all that interesting, actually. That kind of correlating activity is
happening more effectively with DPI and HTTP request headers, and *that*
sees through NAT, privacy addresses and proxy servers.
When people express concerns about autoconf addresses to me, I tell them
that if they're that worried about it, they need to already be using
source-obfuscating techniques like the Tor network.
(skip benign material)
"The use of a single “Destination Options” header is enough to evade
most implementations of RA-Guard."
Sadly, that's on the hardware vendors again. Hopefully, the
commercial-grade vendors will get their crap patched. There's no reason
(that I know of) for an RA-Guard implementation to need to inspect the
destination options header.
"This technique can also be exploited to circumvent Neighbor Discover
monitoring tools such as NDPMon"
I don't know so much about this attack, honestly.
Re DHCPv6
"It can be exploited in a similar way to Router Advertisement messages."
And protected in the same way.
Re MLD
"Potential issues: If a MLD-snooping switch is employed, MLD could be
exploited for Denial of Service attacks."
Largely the same class of attacks as if the attacker is on the local
segment. Enable MLD snooping if and only if you're willing to expand
your attack surface in that way. That's not a difficult question; it's
similar to asking whether you want to use a wireless bridge to a wired
network, or if you want to use a router instead.
Re IPSec
"IPsec support is currentlymantatory for IPv6 implementations – the IETF
is changing this requirement to “optional” thus acknowledging reality."
I have yet to encounter a widely-used IPv6 stack that does not support
IPSec. *BSD, Linux and Windows all support it. The idea of it being
"optional" is irrelevant to the question of whether it's available for
use by servers and desktop machines.
"Also, many IPv4 implementations support IPsec, while many IPv6
implementations do not."
As I said, I have yet to encounter a widely-used IPv6 stack that doesn't
support IPSec. Actually, I haven't encountered *any* IPv6 stack that
doesn't support IPSec. I imagine the ones that don't are in things like
voip phones.
"Most of the key problems (e.g., PKI) for IPsec deployment in IPv4 apply
to IPv6, as well."
This is true, if you want to use PKI for IPSec deployment. If you're
setting up static relationships between campus endpoints, it's not so
big a deal.
"There is no reason to believe that IPv6 will result in an increased use
of IPsec."
Bull. The biggest barrier to IPsec use has been NAT! If an intermediate
router has to rewrite the packet to change the apparent source and/or
destination addresses, then the cryptographic signature will show it,
and the packet will be correctly identified as having been tampered with!
With IPsec, NAT is unnecessary. (You can still use it if you need
it...but please try to avoid it!)
Re "DNS support for IPv6"
"Increased size of DNS responses due to larger addresses might be
exploited for DDos attacks"
That's not even significant. Have you looked at the size of DNS
responses? The increased size of the address pales in comparison to the
amount of other data already stuffed into the packet.
Re "IPv6 Transition Co-Existence Technologies"
"Original transition plan: deploy IPv6 before we ran out of IPv4
addresses, and eventually turn off IPv4 when no longer needed – it
didn’t happen"
That's correct; the IPv6 deployment didn't happen when it should have.
Instead, a ton of coping mechanisms for a shrinking address pool came
around. NAT is the big one. If IPv6 had been deployed early on, people
wouldn't think of "one IP address per customer" as the norm...and they
shouldn't have to.
"An attacker can connect to an IPv4-only network, and forge IPv6 Router
Advertisement messages. (*)"
Again, this depends on them being on the same layer 2 network segment.
The same class of attacks would be possible for any IPv4 successor that
implemented either RAs or DHCP.
(Yes, you will want to deploy the countermeasures described)
(skipping more benign material)
Re ISATAP
"An attacker could forge name resolution responses to--"
Secure your DNS.
"This could be used in conjunction with other attacks (e.g. forging DNS
responses such that--"
Secure your DNS.
Re Problems with 6to4
Actually, I'm going to skip most of this and simply acknowledge it: Yes.
6to4 sucks. It's terrible and horrible. *Everyone* of low-to-moderate
knowledge in IPv6 knows it. Use 6rd instead if you need that kind of
tunnel; at least you'll know who to yell at if it breaks.
Re Security Implications of Teredo:
Yes, Teredo sucks, too. Disable it.
Re 'Translation'
(pardon the US-centric view, here) All major ISPs have deployed (or are
in the process of deploying) native IPv6. Mobile carriers have deployed
IPv6. Tunnels will be largely unnecessary. NAT will remain, but it will
be more prevalent in IPv4 than in IPv6.
Re 'Exploiting Transition Technologies'
"Some systems (notably Windows) have support of trnasition technologies
enabled by default."
Yes. Disable Teredo. I'm not aware any other distro that enables a
tunneling protocol by default.
(skip benign material.)
Re Application-layer protocols
"A number of applications may leak IPv6 addresses: E-mail headers, P2P
applications"
As far as email headers, that's just as in IPv4. You can examine some
folks' IPv4 RFC1918 topology by their email headers today, so don't tell
me IPv6 brings much new to the table.
As for P2P applications, this is actually a good thing; P2P applications
can use what they learn for more efficient peer association.
(skip the rest, as it's benign)
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 0:50 ` Kevin Chadwick
@ 2013-03-09 3:27 ` Michael Mol
2013-03-09 12:53 ` Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-09 3:27 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1450 bytes --]
On 03/08/2013 07:50 PM, Kevin Chadwick wrote:
>> Unfortunately, your logic is flawed.
>>
>> Where would you put the additional bits of address?
>>
>> That would involve rewriting the IP Header.
>>
>
> Your assumption that I do not know that is flawed. I did a review of
> ipv6 before it was released and determined ipv4 to be superior then.
> That was before I was shown some of the bad sides more recently.
>
>> And while we're at it, why not *totally* remake IP based on decades of
>> observation & experience?
>>
>
> Who's observations and who's experience. Not everyones that's for damn
> sure.
This is why the IETF exists, to allow vendors and engineers with field
knowledge to argue and debate until they come up with something that
most of them can agree on. IPv6 is what came out of that process.
I'm not going to say IPv6 doesn't have flaws...but it's certainly a lot
better than IPv4, and features it adds (even beyond address space
expansion) are very nice.
>
>> Hence, IPv6.
>
> Lookup ipvshit
>
> I'll give you a hint.
>
> The guy who wrote most of the pf firewall that MAC OSX now uses as well
> as QNX, the latest version originating from OpenBSD and being far better
> than iptables has bought up lots of ipv4 just to stay away from ipvshit.
>
Tried searching for it. You're going to have to provide some useful
direct reference, because a basic search wasn't very illuminating.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 3:21 ` Michael Mol
@ 2013-03-09 12:53 ` Kevin Chadwick
2013-03-10 22:00 ` Michael Mol
0 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-09 12:53 UTC (permalink / raw
To: gentoo-user
> "There is no reason to believe that IPv6 will result in an increased use
> of IPsec."
>
> Bull. The biggest barrier to IPsec use has been NAT! If an intermediate
> router has to rewrite the packet to change the apparent source and/or
> destination addresses, then the cryptographic signature will show it,
> and the packet will be correctly identified as having been tampered with!
>
It's hardly difficult to get around that now is it. You are wrong the
biggest barrier is that it is not desirable to do this as there are
many reasons for firewalls to inspect incoming packets. I don't agree
with things like central virus scanning especially by damn ISPs using
crappy Huawei hardware, deep inspection traffic shaping rather than
pure bandwidth usage tracking or active IDS myself but I do agree
with scrubbing packets.
> With IPsec, NAT is unnecessary. (You can still use it if you need
> it...but please try to avoid it!)
>
Actually it is no problem at all and is far better than some of the
rubbish ipv6 encourages client apps to do. (See the links I sent in the
other mail)
> Re "DNS support for IPv6"
>
> "Increased size of DNS responses due to larger addresses might be
> exploited for DDos attacks"
>
> That's not even significant. Have you looked at the size of DNS
> responses? The increased size of the address pales in comparison to the
> amount of other data already stuffed into the packet.
It's been ages since I looked at that link and longer addresses would
certainly be needed anyway but certainly with DNSSEC again concocted by
costly unthoughtful and unengaging groups who chose to ignore DJB
and enable amplification attacks.
His latest on the "DNS security mess"
http://cr.yp.to/talks/2013.02.07/slides.pdf
> "An attacker can connect to an IPv4-only network, and forge IPv6 Router
> Advertisement messages. (*)"
> Again, this depends on them being on the same layer 2 network segment.
> The same class of attacks would be possible for any IPv4 successor that
> implemented either RAs or DHCP.
Neither of which I use.
As I said we would be here all day and that link wasn't as good as the
one I was actually looking for.
local NAT done right is no problem and actually a good thing and I have
no issues playing games, running servers or anything else behind NAT.
Global NAT works well enough but isn't a good thing and wouldn't exist
if they had simply added more addresses quickly. The hardware uptake
would have been no issue rather than a decade of pleads.
We haven't even touched on the code yet and so all the vulnerable
especially home hardware which yes often has vulnerable sps anyway but
by no way just home hardware.
The ipvshit links give an insight into the code complexity. Note
OpenBSDs kernel which is very secure (unlike Linux whose primary goal is
function) and has had just a few remote holes in well over a decade, one
of which was in ipv6 and which I had avoided without down time because I
won't and what's more shouldn't use ipv6 wherever possible and had
actually removed it from the kernel all together.
If I am Trolling rather than simply trying to make people aware then
stating ipv6 is wonderful is Trolling just as much or more.
Regards,
Kc
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 3:27 ` Michael Mol
@ 2013-03-09 12:53 ` Kevin Chadwick
2013-03-10 21:28 ` Michael Mol
0 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-09 12:53 UTC (permalink / raw
To: gentoo-user
> >
> > Lookup ipvshit
> >
> > I'll give you a hint.
> >
> > The guy who wrote most of the pf firewall that MAC OSX now uses as well
> > as QNX, the latest version originating from OpenBSD and being far better
> > than iptables has bought up lots of ipv4 just to stay away from ipvshit.
> >
>
> Tried searching for it. You're going to have to provide some useful
> direct reference, because a basic search wasn't very illuminating.
Perhaps Google doesn't approve of swear words?!
http://marc.info/?l=openbsd-misc&m=129666298029771&w=2
http://marc.info/?l=openbsd-misc&m=135325826302392&w=2
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 0:41 ` Michael Mol
@ 2013-03-10 1:42 ` Walter Dnes
2013-03-10 4:59 ` Michael Orlitzky
2013-03-10 5:19 ` Alan McKinnon
0 siblings, 2 replies; 48+ messages in thread
From: Walter Dnes @ 2013-03-10 1:42 UTC (permalink / raw
To: gentoo-user
On Fri, Mar 08, 2013 at 07:41:13PM -0500, Michael Mol wrote
> The trouble with NAT is that it destroys peer-to-peer protocols. The
> first was FTP in Active mode.
In its day, it was OK. Nowadays, we use passive mode. What's the
problem?
> SIP has been heavily damaged as well. Anyone who's used IRC is
> familiar with the problems NAT introduces to DCC.
Every ADSL router-modem I've run into recently has port-forwarding.
> Anyone who's ever played video games online,...
A *CLIENT* that can't operate from behind NAT is totally brain-dead.
> or who's tried hosting a Teamspeak or Ventrillo server, has had NAT
> get in their way as well.
Port-forwarding.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 1:42 ` Walter Dnes
@ 2013-03-10 4:59 ` Michael Orlitzky
2013-03-10 21:09 ` Michael Mol
2013-03-10 5:19 ` Alan McKinnon
1 sibling, 1 reply; 48+ messages in thread
From: Michael Orlitzky @ 2013-03-10 4:59 UTC (permalink / raw
To: gentoo-user
On 03/09/2013 08:42 PM, Walter Dnes wrote:
> On Fri, Mar 08, 2013 at 07:41:13PM -0500, Michael Mol wrote
>
>> The trouble with NAT is that it destroys peer-to-peer protocols. The
>> first was FTP in Active mode.
>
> In its day, it was OK. Nowadays, we use passive mode. What's the
> problem?
>
It also doesn't work under NAT, it's just broken in the other direction.
>> SIP has been heavily damaged as well. Anyone who's used IRC is
>> familiar with the problems NAT introduces to DCC.
>
> Every ADSL router-modem I've run into recently has port-forwarding.
>
>> Anyone who's ever played video games online,...
>
> A *CLIENT* that can't operate from behind NAT is totally brain-dead.
>
But you must have one non-NATed "server" for anything to work. I assume
that's what was meant by "it destroys peer-to-peer protocols." You have
to draw an arbitrary distinction between machines that work together,
"servers," and ones that don't, "clients."
The problem will become more and more apparent as ipv4 space dries up
and everyone becomes a client. Although ISPs will be more than happy to
sell you a useful connection, for a premium.
Un-NATed addresses are like, type-O blood. Imagine how much better off
we'd be if we could get everyone to switch their blood to type-O. Might
be less painful than the ipv6 transition, too =)
>> or who's tried hosting a Teamspeak or Ventrillo server, has had NAT
>> get in their way as well.
>
> Port-forwarding.
>
Port forwarding can work, but only for one host when the ports are
standardized. You can't forward e.g. port 443 to two hosts, so only one
host behind the NAT can be accessible on 443.
If you're using your NAT as a firewall for one box, then who cares. But
you can't put more than one machine behind it and have everything still
work.
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 1:42 ` Walter Dnes
2013-03-10 4:59 ` Michael Orlitzky
@ 2013-03-10 5:19 ` Alan McKinnon
2013-03-10 21:07 ` Michael Mol
1 sibling, 1 reply; 48+ messages in thread
From: Alan McKinnon @ 2013-03-10 5:19 UTC (permalink / raw
To: gentoo-user
On 10/03/2013 03:42, Walter Dnes wrote:
> On Fri, Mar 08, 2013 at 07:41:13PM -0500, Michael Mol wrote
>
>> The trouble with NAT is that it destroys peer-to-peer protocols. The
>> first was FTP in Active mode.
>
> In its day, it was OK. Nowadays, we use passive mode. What's the
> problem?
>
>> SIP has been heavily damaged as well. Anyone who's used IRC is
>> familiar with the problems NAT introduces to DCC.
>
> Every ADSL router-modem I've run into recently has port-forwarding.
>
>> Anyone who's ever played video games online,...
>
> A *CLIENT* that can't operate from behind NAT is totally brain-dead.
>
>> or who's tried hosting a Teamspeak or Ventrillo server, has had NAT
>> get in their way as well.
>
> Port-forwarding.
All those examples you give are much like a bunch of home machines
sitting behind a NAT gateway onto the internet. That's actually OK and I
reckon that is the intended use of NAT. Personally, I'd prefer all of my
machines to have a public address but there's no chance in hell my
NetOps colleagues are giving me that with my DSL connection.
We have any years of experience now with consumer connections and the
users that use them, these guys mostly can't admin a machine to save
their lives, so NAT in their case is a good thing on balance.
The true evil of NAT comes about when some clown starts implementing it
on the network itself. I'm in city X, we have a large office in city Y,
and most of the traffic Y->X goes through a *router* doing NAT. No-one
knows anymore why this was originally done but we all know what it will
take to undo it. To get our backend systems to work for client in city Y
I have to put in the cursed "any any" firewall rules, and that sends our
Risk fellows ballistic for good reason. But I have no choice, the
network design essentially discarded all information as to who the
client is, so now I must allow all of them.
Any real-life network that grew organically over several years is always
going to be rife with examples of fuck ups like this, always done in the
name of expediency. I have lots of such examples, the above is only the
first that came to mind.
So whereas NAT behind a home router for IPv4 is good, in almost every
other usage I've seen it is bad and really just a case of a solution
used in places it never ever belonged.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 5:19 ` Alan McKinnon
@ 2013-03-10 21:07 ` Michael Mol
2013-03-10 21:43 ` Alan McKinnon
2013-03-11 4:00 ` Walter Dnes
0 siblings, 2 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-10 21:07 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3760 bytes --]
On 03/10/2013 12:19 AM, Alan McKinnon wrote:
> On 10/03/2013 03:42, Walter Dnes wrote:
>> On Fri, Mar 08, 2013 at 07:41:13PM -0500, Michael Mol wrote
>>
>>> The trouble with NAT is that it destroys peer-to-peer protocols.
>>> The first was FTP in Active mode.
>>
>> In its day, it was OK. Nowadays, we use passive mode. What's the
>> problem?
>>
>>> SIP has been heavily damaged as well. Anyone who's used IRC is
>>> familiar with the problems NAT introduces to DCC.
>>
>> Every ADSL router-modem I've run into recently has
>> port-forwarding.
>>
>>> Anyone who's ever played video games online,...
>>
>> A *CLIENT* that can't operate from behind NAT is totally
>> brain-dead.
>>
>>> or who's tried hosting a Teamspeak or Ventrillo server, has had
>>> NAT get in their way as well.
>>
>> Port-forwarding.
>
>
> All those examples you give are much like a bunch of home machines
> sitting behind a NAT gateway onto the internet. That's actually OK
> and I reckon that is the intended use of NAT.
I want to point out that that's only true if the home network has at
least one public IP. If you've got NAT 4x4, you're kinda screwed.
(Alan will understand that, but for those unfamiliar with it, that
basically means that if your home router is given an RFC1918 address by
your ISP, port forwarding isn't going to do squat for you.)
I've got a friend in a rural area who can't get a publicly-routable
address. To access his home network from work, he rents a VPS and sets
up a static tunnel.
Such are the evils of NAT.
> Personally, I'd prefer all of my machines to have a public address
> but there's no chance in hell my NetOps colleagues are giving me that
> with my DSL connection.
Well, with IPv6, they're supposed to. ^^
>
> We have any years of experience now with consumer connections and
> the users that use them, these guys mostly can't admin a machine to
> save their lives, so NAT in their case is a good thing on balance.
There's nothing NAT really offers them that having a default simple
firewall on their network gateway wouldn't solve.
If inbound traffic is part of an established or related connection,
accept it. Otherwise, reject it by default. That's all the security
benefit NAT accomplishes, albeit without mangling any packets.
>
> The true evil of NAT comes about when some clown starts implementing
> it on the network itself. I'm in city X, we have a large office in
> city Y, and most of the traffic Y->X goes through a *router* doing
> NAT. No-one knows anymore why this was originally done but we all
> know what it will take to undo it. To get our backend systems to work
> for client in city Y I have to put in the cursed "any any" firewall
> rules, and that sends our Risk fellows ballistic for good reason. But
> I have no choice, the network design essentially discarded all
> information as to who the client is, so now I must allow all of
> them.
>
> Any real-life network that grew organically over several years is
> always going to be rife with examples of fuck ups like this, always
> done in the name of expediency. I have lots of such examples, the
> above is only the first that came to mind.
>
> So whereas NAT behind a home router for IPv4 is good, in almost
> every other usage I've seen it is bad and really just a case of a
> solution used in places it never ever belonged.
NAT behind a home router is bad, too. For IPv4, it's only necessary
because there aren't enough IPv4 addresses to let everyone have a unique
one. (It's unfortunate we never got DHCP-PD for IPv4; that would solve a
number of problems I've seen and foresee with small-business IPv4
networks both pre- and post-crunch.)
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 4:59 ` Michael Orlitzky
@ 2013-03-10 21:09 ` Michael Mol
0 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-10 21:09 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2266 bytes --]
On 03/09/2013 11:59 PM, Michael Orlitzky wrote:
> On 03/09/2013 08:42 PM, Walter Dnes wrote:
>> On Fri, Mar 08, 2013 at 07:41:13PM -0500, Michael Mol wrote
>>
>>> The trouble with NAT is that it destroys peer-to-peer protocols. The
>>> first was FTP in Active mode.
>>
>> In its day, it was OK. Nowadays, we use passive mode. What's the
>> problem?
>>
>
> It also doesn't work under NAT, it's just broken in the other direction.
>
>
>>> SIP has been heavily damaged as well. Anyone who's used IRC is
>>> familiar with the problems NAT introduces to DCC.
>>
>> Every ADSL router-modem I've run into recently has port-forwarding.
>>
>>> Anyone who's ever played video games online,...
>>
>> A *CLIENT* that can't operate from behind NAT is totally brain-dead.
>>
>
> But you must have one non-NATed "server" for anything to work. I assume
> that's what was meant by "it destroys peer-to-peer protocols." You have
> to draw an arbitrary distinction between machines that work together,
> "servers," and ones that don't, "clients."
Indeed.
>
> The problem will become more and more apparent as ipv4 space dries up
> and everyone becomes a client. Although ISPs will be more than happy to
> sell you a useful connection, for a premium.
This has happened to a friend of mine...and he *can't* get a public IP
from his rural ISP.
>
> Un-NATed addresses are like, type-O blood. Imagine how much better off
> we'd be if we could get everyone to switch their blood to type-O. Might
> be less painful than the ipv6 transition, too =)
>
>
>>> or who's tried hosting a Teamspeak or Ventrillo server, has had NAT
>>> get in their way as well.
>>
>> Port-forwarding.
>>
>
> Port forwarding can work, but only for one host when the ports are
> standardized. You can't forward e.g. port 443 to two hosts, so only one
> host behind the NAT can be accessible on 443.
>
> If you're using your NAT as a firewall for one box, then who cares. But
> you can't put more than one machine behind it and have everything still
> work.
Since we've already run out of IPv4 addresses, port forwarding is
starting to fail even for that circumstance; if your ISP hands you an
RFC1918 address, you're screwed.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 12:53 ` Kevin Chadwick
@ 2013-03-10 21:28 ` Michael Mol
2013-03-11 23:09 ` Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-10 21:28 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1224 bytes --]
On 03/09/2013 07:53 AM, Kevin Chadwick wrote:
>>>
>>> Lookup ipvshit
>>>
>>> I'll give you a hint.
>>>
>>> The guy who wrote most of the pf firewall that MAC OSX now uses as well
>>> as QNX, the latest version originating from OpenBSD and being far better
>>> than iptables has bought up lots of ipv4 just to stay away from ipvshit.
>>>
>>
>> Tried searching for it. You're going to have to provide some useful
>> direct reference, because a basic search wasn't very illuminating.
>
> Perhaps Google doesn't approve of swear words?!
No, there was simply no useful result that came up. Incidentally, both
links you provide *did* come up...but I dismissed them because I
couldn't imagine anyone using them as a reference except in trying to
deride Henning Brauer.
>
> http://marc.info/?l=openbsd-misc&m=129666298029771&w=2
He goes from advocating NAT444 to a spew of pejoratives about something.
NAT444 is one of the nastiest, user-disempowering things to hit the
Internet to date. The rest of this email is him bitching about having to
parse CIDR notation.
>
> http://marc.info/?l=openbsd-misc&m=135325826302392&w=2
>
This email has absolutely no technical content whatsoever.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 21:07 ` Michael Mol
@ 2013-03-10 21:43 ` Alan McKinnon
2013-03-10 22:02 ` Michael Mol
2013-03-11 4:00 ` Walter Dnes
1 sibling, 1 reply; 48+ messages in thread
From: Alan McKinnon @ 2013-03-10 21:43 UTC (permalink / raw
To: gentoo-user
On 10/03/2013 23:07, Michael Mol wrote:
>> All those examples you give are much like a bunch of home machines
>> > sitting behind a NAT gateway onto the internet. That's actually OK
>> > and I reckon that is the intended use of NAT.
> I want to point out that that's only true if the home network has at
> least one public IP. If you've got NAT 4x4, you're kinda screwed.
>
> (Alan will understand that, but for those unfamiliar with it, that
> basically means that if your home router is given an RFC1918 address by
> your ISP, port forwarding isn't going to do squat for you.)
I'm getting images of NATted traffic being NATted. My head just exploded.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-09 12:53 ` Kevin Chadwick
@ 2013-03-10 22:00 ` Michael Mol
2013-03-11 1:56 ` Michael Orlitzky
2013-03-11 22:34 ` Kevin Chadwick
0 siblings, 2 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-10 22:00 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 8740 bytes --]
On 03/09/2013 07:53 AM, Kevin Chadwick wrote:
>> "There is no reason to believe that IPv6 will result in an
>> increased use of IPsec."
>>
>> Bull. The biggest barrier to IPsec use has been NAT! If an
>> intermediate router has to rewrite the packet to change the
>> apparent source and/or destination addresses, then the
>> cryptographic signature will show it, and the packet will be
>> correctly identified as having been tampered with!
>>
>
> It's hardly difficult to get around that now is it.
Sure, you can use an IP-in-IP tunnel...but that's retarded. IPSec was
designed from the beginning to allow you to do things like sign your IP
header and encrypt everything else (meaning your UDP, TCP, SCTP or what
have you).
Setting up a tunnel just so your IP header can be signed wastes another
40 bytes for every non-fragmented packet. Ask someone trying to use data
in a cellular context how valuable that 40 bytes can be.
> You are wrong the biggest barrier is that it is not desirable to do
> this as there are many reasons for firewalls to inspect incoming
> packets. I don't agree with things like central virus scanning
> especially by damn ISPs using crappy Huawei hardware, deep inspection
> traffic shaping rather than pure bandwidth usage tracking or active
> IDS myself but I do agree with scrubbing packets.
It's not the transit network's job to scrub packets. Do your scrubbing
at the VPN endpoint, where the IPSec packets are unwrapped.
Trusting the transit network to scrub packets is antithetical to the
idea of using security measures to avoid MITM and traffic sniffing
attacks in the first place!
>
>> With IPsec, NAT is unnecessary. (You can still use it if you need
>> it...but please try to avoid it!)
>>
>
> Actually it is no problem at all and is far better than some of the
> rubbish ipv6 encourages client apps to do. (See the links I sent in
> the other mail)
Please read the links before you send them, and make specific references
to the content you want people to look at. I've read and responded to
the links you've offered (which were links to archived messages on
mailing lists, and the messages were opinion pieces with little (if any)
technical material.)
>
>> Re "DNS support for IPv6"
>>
>> "Increased size of DNS responses due to larger addresses might be
>> exploited for DDos attacks"
>>
>> That's not even significant. Have you looked at the size of DNS
>> responses? The increased size of the address pales in comparison to
>> the amount of other data already stuffed into the packet.
>
> It's been ages since I looked at that link and longer addresses
> would certainly be needed anyway but certainly with DNSSEC again
> concocted by costly unthoughtful and unengaging groups who chose to
> ignore DJB and enable amplification attacks.
What from DJB did they ignore? I honestly don't know what you're talking
about.
>
> His latest on the "DNS security mess"
>
> http://cr.yp.to/talks/2013.02.07/slides.pdf
I've never before in my life seen someone animate slideshow transitions
and save off intermediate frames as individual PDF pages. That was painful.
So, I read what was discussed there. First, he describes failings of
HTTPSEC. I don't have any problem with what he's talking about there,
honestly; it makes a reasonable amount of sense, considering
intermediate caching servers aren't very common for HTTP traffic, and
HTTPS traffic makes intermediate caching impossible. (unless you've
already got serious security problems by way of a MITM opening.)
Then he turns around and dedicates two slides showing a DNS delegation
sequence...and then states in a single slide that DNSSEC has all the
same problems as HTTPSEC.
DNSSEC doesn't have the same problems as HTTPSEC, because almost *every*
recursive resolving DNS server (which is most of the DNS servers on the
Internet) employs caching.
>
>> "An attacker can connect to an IPv4-only network, and forge IPv6
>> Router Advertisement messages. (*)"
>
>> Again, this depends on them being on the same layer 2 network
>> segment.
>
>> The same class of attacks would be possible for any IPv4 successor
>> that implemented either RAs or DHCP.
>
> Neither of which I use.
You're telling me you don't use DHCP? Seriously, that you statically
configure the IPv4 addresses of all the hosts on your network?
With one exception, I haven't personally seen a network configured in
that way since 1998! Certainly, every network has some hosts configured
statically, but virtually no network I've observed (and I've seen
private networks between 2 and 50 hosts, and commercial networks between
5 and 30k hosts) managed completely statically.
>
> As I said we would be here all day and that link wasn't as good as
> the one I was actually looking for.
>
> local NAT done right is no problem and actually a good thing and I
> have no issues playing games, running servers or anything else behind
> NAT.
See others' responses about port standardization, and about how it
enforces a distinction between 'clients' and 'servers' that's
unnecessary (and even harmful) for a variety of applications.
> Global NAT works well enough
With global NAT, anything you do that depends on port forwarding is broken.
> but isn't a good thing and wouldn't exist if they had simply added
> more addresses quickly. The hardware uptake would have been no issue
> rather than a decade of pleads.
There's almost nothing you've pointed at so far that would have
prevented backbones from IPv6 uptake...and the backbones dragged their
heels long enough. IPv4 with expanded address bits would have been
worse; IPv6 explicitly includes features intended to ease the strain on
the size of a global routing view!
>
> We haven't even touched on the code yet and so all the vulnerable
> especially home hardware which yes often has vulnerable sps anyway
> but by no way just home hardware.
>
> The ipvshit links give an insight into the code complexity.
You call that code complex? (and I still don't know what 'ipvshit' is,
except possibly one guy's pejorative description of IPv6)
> Note OpenBSDs kernel which is very secure (unlike Linux whose
> primary goal is function)
I have no complaints about OpenBSD.
> and has had just a few remote holes in well over a decade, one of
> which was in ipv6
So OpenBSD, who you venerate, had a bug in its IPv6 implementation, and
for that you view IPv6 as an abomination? Is that it? (Or is it because
the guy who wrote the buggy code thinks so, and you venerate him?
Because that seems plausible, too.)
I like Linux, but I don't hold Linux (or any Linux developer) in
veneration. I like Windows, but I don't hold Bill Gates, Balmer or any
Microsoft dev in veneration. I like Android, but I don't hold Google or
any Google employee in veneration. I dislike Macs, but I don't think of
Steve Jobs as evil.
> and which I had avoided without down time because I won't and what's
> more shouldn't use ipv6 wherever possible
Do you mean that as "I'll avoid IPv6 as much as possible" or do you mean
that as "I won't use IPv6 in all places where it's possible to use IPv6"?
If the latter, I'd agree; there are places you can use IPv6 where it
probably won't make a whole lot of sense (i.e. on an HDMI cable, unless
you have a particular need to provide network traffic to/from your TV).
If the former, I'm afraid I still haven't seen a solid technical case
against it.
> and had actually removed it from the kernel all together.
That's sensible; if you're not going to use code, remove it.
>
> If I am Trolling rather than simply trying to make people aware then
> stating ipv6 is wonderful is Trolling just as much or more.
IPv6 fixes things about the Internet that are currently broken by IPv4
address exhaustion. I try to point out where IPv6 fixes things, I try to
clear up popular misconceptions about IPv6, and I try to help people
understand a thing rather than simply fear it.
If you take a highly competent IPv4 network administrator and drop him
into IPv6 territory without ensuring that he has knowledge of IPv6 best
practices and practical concerns, you're likely to get a broken network
out of it. I try to help keep that from happening.
The statements you've made that I regarded as trollish where were you
made emotional statements and arguments without anything explanatory to
back them up. In contrast, I've spent *hours* wading through the links
you've thrown at me (without you yourself reading, I suspect), making
point-by-point responses.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 21:43 ` Alan McKinnon
@ 2013-03-10 22:02 ` Michael Mol
0 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-10 22:02 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 844 bytes --]
On 03/10/2013 05:43 PM, Alan McKinnon wrote:
> On 10/03/2013 23:07, Michael Mol wrote:
>>> All those examples you give are much like a bunch of home machines
>>>> sitting behind a NAT gateway onto the internet. That's actually OK
>>>> and I reckon that is the intended use of NAT.
>> I want to point out that that's only true if the home network has at
>> least one public IP. If you've got NAT 4x4, you're kinda screwed.
>>
>> (Alan will understand that, but for those unfamiliar with it, that
>> basically means that if your home router is given an RFC1918 address by
>> your ISP, port forwarding isn't going to do squat for you.)
>
>
> I'm getting images of NATted traffic being NATted. My head just exploded.
Yup. That's the state of small residential ISPs right now, and why it's
so critical to get IPv6 deployed.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 22:00 ` Michael Mol
@ 2013-03-11 1:56 ` Michael Orlitzky
2013-03-11 2:33 ` Michael Mol
2013-03-11 22:34 ` Kevin Chadwick
1 sibling, 1 reply; 48+ messages in thread
From: Michael Orlitzky @ 2013-03-11 1:56 UTC (permalink / raw
To: gentoo-user
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 03/10/2013 06:00 PM, Michael Mol wrote:
>>
>> It's been ages since I looked at that link and longer addresses
>> would certainly be needed anyway but certainly with DNSSEC again
>> concocted by costly unthoughtful and unengaging groups who chose
>> to ignore DJB and enable amplification attacks.
>
> What from DJB did they ignore? I honestly don't know what you're
> talking about.
>
This was a non-sequitur as far as I can tell, but I remember the
amplification attack from a talk:
http://vimeo.com/18279777 (video)
http://cr.yp.to/talks/2010.12.28/slides.pdf (slides)
It was a really good talk, however you feel about DJB.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iQIcBAEBAgAGBQJRPTnkAAoJEBxJck0inpOia6EP/1Bu1rhx5cCi6/bl/J3MeJm3
CAaGXQG6iSnxxIXVqVXTs2fioZH2f3Xsq3jvKBoAQfil2ocGQa4LAPSGbLYX99xr
XodEfm530EDK02UsqnyGHX2pzFQzUR/cQ0/SFpd8tMtEiYRdASIT6VtqoJoQWsoA
unvPvK6xxHhH/YwmB+miPUSVl1nvmqT6Z7OKmpQL+MRHCQFvyk7SeClVf8OmAPkn
NX/m3pSbsHdAtj6QP6CU8nAF1QbgWehhvZkx8UxqwPz8n8AO1JfY+zG669B5F6u+
MRcnN1s6jgIVoAgeqvgDjUC8JnkQTGBg3Lkdrv9IcM7N/+4ILvlH6h3IeSiI6unU
hnganpVCl0q03N+qRi3JsHfdR/ZNBEetkplOai/QKyUltKohGG4LLPbqBFEdg+NP
nVWz/Y4wn3h2uasClfIbehxSQDKlbHCvKOLp/dEmcFsra29vAF3pu15V1okmqdwF
qzwf1k7nxoyjCT4YVnQv7F9OwnyYwm3nEmOjQyShJZN3gN82/4b+1R0LyhjeOled
WcF8dnuxNpITjr1OusQ9MUeYmotWX2dj+//6zsrwZVs3QTNyOHx5VVe9Bl3DdcKr
lFthQKyjsQAGgMD7zFoy4JxPReBwTQhu/QGcGKVKLIVRlTJ0XRQWVHUijlVY6dqB
lIZu+xpwtY8OeZ20e+BC
=knjT
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 1:56 ` Michael Orlitzky
@ 2013-03-11 2:33 ` Michael Mol
0 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-11 2:33 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1498 bytes --]
On 03/10/2013 09:56 PM, Michael Orlitzky wrote:
> On 03/10/2013 06:00 PM, Michael Mol wrote:
>>>
>>> It's been ages since I looked at that link and longer addresses
>>> would certainly be needed anyway but certainly with DNSSEC again
>>> concocted by costly unthoughtful and unengaging groups who chose
>>> to ignore DJB and enable amplification attacks.
>
>> What from DJB did they ignore? I honestly don't know what you're
>> talking about.
>
>
> This was a non-sequitur as far as I can tell, but I remember the
> amplification attack from a talk:
>
> http://vimeo.com/18279777 (video)
> http://cr.yp.to/talks/2010.12.28/slides.pdf (slides)
>
> It was a really good talk, however you feel about DJB.
>
>
Didn't watch the video, but I did read the slide deck. It's a good read,
even if I disagree with a number of key points, disagree with the tack
taken as a solution, and further think the presenter cherry-picked his
arguments, amplified inconsequential pieces of the problem space and
skipped over obvious problems with his approach. (Hm. I suspect I'm
formulating an opinion on DJB, and I didn't have one a couple hours
ago...) (That said, he does seem to know how to use slide decks properly!)
I believe Kevin's position is that, while I cited "secure your DNS" in
response to some of the arguments raised by a slide deck he linked to,
"securing your DNS" would likely involve using DNSSEC, which DJB argues
enable amplification attacks.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 21:07 ` Michael Mol
2013-03-10 21:43 ` Alan McKinnon
@ 2013-03-11 4:00 ` Walter Dnes
2013-03-11 4:37 ` Michael Mol
2013-03-11 8:22 ` Alan McKinnon
1 sibling, 2 replies; 48+ messages in thread
From: Walter Dnes @ 2013-03-11 4:00 UTC (permalink / raw
To: gentoo-user
On Sun, Mar 10, 2013 at 05:07:25PM -0400, Michael Mol wrote
> NAT behind a home router is bad, too. For IPv4, it's only necessary
> because there aren't enough IPv4 addresses to let everyone have a unique
> one.
The best real reason for moving to IPV6 is address space (or lack
thereof, in the case of IPV4). The people who are truly interested in
speeding up IPV6 adoption should do their best to shut up the internet
hippies who constantly rant and rave about how "NAT is evil". Don't let
the cause get distracted by that unrelated issue. Focus on the core
issue.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 4:00 ` Walter Dnes
@ 2013-03-11 4:37 ` Michael Mol
2013-03-11 8:22 ` Alan McKinnon
1 sibling, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-11 4:37 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3742 bytes --]
On 03/11/2013 12:00 AM, Walter Dnes wrote:
> On Sun, Mar 10, 2013 at 05:07:25PM -0400, Michael Mol wrote
>
>> NAT behind a home router is bad, too. For IPv4, it's only necessary
>> because there aren't enough IPv4 addresses to let everyone have a unique
>> one.
>
> The best real reason for moving to IPV6 is address space (or lack
> thereof, in the case of IPV4). The people who are truly interested in
> speeding up IPV6 adoption should do their best to shut up the internet
> hippies who constantly rant and rave about how "NAT is evil". Don't let
> the cause get distracted by that unrelated issue. Focus on the core
> issue.
They're two sides of the same coin. If NAT wasn't such a problem,
layering RFC1918 address space would solve most of the address space
problems. The address space crunch remains a technical problem largely
because NAT can't solve it to completion.
NAT forces a distinction between 'client' and 'server', breaking the
'peer' nature of the network. This isn't some hippy egalitarian thing,
it means I can't trivially tell my VPS to connect to a backup target on
a different network without setting up either a tunnel or a port
forward. With IPv6, doing this is so brain-dead easy I never want to be
without it again. Once you've experienced IPv6 and appropriate network
firewalls, along with the ease of connecting to your own machines from
anywhere you want without having to bounce through a third-party
management service like Teamviewer, you never want to go back. It's like
discovering you've been holding a pencil wrong all your life, or like
discovering a better way to tie your shoes; the solution is simple,
elegant and surprisingly productive. NAT is like tying your shoes wrong;
you don't know how much of a problem it is until you experience life
without it.
And even once you get people comfortable with deploying IPv6, they still
want to hold on to NAT; it's like a stubborn stain on their minds.
It's important to explain that NAT isn't a security measure. In order to
operate, it requires what amounts to a stateful firewall...but that
doesn't mean that a stateful firewall is difficult to obtain without
NAT. People have grown so accustomed to the presence of NAT and NAT's
inherent implications on inbound traffic that they wind up conflating
the two in their minds, making actual understanding of their network's
security that much more difficult to comprehend. So, yeah, NAT is evil.
Looking for privacy in your addresses? That's what privacy extensions
are for, and they're enabled by default on Windows and Ubuntu. (I
haven't looked on Gentoo...)
The only reasonably valid use case for NAT that I've seen is for dealing
with the question of multi-homing an office with two internet
connections. The idea is that you don't have to renumber your internal
network if you need to switch from your primary connection to your
backup connection (and you're being granted different IP ranges based on
which connection you're working with...so we're talking small business,
not BGP or multilink with the same ISP).
In those cases, I advocate application-layer gateways; chances are, if
you're investing in multi-homing your office, you probably already want
the kind of administrative power (and performance improvements) proxy
servers can offer you.
The IPv4 address crunch triggered the development of DNAT a couple
decades ago, and the silly thing persists in terrible ways when there
are simpler ways to handle things. (When I say 'simpler', I mean: Don't
break assumptions about basic network behavior such as 'don't mangle my
packets' or 'I can open a connection back to him when I have updates he
needs')
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 4:00 ` Walter Dnes
2013-03-11 4:37 ` Michael Mol
@ 2013-03-11 8:22 ` Alan McKinnon
2013-03-11 22:45 ` Walter Dnes
2013-03-11 23:31 ` Kevin Chadwick
1 sibling, 2 replies; 48+ messages in thread
From: Alan McKinnon @ 2013-03-11 8:22 UTC (permalink / raw
To: gentoo-user
On 11/03/2013 06:00, Walter Dnes wrote:
> On Sun, Mar 10, 2013 at 05:07:25PM -0400, Michael Mol wrote
>
>> NAT behind a home router is bad, too. For IPv4, it's only necessary
>> because there aren't enough IPv4 addresses to let everyone have a unique
>> one.
>
> The best real reason for moving to IPV6 is address space (or lack
> thereof, in the case of IPV4). The people who are truly interested in
> speeding up IPV6 adoption should do their best to shut up the internet
> hippies who constantly rant and rave about how "NAT is evil". Don't let
> the cause get distracted by that unrelated issue. Focus on the core
> issue.
>
You are being over-simplistic.
Lack of IPv4 address space *caused* NAT to happen, the two are
inextricably intertwined. Even worse, people now have NAT conflated with
all sorts of other things. Like for example NAT and security.
NAT is the context of an IPv6 discussion is *very* relevant, it's one of
the points you have to raise to illustrate what bits inside people's
heads needs to be identified and changed.
Until you change the content of people's heads, IPv6 is just not going
to happen.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 22:00 ` Michael Mol
2013-03-11 1:56 ` Michael Orlitzky
@ 2013-03-11 22:34 ` Kevin Chadwick
2013-03-12 3:36 ` Michael Mol
1 sibling, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-11 22:34 UTC (permalink / raw
To: gentoo-user
> On 03/09/2013 07:53 AM, Kevin Chadwick wrote:
> >> "There is no reason to believe that IPv6 will result in an
> >> increased use of IPsec."
> >>
> >> Bull. The biggest barrier to IPsec use has been NAT! If an
> >> intermediate router has to rewrite the packet to change the
> >> apparent source and/or destination addresses, then the
> >> cryptographic signature will show it, and the packet will be
> >> correctly identified as having been tampered with!
> >>
http://marc.info/?l=openbsd-misc&m=135325641430178&w=2
> >
> > It's hardly difficult to get around that now is it.
>
> Sure, you can use an IP-in-IP tunnel...but that's retarded. IPSec was
> designed from the beginning to allow you to do things like sign your IP
> header and encrypt everything else (meaning your UDP, TCP, SCTP or what
> have you).
>
> Setting up a tunnel just so your IP header can be signed wastes another
> 40 bytes for every non-fragmented packet. Ask someone trying to use data
> in a cellular context how valuable that 40 bytes can be.
>
> > You are wrong the biggest barrier is that it is not desirable to do
> > this as there are many reasons for firewalls to inspect incoming
> > packets. I don't agree with things like central virus scanning
> > especially by damn ISPs using crappy Huawei hardware, deep inspection
> > traffic shaping rather than pure bandwidth usage tracking or active
> > IDS myself but I do agree with scrubbing packets.
>
> It's not the transit network's job to scrub packets. Do your scrubbing
> at the VPN endpoint, where the IPSec packets are unwrapped.
>
> Trusting the transit network to scrub packets is antithetical to the
> idea of using security measures to avoid MITM and traffic sniffing
> attacks in the first place!
>
I never said it was. I was more thinking of IPSEC relaying which would
be analogous to a VPN end point but without losing the end-end, neither
are desirable, NAT has little to do with the lack of IPSEC deployment.
What do you gain considering the increased resources, pointlessly
increasing chances of cryptanalysis and pointlessly increasing the
chances of exploitation due to the fact that the more complex IPSEC
itself can have bugs like Openssl does, not to mention amplifying DDOS
without the attacker doing anything, which is the biggest and more of a
threat than ever, or are you going to stop using the internet. When
ipv4 can utilise encryption without limitations including IPSEC but more
appropriately like ssh just fine when needed you see it is simply not
desirable and a panacea that will not happen. You are simply in a
bubble as the IETF were.
> >
> >> With IPsec, NAT is unnecessary. (You can still use it if you need
> >> it...but please try to avoid it!)
> >>
> >
> > Actually it is no problem at all and is far better than some of the
> > rubbish ipv6 encourages client apps to do. (See the links I sent in
> > the other mail)
>
> Please read the links before you send them, and make specific references
> to the content you want people to look at. I've read and responded to
> the links you've offered (which were links to archived messages on
> mailing lists, and the messages were opinion pieces with little (if any)
> technical material.)
>
> >
> >> Re "DNS support for IPv6"
> >>
> >> "Increased size of DNS responses due to larger addresses might be
> >> exploited for DDos attacks"
> >>
> >> That's not even significant. Have you looked at the size of DNS
> >> responses? The increased size of the address pales in comparison to
> >> the amount of other data already stuffed into the packet.
> >
> > It's been ages since I looked at that link and longer addresses
> > would certainly be needed anyway but certainly with DNSSEC again
> > concocted by costly unthoughtful and unengaging groups who chose to
> > ignore DJB and enable amplification attacks.
>
> What from DJB did they ignore? I honestly don't know what you're talking
> about.
>
They completely ignored dnscurve.org or that RSA768 was not strong
enough to be a good choice and ECDSA should be looked at and most
importantly the DOS amplification (we are talking years ago). I even had
a discussion with a dns caching tools (that I do like a lot) author who
completely dismissed the potential of RSA being broken for years and
years. Guess what's come to light since.
> >
> > His latest on the "DNS security mess"
> >
> > http://cr.yp.to/talks/2013.02.07/slides.pdf
>
> I've never before in my life seen someone animate slideshow transitions
> and save off intermediate frames as individual PDF pages. That was painful.
>
Yeah, xpdf worked well though. I actually couldn't find the link
and looked it up and thought it was just an update of 2012 as it had
the same title and only got around to reading it about an hour later.
> So, I read what was discussed there. First, he describes failings of
> HTTPSEC. I don't have any problem with what he's talking about there,
> honestly; it makes a reasonable amount of sense, considering
> intermediate caching servers aren't very common for HTTP traffic, and
> HTTPS traffic makes intermediate caching impossible. (unless you've
> already got serious security problems by way of a MITM opening.)
>
> Then he turns around and dedicates two slides showing a DNS delegation
> sequence...and then states in a single slide that DNSSEC has all the
> same problems as HTTPSEC.
>
> DNSSEC doesn't have the same problems as HTTPSEC, because almost *every*
> recursive resolving DNS server (which is most of the DNS servers on the
> Internet) employs caching.
>
I suggest you read the 2012 slides.
> >
> >> "An attacker can connect to an IPv4-only network, and forge IPv6
> >> Router Advertisement messages. (*)"
> >
> >> Again, this depends on them being on the same layer 2 network
> >> segment.
> >
> >> The same class of attacks would be possible for any IPv4 successor
> >> that implemented either RAs or DHCP.
> >
> > Neither of which I use.
>
> You're telling me you don't use DHCP? Seriously, that you statically
> configure the IPv4 addresses of all the hosts on your network?
>
> With one exception, I haven't personally seen a network configured in
> that way since 1998! Certainly, every network has some hosts configured
> statically, but virtually no network I've observed (and I've seen
> private networks between 2 and 50 hosts, and commercial networks between
> 5 and 30k hosts) managed completely statically.
>
None of my networks for way over a decade have ever employed DHCP and
boy am I glad in avoiding many security issues. That was one of the
first decisions in network design I made as a teenager.
In fact the only networks that do use DHCP by definition are not well
cared for such as roaming or tethering a laptop I trust little to my
phone which I also trust little and for many good, sorry very bad mobile
network reasons.
> >
> > As I said we would be here all day and that link wasn't as good as
> > the one I was actually looking for.
> >
> > local NAT done right is no problem and actually a good thing and I
> > have no issues playing games, running servers or anything else behind
> > NAT.
>
> See others' responses about port standardization, and about how it
> enforces a distinction between 'clients' and 'servers' that's
> unnecessary (and even harmful) for a variety of applications.
>
Boy should there be a distinction between clients and servers, without
it we would be in a world of pain. However I still atest that there is
no problem and far less than what ipv6 advocates.
> > Global NAT works well enough
>
> With global NAT, anything you do that depends on port forwarding is broken.
>
> > but isn't a good thing and wouldn't exist if they had simply added
> > more addresses quickly. The hardware uptake would have been no issue
> > rather than a decade of pleads.
>
> There's almost nothing you've pointed at so far that would have
> prevented backbones from IPv6 uptake...and the backbones dragged their
> heels long enough. IPv4 with expanded address bits would have been
> worse; IPv6 explicitly includes features intended to ease the strain on
> the size of a global routing view!
>
And much more which is the problem and yet still including the bad
parts of ipv4 apparently.
> >
> > We haven't even touched on the code yet and so all the vulnerable
> > especially home hardware which yes often has vulnerable sps anyway
> > but by no way just home hardware.
> >
> > The ipvshit links give an insight into the code complexity.
>
> You call that code complex? (and I still don't know what 'ipvshit' is,
> except possibly one guy's pejorative description of IPv6)
Think about what it is doing from the comment not the actual code.
>
> > Note OpenBSDs kernel which is very secure (unlike Linux whose
> > primary goal is function)
>
> I have no complaints about OpenBSD.
>
> > and has had just a few remote holes in well over a decade, one of
> > which was in ipv6
>
> So OpenBSD, who you venerate, had a bug in its IPv6 implementation, and
> for that you view IPv6 as an abomination? Is that it? (Or is it because
> the guy who wrote the buggy code thinks so, and you venerate him?
> Because that seems plausible, too.)
>
You seem to underestimate the gravity or such a bug making it into the
OpenBSD kernel.
However, not just that, try searching osvdb.org for ipv4 = < 1 page
ipv6 = > 3 pages
> > and which I had avoided without down time because I won't and what's
> > more shouldn't use ipv6 wherever possible
>
> Do you mean that as "I'll avoid IPv6 as much as possible" or do you mean
> that as "I won't use IPv6 in all places where it's possible to use IPv6"?
>
Former
> If the former, I'm afraid I still haven't seen a solid technical case
> against it.
>
> > and had actually removed it from the kernel all together.
>
> That's sensible; if you're not going to use code, remove it.
>
You would be surprised, many security books used to say it was a waste
of time. I ignored them.
> >
> > If I am Trolling rather than simply trying to make people aware then
> > stating ipv6 is wonderful is Trolling just as much or more.
>
> IPv6 fixes things about the Internet that are currently broken by IPv4
> address exhaustion. I try to point out where IPv6 fixes things, I try to
> clear up popular misconceptions about IPv6, and I try to help people
> understand a thing rather than simply fear it.
>
> If you take a highly competent IPv4 network administrator and drop him
> into IPv6 territory without ensuring that he has knowledge of IPv6 best
> practices and practical concerns, you're likely to get a broken network
> out of it. I try to help keep that from happening.
It is more than that. Though I am glad you are reducing the problems out
there. IPV6 unarguably is worse than IPV4. You can argue it is also
better but where if it is it serves no useful purpose for me that would
make me even consider using it unless it is redesigned.
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 8:22 ` Alan McKinnon
@ 2013-03-11 22:45 ` Walter Dnes
2013-03-11 23:39 ` Kevin Chadwick
` (2 more replies)
2013-03-11 23:31 ` Kevin Chadwick
1 sibling, 3 replies; 48+ messages in thread
From: Walter Dnes @ 2013-03-11 22:45 UTC (permalink / raw
To: gentoo-user
On Mon, Mar 11, 2013 at 10:22:39AM +0200, Alan McKinnon wrote
> You are being over-simplistic.
>
> Lack of IPv4 address space *caused* NAT to happen, the two are
> inextricably intertwined.
Agreed. But we shouldn't be pointing out that NAT has partially solved
the problem, and giving people false hope that NAT will solve the
shortage problem forever. We should be pounding away on the fact that
we're running out of IP addresses... period... end of story. If people
ask about NAT, then mention that the undersupply will be so bad that
even NAT won't help.
> Even worse, people now have NAT conflated with all sorts of other
> things. Like for example NAT and security.
That's why I wwant to avoid that propaganda battle. It's been lost
already. Deal with it. Don't waste time and effort on it. Put your
effort into pounding away on a simple issue that people do understand...
we're running out of IP addresses.
> NAT is the context of an IPv6 discussion is *very* relevant, it's
> one of the points you have to raise to illustrate what bits inside
> people's heads needs to be identified and changed.
>
> Until you change the content of people's heads, IPv6 is just not
> going to happen.
I disagree with you there. IPV6 adoption will be driven by shortage
of addresses, which people can understand. It will not be accomplished
by sermons about the evils of NAT whilst people's eyes glaze over.
"A preachment, dear friends, you are about to receive, is on John
Barleycorn, Nicotine, and the Temptations of NAT".
And if it comes down to it, I'd much rather have IPV6 with IPV6 NAT
being available, rather than no IPV6.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-10 21:28 ` Michael Mol
@ 2013-03-11 23:09 ` Kevin Chadwick
2013-03-12 5:05 ` Michael Mol
0 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-11 23:09 UTC (permalink / raw
To: gentoo-user
> No, there was simply no useful result that came up. Incidentally, both
> links you provide *did* come up...but I dismissed them because I
> couldn't imagine anyone using them as a reference except in trying to
> deride Henning Brauer.
>
> >
> > http://marc.info/?l=openbsd-misc&m=129666298029771&w=2
>
> He goes from advocating NAT444 to a spew of pejoratives about something.
> NAT444 is one of the nastiest, user-disempowering things to hit the
> Internet to date. The rest of this email is him bitching about having to
> parse CIDR notation.
>
How disengenuous. He certainly doesn't. Did you miss the sarcasm. The
only reason he advocates is because others using it allow him to keep
running ipv4 pure networks.
After that I'm sure you can forgive me if I note him to have absolutely
no reason to be biased and give him a bit more credit and take his
experience of writing one of the best and widely used interrupt driven
firewalls and so code to deal with ipv6, helping get the netqmail patch
sorted and runs his own decent sized network over yours who I am sure
is genuine but could well be partial to ipv6 because as you say you
teach setting up ipv6 networks.
http://marc.info/?l=openbsd-misc&m=124536321827774&w=2
> >
> > http://marc.info/?l=openbsd-misc&m=135325826302392&w=2
> >
>
> This email has absolutely no technical content whatsoever.
Did you not follow the threads?
I couldn't find the juicier threads about client troubles due to added
complexity but here's some relevent ones and many by very competent
devs. (and if I'm honest who tend to shadow every other list I've come
across so far as long as you are not timid and can take a hit, though
Gentoo is up there).
http://marc.info/?l=openbsd-misc&m=128822984018595&w=2
http://marc.info/?l=openbsd-misc&m=135325736302228&w=2
http://marc.info/?l=openbsd-misc&m=128825496411711&w=2
http://marc.info/?l=openbsd-misc&m=129665675320651&w=2
http://marc.info/?l=openbsd-misc&m=135111069427240&w=2
http://marc.info/?l=openbsd-misc&m=135110983026959&w=2
http://marc.info/?l=openbsd-misc&m=135110833526455&w=2
http://marc.info/?l=openbsd-misc&m=135110805826344&w=2
http://marc.info/?l=openbsd-misc&m=135110703125929&w=2
http://marc.info/?l=openbsd-misc&m=135110533625263&w=2
http://marc.info/?l=openbsd-misc&m=124537193506202&w=2
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 8:22 ` Alan McKinnon
2013-03-11 22:45 ` Walter Dnes
@ 2013-03-11 23:31 ` Kevin Chadwick
2013-03-12 0:37 ` Alan McKinnon
1 sibling, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-11 23:31 UTC (permalink / raw
To: gentoo-user
> >> NAT behind a home router is bad, too. For IPv4, it's only necessary
> >> because there aren't enough IPv4 addresses to let everyone have a unique
> >> one.
> >
> > The best real reason for moving to IPV6 is address space (or lack
> > thereof, in the case of IPV4). The people who are truly interested in
> > speeding up IPV6 adoption should do their best to shut up the internet
> > hippies who constantly rant and rave about how "NAT is evil". Don't let
> > the cause get distracted by that unrelated issue. Focus on the core
> > issue.
> >
I completely agree divide and conquer tactics.
>
> You are being over-simplistic.
>
> Lack of IPv4 address space *caused* NAT to happen, the two are
> inextricably intertwined. Even worse, people now have NAT conflated with
> all sorts of other things. Like for example NAT and security.
>
NAT was around way earlier and may I state again also that I have
externally facing servers and games machines behind NAT.
So are you saying that you think it is good for every machine to be in
a DMZ, few chosen ones yes. I disagree completely as I do with the
usefullness of push-email.
> NAT is the context of an IPv6 discussion is *very* relevant, it's one of
> the points you have to raise to illustrate what bits inside people's
> heads needs to be identified and changed.
>
> Until you change the content of people's heads, IPv6 is just not going
> to happen.
NAT has more uses than those two, NAT type of functionality is
apparently desired by some ipv6 networks to allow easier ISP
migration.
It's true NAT distracts from the bad points of ipv6 and which is the
only part irrelevent for ipv4 modded to work with a larger address space
(ipv5).
I wonder if this is an example of how these technologies can get so
convoluted?
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 22:45 ` Walter Dnes
@ 2013-03-11 23:39 ` Kevin Chadwick
2013-03-12 3:58 ` Walter Dnes
2013-03-12 0:25 ` Alan McKinnon
2013-03-12 2:02 ` Michael Mol
2 siblings, 1 reply; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-11 23:39 UTC (permalink / raw
To: gentoo-user
> Don't waste time and effort on it. Put your
> effort into pounding away on a simple issue that people do understand...
> we're running out of IP addresses.
We have run out of unallocated ones, there are still loads of unused
ones and even more due to global NAT, and even some being released.
It is true eventually it will be an absolute problem but hopefully by
then we will have a cleaner ipv7. Lets hope ISPs get smarter as
recently they have gone downhill with all their *DANGEROUS* as cited by
snort.org and compulsory layer 7 sifting.
Until ipv6 is revised I can't see a day when there will be no ipv4.
--
_______________________________________________________________________
'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'
(Doug McIlroy)
_______________________________________________________________________
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 22:45 ` Walter Dnes
2013-03-11 23:39 ` Kevin Chadwick
@ 2013-03-12 0:25 ` Alan McKinnon
2013-03-12 2:02 ` Michael Mol
2 siblings, 0 replies; 48+ messages in thread
From: Alan McKinnon @ 2013-03-12 0:25 UTC (permalink / raw
To: gentoo-user
On 12/03/2013 00:45, Walter Dnes wrote:
>> NAT is the context of an IPv6 discussion is *very* relevant, it's
>> > one of the points you have to raise to illustrate what bits inside
>> > people's heads needs to be identified and changed.
>> >
>> > Until you change the content of people's heads, IPv6 is just not
>> > going to happen.
> I disagree with you there. IPV6 adoption will be driven by shortage
> of addresses, which people can understand. It will not be accomplished
> by sermons about the evils of NAT whilst people's eyes glaze over.
> "A preachment, dear friends, you are about to receive, is on John
> Barleycorn, Nicotine, and the Temptations of NAT".
>
> And if it comes down to it, I'd much rather have IPV6 with IPV6 NAT
> being available, rather than no IPV6.
Hmmm, I'm still not convinced.
NAT (plus a whole boat load of other crap we've accumulated over the
years, NAT merely being the well-known poster-boy) is so ingrained in
people's heads it is now one of those things that we have to deal with.
Ignoring it (and the other crap too) is not going to change that it
really is up at the top of people's thought process.
When I say "people" I of course mean "people I interact with". I don't
claim to speak for all persons who deal with the internet somehow.
Yes, we should and must pound away that IPv4 is a limited resource and
it's close to being used up. But we still have to deal with the other
objections that rightly or wrongly get dumped on the table too.
Why do I think we must deal with these other issues rather than
concentrate on the major one? Because the other guy won't let it go and
won't really engage a discussion about IPv6 for real as he's sitting
with all these other objections uppermost in his mind. Chief amongst
them is the knowledge that he will have to redesign his entire network
from scratch (we all know that IPv6 is not a drop-in replacement for
IPv4) and the fear that somehow he has to keep business going and the
lights on while doing it. That scares people. Well, that's my experience
anyway.
Some days it feels like getting Kuthrapauli to talk to women. We know
all he needs to do is talk to them. He can't get past the thought that
he has to find a glass of wine first...
--
Alan McKinnon
Systems Engineer^W Technician
Infrastructure Services
Internet Solutions
+27 11 575 7585
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 23:31 ` Kevin Chadwick
@ 2013-03-12 0:37 ` Alan McKinnon
0 siblings, 0 replies; 48+ messages in thread
From: Alan McKinnon @ 2013-03-12 0:37 UTC (permalink / raw
To: gentoo-user
On 12/03/2013 01:31, Kevin Chadwick wrote:
>>>> NAT behind a home router is bad, too. For IPv4, it's only necessary
>>>> because there aren't enough IPv4 addresses to let everyone have a unique
>>>> one.
>>>
>>> The best real reason for moving to IPV6 is address space (or lack
>>> thereof, in the case of IPV4). The people who are truly interested in
>>> speeding up IPV6 adoption should do their best to shut up the internet
>>> hippies who constantly rant and rave about how "NAT is evil". Don't let
>>> the cause get distracted by that unrelated issue. Focus on the core
>>> issue.
>>>
>
> I completely agree divide and conquer tactics.
>
>>
>> You are being over-simplistic.
>>
>> Lack of IPv4 address space *caused* NAT to happen, the two are
>> inextricably intertwined. Even worse, people now have NAT conflated with
>> all sorts of other things. Like for example NAT and security.
>>
>
> NAT was around way earlier and may I state again also that I have
> externally facing servers and games machines behind NAT.
I fail to see your point, and you have answered a question I did not ask.
I too have that same circumstance, as likely does every one else here
who works in networks for a living. So what? We have that because the
environment gives us little choice. It doesn't make it good, bad,
desirable or undesirable. it simply is and we have few realistic
alternative choices.
>
> So are you saying that you think it is good for every machine to be in
> a DMZ, few chosen ones yes.
That's also a question I did not ask, and one I do not care to debate.
>I disagree completely as I do with the
> usefullness of push-email.
>
>> NAT is the context of an IPv6 discussion is *very* relevant, it's one of
>> the points you have to raise to illustrate what bits inside people's
>> heads needs to be identified and changed.
>>
>> Until you change the content of people's heads, IPv6 is just not going
>> to happen.
>
> NAT has more uses than those two, NAT type of functionality is
> apparently desired by some ipv6 networks to allow easier ISP
> migration.
You are going to have to back that up with some reasoned arguments.
The only reason I can see why some might desire that is their reluctance
to give up on old habits. happy to be shown to be wrong though.
>
> It's true NAT distracts from the bad points of ipv6 and which is the
> only part irrelevent for ipv4 modded to work with a larger address space
> (ipv5).
>
> I wonder if this is an example of how these technologies can get so
> convoluted?
McKinnon's Law of Human Implementation of Solutions:
Any sufficiently large and representative group of humans when faced
with making new choices to solve old problems, will always decide on the
most complex convoluted solution that can be implemented soonest.
Relevant? I dunno. But it sure sounds good.
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 22:45 ` Walter Dnes
2013-03-11 23:39 ` Kevin Chadwick
2013-03-12 0:25 ` Alan McKinnon
@ 2013-03-12 2:02 ` Michael Mol
2013-03-12 11:29 ` Alan McKinnon
2 siblings, 1 reply; 48+ messages in thread
From: Michael Mol @ 2013-03-12 2:02 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 5127 bytes --]
On 03/11/2013 06:45 PM, Walter Dnes wrote:
> On Mon, Mar 11, 2013 at 10:22:39AM +0200, Alan McKinnon wrote
>
>> You are being over-simplistic.
>>
>> Lack of IPv4 address space *caused* NAT to happen, the two are
>> inextricably intertwined.
>
> Agreed. But we shouldn't be pointing out that NAT has partially
> solved the problem, and giving people false hope that NAT will solve
> the shortage problem forever.
The truth of the matter is that it kinda does, for most of these people.
For most of those for whom it doesn't, there are (and will be) plenty of
third-party services looking to allow them to throw money at the problem
for an opaque solution. (It's like sausage; it works, it's nutritious,
it tastes great...but YMMV if you see how it's made.)
For small businesses for whom the IP shortage already crowded out of
traditional network management, the Cloud was born. Large businesses
make a mess of their networks, but hobble along.
So workarounds were developed. What NAT has *done*, though, is force a
stratification and classification of services, making vast swaths of
network applications impossible or incredibly niche.
If one doesn't acknowledge the truth of the matter, one gets nailed to
the wall with it when someone smart enough to consider it brings it up
as a counterpoint.
> We should be pounding away on the fact that we're running out of IP
> addresses... period... end of story. If people ask about NAT, then
> mention that the undersupply will be so bad that even NAT won't
> help.
In my presentations, I've stopped bothering to wait for people to ask
about NAT, because it starts off in their minds from nearly the
beginning--and until they get that question answered, most of what I say
washes past them as ancillary and not as important as the question
pressing on their minds.
>
>> Even worse, people now have NAT conflated with all sorts of other
>> things. Like for example NAT and security.
>
> That's why I wwant to avoid that propaganda battle. It's been lost
> already. Deal with it. Don't waste time and effort on it. Put your
> effort into pounding away on a simple issue that people do
> understand... we're running out of IP addresses.
That's the thing. We're running out, we've *run* out. Past tense. I keep
pointing to my friend whose ISP hands him RFC1918 addresses as an
example, because that's just the way things are. I can also point to
mobile carriers--most local network regions hand out RFC1918 addresses
for IPv4, which means you're double-NATting if you use your phone to
share your network connection.
At one point a couple *years* ago, my T-Mobile phone told me it had what
I thought was a public IPv4 address...but it turned out to be an address
owned by some security-related branch of the British government who
didn't advertise routes, and so T-Mobile was able to use British
government netblocks internally as a kind of extension to RFC1918 space.
Around the same time, a friend's Verizon phone in the area had a legit
public IPv4 address if and only if he was sharing his network connection
at that moment...otherwise Verizon would switch him back to an RFC1918
address.
So, I say again, we've run out of IPv4 addresses. Past tense. What's
left after that is to explain why most of the people you'll ever talk to
don't feel pain from it, and explain to them why their anaesthetic is
keeping them from realizing their network is paraplegic.
>
>> NAT is the context of an IPv6 discussion is *very* relevant, it's
>> one of the points you have to raise to illustrate what bits inside
>> people's heads needs to be identified and changed.
>>
>> Until you change the content of people's heads, IPv6 is just not
>> going to happen.
>
> I disagree with you there. IPV6 adoption will be driven by shortage
> of addresses, which people can understand.
I agree. The problem is that the IPv4 network as it exists today is
highly optimized for asymmetric client-server topologies, and the pains
and breakages will largely go unnoticed or unattributed due to the
layers upon layers of abstractions, band-aids and jerry-rigging.
As a consequence, it's necessary to help people understand what they're
missing.
> It will not be accomplished by sermons about the evils of NAT whilst
> people's eyes glaze over. "A preachment, dear friends, you are about
> to receive, is on John Barleycorn, Nicotine, and the Temptations of
> NAT".
I don't tend to encounter peoples' eyes glazing over. All my
presentations are in Q&A format. There's one guy who's gone to four of
them, because, as he told me, "it's different every time."
>
> And if it comes down to it, I'd much rather have IPV6 with IPV6 NAT
> being available, rather than no IPV6.
Sure. I think IPv6 NAT has its place, but I personally feel it should be
done above layer 3, in application-layer gateways. If you're in a
scenario where you need IPv6 NAT, you're almost certainly in a scenario
where you would benefit from the additional features an ALG would give you.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 22:34 ` Kevin Chadwick
@ 2013-03-12 3:36 ` Michael Mol
0 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-12 3:36 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 22464 bytes --]
On 03/11/2013 06:34 PM, Kevin Chadwick wrote:
>> On 03/09/2013 07:53 AM, Kevin Chadwick wrote:
>>>> "There is no reason to believe that IPv6 will result in an
>>>> increased use of IPsec."
>>>>
>>>> Bull. The biggest barrier to IPsec use has been NAT! If an
>>>> intermediate router has to rewrite the packet to change the
>>>> apparent source and/or destination addresses, then the
>>>> cryptographic signature will show it, and the packet will be
>>>> correctly identified as having been tampered with!
>>>>
>
> http://marc.info/?l=openbsd-misc&m=135325641430178&w=2
I believe you've misunderstood what Brauer is saying there.
"" NAT needs to process every packets
"
" opposed to the !NAT case, where a router doesn't have to "process"
" every packet. rrright.
"
Here, when Brauer is talking about processing, he's not talking about
tampering with (modifying) packets, he's talking about inspecting them
as part of connection state and for other things.
This is absolutely distinct from *modifying* the packet, which is what
IPsec is intended to detect. I also wouldn't count 'dropping' packets as
modification, as:
A) an intermediate firewall isn't likely to allow any packet of a stream
through to begin with if it's going to block any packet in the stream at
all.
B) Handling of dropped packets is the responsibility of the transport
layer. UDP is supposed to handle it in stride. TCP is supposed to notice
and retry.
>
>>>
>>> It's hardly difficult to get around that now is it.
>>
>> Sure, you can use an IP-in-IP tunnel...but that's retarded. IPSec
>> was designed from the beginning to allow you to do things like sign
>> your IP header and encrypt everything else (meaning your UDP, TCP,
>> SCTP or what have you).
>>
>> Setting up a tunnel just so your IP header can be signed wastes
>> another 40 bytes for every non-fragmented packet. Ask someone
>> trying to use data in a cellular context how valuable that 40 bytes
>> can be.
>>
>>> You are wrong the biggest barrier is that it is not desirable to
>>> do this as there are many reasons for firewalls to inspect
>>> incoming packets. I don't agree with things like central virus
>>> scanning especially by damn ISPs using crappy Huawei hardware,
>>> deep inspection traffic shaping rather than pure bandwidth usage
>>> tracking or active IDS myself but I do agree with scrubbing
>>> packets.
>>
>> It's not the transit network's job to scrub packets. Do your
>> scrubbing at the VPN endpoint, where the IPSec packets are
>> unwrapped.
>>
>> Trusting the transit network to scrub packets is antithetical to
>> the idea of using security measures to avoid MITM and traffic
>> sniffing attacks in the first place!
>>
>
> I never said it was. I was more thinking of IPSEC relaying which
> would be analogous to a VPN end point but without losing the end-end,
> neither are desirable,
Please, explain to me what the heck you mean, then? When you say
>>> You are wrong the biggest barrier is that it is not desirable to
>>> do this as there are many reasons for firewalls to inspect
>>> incoming packets.
I can't possibly understand what you're talking about except with the
context you've given me.
The only other thing I can take from what you're saying up to this point
is that you believe VPNs are bad, which I find, well, laughable.
> NAT has little to do with the lack of IPSEC deployment.
You keep saying this, but saying a thing doesn't make it understood; you
have to explain why.
>
> What do you gain considering the increased resources,
You mean the bandwidth overhead of the ESP and/or AH headers? As opposed
to, what, TLS? GRE? IP-in-TLS-in-IP?
Let me have a clean, cheap TCP-on-ESP-on-IP stack for my
campus-to-campus connections!
> pointlessly increasing chances of cryptanalysis and pointlessly
> increasing the chances of exploitation due to the fact that the more
> complex IPSEC itself can have bugs like Openssl does,
If I read your argument correctly, you would view encryption in general
as harmful?
> not to mention amplifying DDOS without the attacker doing anything,
> which is the biggest and more of a threat than ever,
One of my servers is currently undergoing a SYN flood. I'm well aware
that the Internet is a dangerous place.
Honestly, if someone wants to DDOS you, the increased amplification
factor of DNSSEC isn't going to be the deciding factor of whether your
server stays up or goes down.
> or are you going to stop using the internet.
Use hyperbole much?
> When ipv4 can utilise encryption without limitations including IPSEC
> but more appropriately like ssh just fine when needed you see it is
> simply not desirable and a panacea that will not happen. You are
> simply in a bubble as the IETF were.
For the purposes of tunnels, I've used IPsec on IPv4, SSH and TLS.
Quite frankly? IPsec on IPv6 is the least painful option of all of these.
IPsec on IPv4 is frustrating because the VPN clients are poorly
implemented, and you *must* use TCP/UDP-in-ESP/AH-in-(optional TCP or
UDP in)-IP, or you're not going to get through NAT without getting the
network administrator to explicitly set up a forward for you.
TLS works (and is very common for tunneling), but you're again stuck
with whatever-in-IP-in-TLS-in-TCP/UDP-in-IP. Or, more commonly,
whatever-in-IP-in-Ethernet-in-TLS-in-TCP/UDP-in-IP. I'd be amazed if you
didn't think that was a royal mess.
SSH for tunneling? *Royal* PITA, especially when you have to connect to
multiple places at once. If all you have is one endpoint you have to
connect to to get where you're going, you can use SOCKS. Otherwise,
you're forwarding ports. If you're forwarding ports, you're OK, so long
as you don't have to use the same local port for two different purposes.
And, yes, I've *seen* setups so convoluted that there were explicit
instructions stating which local port would have to be used for each
remote service, with server-side accommodations to suit, simply so that
those local ports wouldn't conflict.
With IPsec on IPv6, in *all* of the circumstances where I've required a
VPN, the setup would have been a clean (whatever)-in-ESP/AH-in-IP. That
would be *much* cleaner, and *much* more efficient at all levels of the
network.
>
>>>
>>>> With IPsec, NAT is unnecessary. (You can still use it if you
>>>> need it...but please try to avoid it!)
>>>>
>>>
>>> Actually it is no problem at all and is far better than some of
>>> the rubbish ipv6 encourages client apps to do. (See the links I
>>> sent in the other mail)
>>
>> Please read the links before you send them, and make specific
>> references to the content you want people to look at. I've read and
>> responded to the links you've offered (which were links to archived
>> messages on mailing lists, and the messages were opinion pieces
>> with little (if any) technical material.)
>>
>
>
>>>
>>>> Re "DNS support for IPv6"
>>>>
>>>> "Increased size of DNS responses due to larger addresses might
>>>> be exploited for DDos attacks"
>>>>
>>>> That's not even significant. Have you looked at the size of DNS
>>>> responses? The increased size of the address pales in
>>>> comparison to the amount of other data already stuffed into the
>>>> packet.
>>>
>>> It's been ages since I looked at that link and longer addresses
>>> would certainly be needed anyway but certainly with DNSSEC again
>>> concocted by costly unthoughtful and unengaging groups who chose
>>> to ignore DJB and enable amplification attacks.
>>
>> What from DJB did they ignore? I honestly don't know what you're
>> talking about.
>>
>
> They completely ignored dnscurve.org
You know, I managed to read up on DNSCurve thanks to the link Michael
Orlitzky provided, and you know what I think of it?
I think it would do more harm to the DNS infrastructure than good. The
implementation advocated would disallow intermediary DNS servers, and
that is a *very bad thing*, because it disallows caching.
Caching isn't just about being able to get a response to the client
quickly. It's also about being able to get a response to the client *at
all*.
By default, a DNS resolver will make a query, wait 30s for a timeout,
retry their query, wait significantly longer for a timeout, and then try
a third time while waiting significantly longer.
If the resolver's query reaches the DNS server fine, and the DNS
server's response reaches the resolver fine, all is well. If the query
or response packets get lost along the way, then the resolver (which is
probably someone's web browser) waits 30s before it tries again. 30s is
a *long* time. Your average user will only wait 10s before hitting F5 or
moving along.
Now, consider a typical modern residential network:
{( internet )} -> ISP -> ADSL -> home router -> end user.
That ADSL link is an absolutely treacherous beast. It drops packets
without mercy, and the more you can accomplish without having to send
packets across it, the better. Unfortunately, your average modern
website includes files from up to a dozen different domains, with a few
redirections involved for most of them.
The typical modern home router has a caching DNS server built-in because
DNS commonly operates over UDP, and UDP does not provide delivery
guarantee. The end user's resolver (which is in their web browser)
queries the home router, which then recurses and makes the query of the
upstream servers on the end-user's behalf. Once the recursive resolver
gets a response, it caches that response.
I use a Debian PC as my home router. When I was on DSL, I initially
didn't set up a caching recursive resolver. (I also didn't have caching
recursive resolvers installed locally on my machines.) The Internet felt
terrible. Half the resources on any given social media site or complex
web page didn't load until the second or third refresh, simply because
the DNS requests to find the relevant servers got lost along the way.
Once I set up a caching recursive resolver on my router, my Internet
experience improved dramatically.
Now consider a more painful (yet still typical) network:
{( internet )} -> ISP -> ADSL -> wifi hot spot -> end user
That wifi hot spot hammers packets harder than the ADSL link that's also
taking its due. Between having too many APs in a given area, too many
clients on a public network and too much ambient noise in the 2.4GHz ISM
band, getting a packet through that network is like playing frogger
blind; you only accomplish it because your computer plays the game with
infinite lives and doesn't let you see all the times the frog got squished.
This is why all Windows systems have had caching recursive resolvers
built-in for years, and why NetworkManager likes to use dnsmasq; you've
added caching to local systems to work around terrible local physical
layers.
Do we need to get into using cellular connections and tethering in
non-urban areas? I could tell you about a six-mile stretch on my wife's
daily commute that the phone claims to have data service in, but can't
get a packet through to save its battery.
> or that RSA768 was not strong enough to be a good choice
I don't think many people seriously anticipated how rapidly Moore's law
would catch up with public-key cryptography. I'm not sure *anybody*
without security clearance or heavy NDAs could have anticipated it using
any sane series of logic.
> and ECDSA should be looked at and most importantly the DOS
> amplification (we are talking years ago).
I understand that this is a key issue for you. I can't comprehend why,
as I can't see why it's as significant an issue as you seem to believe
it to be.
> I even had a discussion with a dns caching tools (that I do like a
> lot) author who completely dismissed the potential of RSA being
> broken for years and years. Guess what's come to light since.
As I said, Moore's law managed to surprise a great number of very
reasonable people. There's *no* way that anyone in 1995 could have
reasonably anticipated the rise of fully-programmable
mass-parallel-calculation engines whose development was driven and made
cheap (and thus highly, highly scaleable) by *video games*.
>
>>>
>>> His latest on the "DNS security mess"
>>>
>>> http://cr.yp.to/talks/2013.02.07/slides.pdf
>>
>> I've never before in my life seen someone animate slideshow
>> transitions and save off intermediate frames as individual PDF
>> pages. That was painful.
>>
>
> Yeah, xpdf worked well though. I actually couldn't find the link and
> looked it up and thought it was just an update of 2012 as it had the
> same title and only got around to reading it about an hour later.
>
>> So, I read what was discussed there. First, he describes failings
>> of HTTPSEC. I don't have any problem with what he's talking about
>> there, honestly; it makes a reasonable amount of sense,
>> considering intermediate caching servers aren't very common for
>> HTTP traffic, and HTTPS traffic makes intermediate caching
>> impossible. (unless you've already got serious security problems by
>> way of a MITM opening.)
>>
>> Then he turns around and dedicates two slides showing a DNS
>> delegation sequence...and then states in a single slide that DNSSEC
>> has all the same problems as HTTPSEC.
>>
>> DNSSEC doesn't have the same problems as HTTPSEC, because almost
>> *every* recursive resolving DNS server (which is most of the DNS
>> servers on the Internet) employs caching.
>>
>
> I suggest you read the 2012 slides.
Provide me with a link, and I will. I'm not going to go digging without
a strong idea of what I'm looking for, and where to find it.
>
>>>
>>>> "An attacker can connect to an IPv4-only network, and forge
>>>> IPv6 Router Advertisement messages. (*)"
>>>
>>>> Again, this depends on them being on the same layer 2 network
>>>> segment.
>>>
>>>> The same class of attacks would be possible for any IPv4
>>>> successor that implemented either RAs or DHCP.
>>>
>>> Neither of which I use.
>>
>> You're telling me you don't use DHCP? Seriously, that you
>> statically configure the IPv4 addresses of all the hosts on your
>> network?
>>
>> With one exception, I haven't personally seen a network configured
>> in that way since 1998! Certainly, every network has some hosts
>> configured statically, but virtually no network I've observed (and
>> I've seen private networks between 2 and 50 hosts, and commercial
>> networks between 5 and 30k hosts) managed completely statically.
>>
>
> None of my networks for way over a decade have ever employed DHCP
> and boy am I glad in avoiding many security issues. That was one of
> the first decisions in network design I made as a teenager.
>
> In fact the only networks that do use DHCP by definition are not
> well cared for such as roaming or tethering a laptop I trust little
> to my phone which I also trust little and for many good, sorry very
> bad mobile network reasons.
You're pretty much in a class of your own, there. I'm sorry to say I
can't empathize or agree in the slightest...
>
>>>
>>> As I said we would be here all day and that link wasn't as good
>>> as the one I was actually looking for.
>>>
>>> local NAT done right is no problem and actually a good thing and
>>> I have no issues playing games, running servers or anything else
>>> behind NAT.
>>
>> See others' responses about port standardization, and about how it
>> enforces a distinction between 'clients' and 'servers' that's
>> unnecessary (and even harmful) for a variety of applications.
>>
>
> Boy should there be a distinction between clients and servers,
> without it we would be in a world of pain.
Why? You keep making statements without giving reasons for them.
> However I still atest that there is no problem and far less than
> what ipv6 advocates.
Are you referring to the problems identified by the slides you've
referenced so far? And that I've largely addressed, debunked or pointed
out are no worse than IPv4? You never gave me a point-by-point
response...instead you indicated the slide deck wasn't as good as the
one you were looking for. Apart from your finding any dynamic network
configuration appalling, I don't know what you're talking about.
>
>>> Global NAT works well enough
>>
>> With global NAT, anything you do that depends on port forwarding is
>> broken.
>>
>>> but isn't a good thing and wouldn't exist if they had simply
>>> added more addresses quickly. The hardware uptake would have been
>>> no issue rather than a decade of pleads.
>>
>> There's almost nothing you've pointed at so far that would have
>> prevented backbones from IPv6 uptake...and the backbones dragged
>> their heels long enough. IPv4 with expanded address bits would have
>> been worse; IPv6 explicitly includes features intended to ease the
>> strain on the size of a global routing view!
>>
>
> And much more which is the problem
Wait, what? No!
I'm talking about route aggregation, which comes in part from the use of
CIDR notation. Through route aggregation, you reduce the number of
entries in the routing table. Yes, the byte size of the global routing
view will grow with IPv6. IPv4 with 128 address bits would have been far
worse, unless route aggregation was made part of its design (as was done
with IPv6).
> and yet still including the bad parts of ipv4 apparently.
Are there any parts of IPv4 that IPv6 carries that you consider bad
parts, or are we just talking about DHCP again?
>
>>>
>>> We haven't even touched on the code yet and so all the vulnerable
>>> especially home hardware which yes often has vulnerable sps
>>> anyway but by no way just home hardware.
>>>
>>> The ipvshit links give an insight into the code complexity.
>>
>> You call that code complex? (and I still don't know what 'ipvshit'
>> is, except possibly one guy's pejorative description of IPv6)
>
> Think about what it is doing from the comment not the actual code.
You mean this seemingly harmless comment?
/*
* sin6_len is the size of the sockaddr so substract the offset of
* the possibly truncated sin6_addr struct.
*/
Or do you mean this advocacy of NAT444
" who sez that your made up isp has to hand out network-wide unique IPs
" to his customers?
This attack on the person he's replying to:
" why do i even waste time on some ipvshit advocate that acts like a
" politician claiming we have to eat shit because there wouldn't be an
" alternative, making up a case out of nothing to "prove" his case?
Or his diatribe about IPv6?
" look at the oh so bright future yourself, look at the code required to
" deal with that misdesigned piece of shit.
" did i just say "designed"? sorry. it's obvious that nothing remotely
" related to design was involved.
I'm not seeing what I've misinterpreted.
>
>>
>>> Note OpenBSDs kernel which is very secure (unlike Linux whose
>>> primary goal is function)
>>
>> I have no complaints about OpenBSD.
>>
>>> and has had just a few remote holes in well over a decade, one of
>>> which was in ipv6
>>
>> So OpenBSD, who you venerate, had a bug in its IPv6 implementation,
>> and for that you view IPv6 as an abomination? Is that it? (Or is it
>> because the guy who wrote the buggy code thinks so, and you
>> venerate him? Because that seems plausible, too.)
>>
>
> You seem to underestimate the gravity or such a bug making it into
> the OpenBSD kernel.
You seem to labor under the misunderstanding that OpenBSD is perfect.
>
> However, not just that, try searching osvdb.org for ipv4 = < 1 page
>
> ipv6 = > 3 pages
You know what I'm noticing in those three pages? Most of those bugs are
in hardware vendor firmware. I don't think it would have been any better
if they'd had to implement a "IPv4 with extended address bits" protocol.
Say what you want about IPv6 being complex, the truth is that IPv6 was
explicitly designed to simplify and streamline packet routing.
>
>>> and which I had avoided without down time because I won't and
>>> what's more shouldn't use ipv6 wherever possible
>>
>> Do you mean that as "I'll avoid IPv6 as much as possible" or do you
>> mean that as "I won't use IPv6 in all places where it's possible to
>> use IPv6"?
>>
>
> Former
>
>> If the former, I'm afraid I still haven't seen a solid technical
>> case against it.
>>
>
>
>>> and had actually removed it from the kernel all together.
>>
>> That's sensible; if you're not going to use code, remove it.
>>
>
> You would be surprised, many security books used to say it was a
> waste of time. I ignored them.
>
>>>
>>> If I am Trolling rather than simply trying to make people aware
>>> then stating ipv6 is wonderful is Trolling just as much or more.
>>
>> IPv6 fixes things about the Internet that are currently broken by
>> IPv4 address exhaustion. I try to point out where IPv6 fixes
>> things, I try to clear up popular misconceptions about IPv6, and I
>> try to help people understand a thing rather than simply fear it.
>>
>> If you take a highly competent IPv4 network administrator and drop
>> him into IPv6 territory without ensuring that he has knowledge of
>> IPv6 best practices and practical concerns, you're likely to get a
>> broken network out of it. I try to help keep that from happening.
>
> It is more than that. Though I am glad you are reducing the problems
> out there.
I want to highlight this next bit.
> IPV6 unarguably is worse than IPV4. You can argue it is
> also better
...
> but where if it is it serves no useful purpose for me
> that would make me even consider using it unless it is redesigned.
I can't say nobody is going to force you to use IPv6. That would be a
lie. Eventually, there will be services on the Internet which you won't
be able to access without using IPv6 in some way.
It's far better to learn how to use the thing (better still, learn how
to use it properly!) than to get pushed deeper into the pool without
first learning how to swim.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 23:39 ` Kevin Chadwick
@ 2013-03-12 3:58 ` Walter Dnes
0 siblings, 0 replies; 48+ messages in thread
From: Walter Dnes @ 2013-03-12 3:58 UTC (permalink / raw
To: gentoo-user
On Mon, Mar 11, 2013 at 11:39:35PM +0000, Kevin Chadwick wrote
> > Don't waste time and effort on it. Put your
> > effort into pounding away on a simple issue that people do understand...
> > we're running out of IP addresses.
>
> We have run out of unallocated ones, there are still loads of unused
> ones... and even some being released.
And they'll run out rather quickly at the rate they're being assigned.
There are approximately 3.7 billion usable IPV4 addresses. Soon, that
will be one for every 2 people on this planet. And don't forget the
people who have an account at home, a smartphone with web access, and an
internet-connected desktop at work. Conservation of IP addresses will
buy us a couple more years, but that's it.
> and even more due to global NAT...
In another message you said...
> ...and may I state again also that I have externally facing servers
> and games machines behind NAT.
Yes, that works if *YOU* have at least 1 public IP address and *YOU*
control port-forwarding. But it won't work behind carrier-level NAT.
> It is true eventually it will be an absolute problem but hopefully by
> then we will have a cleaner ipv7.
It won't happen. It's too late to start from scratch, and the IPV6
rollout has already begun.
--
Walter Dnes <waltdnes@waltdnes.org>
I don't run "desktop environments"; I run useful applications
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-11 23:09 ` Kevin Chadwick
@ 2013-03-12 5:05 ` Michael Mol
0 siblings, 0 replies; 48+ messages in thread
From: Michael Mol @ 2013-03-12 5:05 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 12151 bytes --]
On 03/11/2013 07:09 PM, Kevin Chadwick wrote:
>> No, there was simply no useful result that came up. Incidentally,
>> both links you provide *did* come up...but I dismissed them
>> because I couldn't imagine anyone using them as a reference except
>> in trying to deride Henning Brauer.
>>
>>>
>>> http://marc.info/?l=openbsd-misc&m=129666298029771&w=2
>>
>> He goes from advocating NAT444 to a spew of pejoratives about
>> something. NAT444 is one of the nastiest, user-disempowering
>> things to hit the Internet to date. The rest of this email is him
>> bitching about having to parse CIDR notation.
>>
>
> How disengenuous. He certainly doesn't.
Advocacy of NAT444:
" who sez that your made up isp has to hand out network-wide unique IPs
" to his customers?
Bitching about having to parse CIDR:
" look at the oh so bright future yourself, look at the code required to
" deal with that misdesigned piece of shit.
" did i just say "designed"? sorry. it's obvious that nothing remotely
" related to design was involved.
> Did you miss the sarcasm.
Pretty sure I didn't.
> The only reason he advocates is because others using it allow him to
> keep running ipv4 pure networks.
That's some useful context.
>
> After that I'm sure you can forgive me if I note him to have
> absolutely no reason to be biased and give him a bit more credit and
> take his experience of writing one of the best and widely used
> interrupt driven firewalls and so code to deal with ipv6, helping
> get the netqmail patch sorted and runs his own decent sized network
So he's a smart guy with a decent amount of experience. That doesn't
make him right.
Let me tell you about a similar guy I know. Let's start with my
biological father. He started programming as a kid when he got his hands
on a 6802 evaluation board, wrote his own operating systems, had a hand
in designing the bar code format the US postal service uses for sorting
and routing, and provided the local municipality with its first remote
electronic monitoring of its water tower. He was one of the first people
to jump into Windows NT, with Windows NT 3.51, as he understood the
value the NT kernel offered over the DOS-based versions of Windows.
He was quite a guy. But he wasn't always right. He *hated* the
transition from MFM to IDE drives, as he wasn't able to perform the
kinds of diagnostics he wanted to. Once he latched on to Windows NT, he
never let go of Microsoft for a second. He didn't see a point to POSIX,
UNIX or Linux, and I was never able to get him interested. With the
exception of things written or distributed by Microsoft, he never used
third-party tools, and had to write everything from the ground-up the
way he wanted it. When given specs by other people, he would hand them a
product that was what he thought they needed, not what they asked for.
He further never felt the need to work with or learn from anyone else in
his field.
He's brilliant. Quite literally an accomplished genius...but once he got
it in his head that he knew what needed to be known, there wasn't room
for much new, and there wasn't room for much new. I've tried working
with him in architecting web services, and I couldn't. He rejected the
idea of using any existing data serialization or transport format,
because it wouldn't be as efficient as something he could write. His
system architecture relied on a central synchronous component, but the
goal of the system was supposed to support scaling. (It couldn't.)
Just because he was amazing and awesome among his contemporaries in the
past doesn't say anything about his relative skill and knowledge in the
present.
> over yours who I am sure is genuine but could well be partial to
> ipv6 because as you say you teach setting up ipv6 networks.
You need to analyze things on their technical merits, not just on who
says them. I won't ask someone to use IPv6 where it's inappropriate. I
do believe in pragmatic solutions (systemd and merged /usr
notwithstanding ;) ). I don't generally hold for Ludditism.
If someone wants to actively reject a technology, I'd like to at least
make sure it's for the right reasons.
>
> http://marc.info/?l=openbsd-misc&m=124536321827774&w=2
True enough. And since we're there, it's critical that people learn how
to handle their problems.
>
>>>
>>> http://marc.info/?l=openbsd-misc&m=135325826302392&w=2
>>>
>>
>> This email has absolutely no technical content whatsoever.
>
> Did you not follow the threads?
No. If you want me to read something, you need to point at what I should
read. You didn't indicate I should be reading a thread (as opposed to an
individual message...)
>
> I couldn't find the juicier threads about client troubles due to
> added complexity but here's some relevent ones and many by very
> competent devs. (and if I'm honest who tend to shadow every other
> list I've come across so far as long as you are not timid and can
> take a hit, though Gentoo is up there).
>
> http://marc.info/?l=openbsd-misc&m=128822984018595&w=2
Re: ARP -- Sure, they don't like ND. That's fine; we covered that earlier.
Re: IPv6 routing -- That's, er, pretty comfortably solved. For a *long*
time. About the only real problem right now is the spat between a couple
of the tier 1 backbones...but that's not a problem with IPv6 per se.
Re: Sockaddr size and alignment...I don't see the problem; alignment and
padding is de jure in software development these days, if only for
performance reasons. That said,
> http://marc.info/?l=openbsd-misc&m=135325736302228&w=2
Peltola is making arguments I've never heard discussed in practice, and
Brauer is rightfully reading him the riot act.
> http://marc.info/?l=openbsd-misc&m=128825496411711&w=2
Honestly, if they set up a donation drive, I'm willing to bet they could
have pulled together enough money to get in. However, they either didn't
think of this, didn't think they could pull together enough money, or
didn't really want to have to associate with the committees they're so
angry with. (I think it's most likely a combination of those last two.)
> http://marc.info/?l=openbsd-misc&m=129665675320651&w=2
Here, Brauer is advocating something that's not really possible (AFAIK)
per ARIN, APNIC, LAPNIC and RIPE policies.
It'd start with "Hey, APNIC, we see you haven't been assigning many
netblocks. We're going to take a few of those back."
For ARIN, LAPNIC and RIPE, it'd be "Hey, entity that paid for a
perpetual license to that net block. We don't think you're using your
address space efficiently enough, so we're going to take some of those
blocks back."
That'd go over *real* well. Start with holding back technological
development on Africa, continue with making it uncertain whether or not
one gets to keep their IP range after they've paid for it. I can just
picture all the rule lawyering and metric gaming as IP block holders
examine qualification rules and contort their networks to behave less
efficiently (but more efficiently per the qual rules!) so things hold
together.
> http://marc.info/?l=openbsd-misc&m=135111069427240&w=2
" Ha ha ha ha, this will work for a single host but how will you manage
" multiple ones. Bonus question, how do you think the host router with "
no knowledge of the underlying network topology will choose a route?
To start with, RAs include route preference metrics as well as route
packing; the network router can not only declare the prefix it's
responsible for, but it can also announce that it has more-specific
routes for other address ranges, too. I use this at home, where I've
given my wired network and my wireless network different /64s out of the
same /48. The RA for my wired network also announces that the router has
a specific route for the /64 for the wireless network, and the RA for
the wireless network announces that the router has a specific route for
the /64 for the wired network.
Basically, the host router has as much topology knowledge as the
router's RA is configured to include.
Claudo goes on to assert that SCTP is over-engineered. I guess that
might be true if you believe that separate UDP and TCP streams are
sufficient...but I've had to cope with scenarios where they aren't. SCTP
solves problems that exist in the real world.
He then goes on to assert that end hosts can't handle the truth of the
network around them. I don't buy it...
> http://marc.info/?l=openbsd-misc&m=135110983026959&w=2
RIPE's allocation policy was screwy. OK, sure. Not sure what that has to
do with anything.
> http://marc.info/?l=openbsd-misc&m=135110833526455&w=2
" As someone working for a 'Carrier' vendor - I can tell you straight
" up that LSN(Large Scale) or CGN(Carrier Grad) NAT are big sell points
" (i.e customers are asking for them).
So, as a guy who sells NAT solutions, he can say that customers are
asking for NAT solutions. (Well, I should hope so for logic's sake, or
they wouldn't be customers...)
The rest of the email is spot on. NAT64 is an excellent transition
mechanism. But it's exactly that: A *transition* mechanism.
> http://marc.info/?l=openbsd-misc&m=135110805826344&w=2
Peltola is arguing that NAT66 is possible (it is).
Theo is dismissing Peltola, saying that in IPv6, applications should
handle address changes. (They should.)
Both are correct.
Theo goes on to say that not everything roams. (He's correct.)
> http://marc.info/?l=openbsd-misc&m=135110703125929&w=2
I don't understand the network context Theo is describing. It sounds
like he's describing a scenario where a network has two IPv4 ISPs who
allow same IP range (controlled by the network admin, presumably PI
space), but where that same network has two IPv6 ISPs who each demand
the network admin only send traffic out using IPv6 prefixes they're
delegating.
This is a retarded arrangement; the ISPs should offer parity between
IPv4 and IPv6, meaning they should allow PI space in both cases.
Even if you assume Theo is talking about IPv4 NAT here, IPv4 NAT isn't
going to solve the problem. When your NATting router has to switch from
one ISP to the other, it'd have to switch from one IPv4 IP to another,
resulting in the exact same scenario he's claiming IPv6 would uniquely
require him to solve.
Finally, if you assume that Theo is talking about some kind of
connection to another host that doesn't require ISP routing (so it might
be via a VPN tunnel or on the local network), then it almost makes
sense; the IPv4 context would assume you're in RFC1918 space thanks to
your NAT, so your IPv4 addresses wouldn't change as your upstream
network connection changes. Meanwhile, your IPv6 context would change,
because one of your two prefixes would drop out, and anything using it
would fail.
Except Theo's solution to this is also silly. In this final scenario,
there's already a solution at hand: ULA addresses. They're IPv6's
equivalent to IPv4's RFC1918 space, and it's generally suggested that
you use ULA on your internal network in order to provide stable
addressing within your network to services on your network--which neatly
(and by design) avoids the problem Theo claims he's forced to solve.
Remember that in IPv6, you can (and will) have multiple IP addresses
with different prefixes attached to each NIC. At the very least, you'll
have a link-local IPv6 address. You will probably also have a
global-scope IPv6 address--possibly many. You may have an address
derived from a ULA prefix--possibly many such prefixes. Your network can
be as complex or as simple as you choose to make it, but the ULA address
space is there to solve this kind of problem.
> http://marc.info/?l=openbsd-misc&m=135110533625263&w=2
I expect PI space will become more attainable; it simply must. Other
than that, I don't agree with anything Simon or Theo say here.
> http://marc.info/?l=openbsd-misc&m=124537193506202&w=2
Again, no technical content...
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 555 bytes --]
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-12 2:02 ` Michael Mol
@ 2013-03-12 11:29 ` Alan McKinnon
2013-03-13 0:26 ` [Bulk] " Kevin Chadwick
0 siblings, 1 reply; 48+ messages in thread
From: Alan McKinnon @ 2013-03-12 11:29 UTC (permalink / raw
To: gentoo-user
On 12/03/2013 04:02, Michael Mol wrote:
>> We should be pounding away on the fact that we're running out of IP
>> > addresses... period... end of story. If people ask about NAT, then
>> > mention that the undersupply will be so bad that even NAT won't
>> > help.
> In my presentations, I've stopped bothering to wait for people to ask
> about NAT, because it starts off in their minds from nearly the
> beginning--and until they get that question answered, most of what I say
> washes past them as ancillary and not as important as the question
> pressing on their minds.
>
In one short paragraph you said exactly what I was trying to say in 4
mails (and still didn't succeed)
--
Alan McKinnon
alan.mckinnon@gmail.com
^ permalink raw reply [flat|nested] 48+ messages in thread
* Re: [Bulk] Re: [Bulk] Re: [gentoo-user] /etc/hosts include file?
2013-03-12 11:29 ` Alan McKinnon
@ 2013-03-13 0:26 ` Kevin Chadwick
0 siblings, 0 replies; 48+ messages in thread
From: Kevin Chadwick @ 2013-03-13 0:26 UTC (permalink / raw
To: gentoo-user
On Tue, 12 Mar 2013 13:29:38 +0200
Alan McKinnon <alan.mckinnon@gmail.com> wrote:
> >> We should be pounding away on the fact that we're running out of
> >> IP
> >> > addresses... period... end of story. If people ask about NAT,
> >> > then mention that the undersupply will be so bad that even NAT
> >> > won't help.
> > In my presentations, I've stopped bothering to wait for people to
> > ask about NAT, because it starts off in their minds from nearly the
> > beginning--and until they get that question answered, most of what
> > I say washes past them as ancillary and not as important as the
> > question pressing on their minds.
> >
>
> In one short paragraph you said exactly what I was trying to say in 4
> mails (and still didn't succeed)
You know I agree except the only people that brought NAT up and
got fixated on it were those that were advocating ipv6!?!?
^ permalink raw reply [flat|nested] 48+ messages in thread
end of thread, other threads:[~2013-03-13 0:26 UTC | newest]
Thread overview: 48+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-03-07 22:24 [gentoo-user] /etc/hosts include file? Alan McKinnon
2013-03-07 23:50 ` Michael Mol
2013-03-08 0:29 ` Michael Mol
2013-03-08 8:32 ` Alan McKinnon
2013-03-08 13:40 ` Michael Mol
2013-03-08 13:54 ` Alan McKinnon
2013-03-08 19:50 ` [Bulk] " Kevin Chadwick
2013-03-08 19:55 ` Michael Mol
2013-03-08 21:49 ` Kevin Chadwick
2013-03-08 22:36 ` Pandu Poluan
2013-03-09 0:50 ` Kevin Chadwick
2013-03-09 3:27 ` Michael Mol
2013-03-09 12:53 ` Kevin Chadwick
2013-03-10 21:28 ` Michael Mol
2013-03-11 23:09 ` Kevin Chadwick
2013-03-12 5:05 ` Michael Mol
2013-03-09 0:13 ` Walter Dnes
2013-03-09 0:41 ` Michael Mol
2013-03-10 1:42 ` Walter Dnes
2013-03-10 4:59 ` Michael Orlitzky
2013-03-10 21:09 ` Michael Mol
2013-03-10 5:19 ` Alan McKinnon
2013-03-10 21:07 ` Michael Mol
2013-03-10 21:43 ` Alan McKinnon
2013-03-10 22:02 ` Michael Mol
2013-03-11 4:00 ` Walter Dnes
2013-03-11 4:37 ` Michael Mol
2013-03-11 8:22 ` Alan McKinnon
2013-03-11 22:45 ` Walter Dnes
2013-03-11 23:39 ` Kevin Chadwick
2013-03-12 3:58 ` Walter Dnes
2013-03-12 0:25 ` Alan McKinnon
2013-03-12 2:02 ` Michael Mol
2013-03-12 11:29 ` Alan McKinnon
2013-03-13 0:26 ` [Bulk] " Kevin Chadwick
2013-03-11 23:31 ` Kevin Chadwick
2013-03-12 0:37 ` Alan McKinnon
2013-03-09 0:45 ` Kevin Chadwick
2013-03-09 3:21 ` Michael Mol
2013-03-09 12:53 ` Kevin Chadwick
2013-03-10 22:00 ` Michael Mol
2013-03-11 1:56 ` Michael Orlitzky
2013-03-11 2:33 ` Michael Mol
2013-03-11 22:34 ` Kevin Chadwick
2013-03-12 3:36 ` Michael Mol
2013-03-08 15:39 ` Florian Philipp
2013-03-08 4:30 ` Pandu Poluan
2013-03-08 8:23 ` Alan McKinnon
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox