[dns-operations] Configurable TC=1?
Frank Bulk
frnkblk at iname.com
Mon Dec 28 03:18:26 UTC 2015
It's amazing how much the SAV on our CMTS catches.
Looking at last week's data that has 4700 CMs:
239,276 hits
231,320 were from 192.168.0.0/16 address space
88 were from 172.16.0.0/12 address space
0 were from 10.0.0.0/8 address space
886 CMs (18.9%) were involved
935 CPE were involved (so some modems had more than one CPE attached)
Frank
-----Original Message-----
From: dns-operations [mailto:dns-operations-bounces at dns-oarc.net] On Behalf
Of Roland Dobbins
Sent: Wednesday, December 23, 2015 9:48 PM
To: dns-operations at dns-oarc.net
Cc: dns-operations at dns-oarc.net
Subject: Re: [dns-operations] Configurable TC=1?
On 24 Dec 2015, at 10:28, Paul Vixie wrote:
> we should tell IDC's they can do whatever they need to do in-house,
> but when it's time for a packet to leave the house, it
> should have an IDC-assigned source IP address, or some other address
> from a very small list
> of exceptions.
But telling people isn't working.
The power of the default continues to hold sway. My contention is that
source-address validation can potentially become a default setting in
two topological scenarios without breaking the world:
1. Wireline broadband access layer.
2. IDC access layer (with VMotion-like scenarios being the most
significant caveat).
> actually, it's a gigantic problem.
I don't have any statistics, but my (totally subjective) gut feeling is
that CPE NATs passing along out-of-scope packets unmodified isn't that
common. Is it your gut feeling that it is in fact a fairly commonplace
problem, and/or do you know if anyone has any data on the popularity of
CPE NATs which exhibit this particular flavor of brokenness?
Correction is very welcome, if indeed this is an issue with a relatively
high degree of prevalence.
Of course, source-address validation by default in the wireline
broadband access layer would mask this issue, irrespective of its
prevalence. But we need a better feel for the scope of the CPE NAT
scope problem, just the same, because we must press this issue on
multiple fronts.
What I would really like to see is a conclave involving the major
operating system vendors - Microsoft, Apple, Google, the appropriate
Linux distros, FreeBSD - with the aim of convincing them that it's in
their interest to incorporate Spoofer Project-type functionality
(<http://spoofer.caida.org/>) into the operating systems they produce,
with the resultant data published and analyzed on a pubicly-accessible
portal, said data also made available for all and sundry to analyze for
themselves, should they wish to do so.
-----------------------------------
Roland Dobbins <rdobbins at arbor.net>
_______________________________________________
dns-operations mailing list
dns-operations at lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
More information about the dns-operations
mailing list