FG – IPv6 PD

gewoon, mijn archief

IANA IPv6 Special-Purpose Address Registry
Address Block ![]() |
Name ![]() |
RFC ![]() |
Allocation Date ![]() |
Termination Date ![]() |
Source ![]() |
Destination ![]() |
Forwardable ![]() |
Globally Reachable ![]() |
Reserved-by-Protocol ![]() |
|---|---|---|---|---|---|---|---|---|---|
| ::1/128 | Loopback Address | [RFC4291] | 2006-02 | N/A | False | False | False | False | True |
| ::/128 | Unspecified Address | [RFC4291] | 2006-02 | N/A | True | False | False | False | True |
| ::ffff:0:0/96 | IPv4-mapped Address | [RFC4291] | 2006-02 | N/A | False | False | False | False | True |
| 64:ff9b::/96 | IPv4-IPv6 Translat. | [RFC6052] | 2010-10 | N/A | True | True | True | True | False |
| 64:ff9b:1::/48 | IPv4-IPv6 Translat. | [RFC8215] | 2017-06 | N/A | True | True | True | False | False |
| 100::/64 | Discard-Only Address Block | [RFC6666] | 2012-06 | N/A | True | True | True | False | False |
| 2001::/23 | IETF Protocol Assignments | [RFC2928] | 2000-09 | N/A | False [1] | False [1] | False [1] | False [1] | False |
| 2001::/32 | TEREDO | [RFC4380] [RFC8190] | 2006-01 | N/A | True | True | True | N/A [2] | False |
| 2001:1::1/128 | Port Control Protocol Anycast | [RFC7723] | 2015-10 | N/A | True | True | True | True | False |
| 2001:1::2/128 | Traversal Using Relays around NAT Anycast | [RFC8155] | 2017-02 | N/A | True | True | True | True | False |
| 2001:1::3/128 | DNS-SD Service Registration Protocol Anycast Address | [RFC-ietf-dnssd-srp-25] | 2024-04 | N/A | True | True | True | True | False |
| 2001:2::/48 | Benchmarking | [RFC5180][RFC Errata 1752] | 2008-04 | N/A | True | True | True | False | False |
| 2001:3::/32 | AMT | [RFC7450] | 2014-12 | N/A | True | True | True | True | False |
| 2001:4:112::/48 | AS112-v6 | [RFC7535] | 2014-12 | N/A | True | True | True | True | False |
| 2001:10::/28 | Deprecated (previously ORCHID) | [RFC4843] | 2007-03 | 2014-03 | |||||
| 2001:20::/28 | ORCHIDv2 | [RFC7343] | 2014-07 | N/A | True | True | True | True | False |
| 2001:30::/28 | Drone Remote ID Protocol Entity Tags (DETs) Prefix | [RFC9374] | 2022-12 | N/A | True | True | True | True | False |
| 2001:db8::/32 | Documentation | [RFC3849] | 2004-07 | N/A | False | False | False | False | False |
| 2002::/16 [3] | 6to4 | [RFC3056] | 2001-02 | N/A | True | True | True | N/A [3] | False |
| 2620:4f:8000::/48 | Direct Delegation AS112 Service | [RFC7534] | 2011-05 | N/A | True | True | True | True | False |
| 3fff::/20 | Documentation | [RFC9637] | 2024-07 | N/A | False | False | False | False | False |
| 5f00::/16 | Segment Routing (SRv6) SIDs | [RFC-ietf-6man-sids-06] | 2024-04 | N/A | True | True | True | False | False |
| fc00::/7 | Unique-Local | [RFC4193] [RFC8190] | 2005-10 | N/A | True | True | True | False [4] | False |
| fe80::/10 | Link-Local Unicast | [RFC4291] | 2006-02 | N/A | True | True | False | False | True |
| [1] |
Unless allowed by a more specific allocation. |
| [2] |
See Section 5 of [RFC4380] for details. |
| [3] |
See [RFC3056] for details. |
| [4] |
See [RFC4193] for more details on the routability of Unique-Local addresses. The Unique-Local prefix is drawn from the IPv6 Global Unicast Address range, but is specified as not globally routed. |
https://www.ietf.org/id/draft-gont-v6ops-slaac-renum-00.txt
(https://tools.ietf.org/html/draft-gont-v6ops-slaac-renum) is being discussed at the v6ops wg of the IETF, where there is an ongoing call for adoption:
https://mailarchive.ietf.org/arch/msg/v6ops/HmcZYGY4Lu2h7NUND3o2UiOsKXA
https://github.com/fgont/draft-slaac-renum/blob/master/draft-gont-6man-slaac-renum-02.txt
http://aodugin.blogspot.nl/2016/10/ipv6-security-to-nat-or-not-to-nat.html
Please, allow us to introduce MrLooquer -> https://www.mrlooquer.com
MrLooquer combines open source intelligence techniques with heuristic and data mining to perform one of the first attempts to create a real map about
IPv6 deployment and its relationship with current networks and protocols.
MrLooquer is born as an open initiative with Creative Commons license focused on:
– Data discovery
– Visual intelligence
– Relationship
Our main goal is to provide a useful tool for security analysts around the world. MrLooquer allows users to make advanced queries through our big data infrastructure to obtain datasets with relationships between domains, IPv4, IPv6, service informations, geolocation, etc…
We’ve released the first version recently. It’s just the bread and butter… We are developing a roadmap that includes, among other things, threat indicator based on relationships and patterns.
Please, feel free to start using it and we would be thankful for any type of feedback.
Best regards,
MrLooquer team.
Web: https://www.mrlooquer.com
Twitter: https://twitter.com/mrlooquer
Interface vlan777
ipv6 enable
Otherwise, the config looks spot on
Our config looks like:
interface Vlan110
standby version 2
standby 110 ipv6 FE80::1
standby 110 timers 1 3
standby 110 priority 110
standby 110 preempt delay minimum 180
standby 110 authentication xxxx
ipv6 address dead:beef:1::FFFE/64
ipv6 enable
ipv6 nd other-config-flag
ipv6 nd router-preference High
ipv6 pim dr-priority 4294967295
ipv6 dhcp relay destination dead:beef:0::1
ipv6 dhcp relay destination dead:beef:0::2
Just an update: I eyeballed the “PrefixPolicies-Vista78.cmd” script from
https://sites.google.com/site/jrey42/Home/ipv6/prefixpolicies, concluded
that it was safe, and ran it. It apparently works, but I don’t have a
ULA setup to test it with.
jrey42 deserves kudos.
Regards
Brian
On 21/12/2015 07:57, Brian E Carpenter wrote:
On 21/12/2015 03:28, Marc Luethi wrote:
Hi all
I suggest to investigate source address selection on the client side,
while closely following name resolution (assuming this is similar to
Windows 2012R2’s DA implementation, DNS64 is supposed to be at work, here)
and keeping an eye on the IPv6 routing table.
In your situation, I would presume that the end system ends up with an RFC
4193 address (from the /48 that was initially chosen when DA was set up) on
its *IP-over-HTTPS* tunneling interface (courtesy of the DA implementation)
and a global unicast address the (W)LAN interface, based on the CPE’s RAs.
While things *should* be neat, my experience with Windows 7’s way of
picking source addresses was so bad (“longest match” seemed entirely
unheard-of), I eventually gave up using RFC 4193 addresses for my internal
network altogether.
I repeateadely observed Win7 using its global unicast address(es) to access
internal ressources, while stubbornly sticking to te RFC4193 source address
when attempting to talk to addresses on the global IPv6 internet.
Yes. Apparently Win8 is up to date in that respect (i.e. follows RFC6724 not
RFC3484). It would be possible to make Win8 misbehave by changing the default
preferences (https://tools.ietf.org/html/rfc6724#section-10.6).
Conversely, it’s possible to make Win7 behave correctly by changing its default
policies to conform to RFC6724. I just found the following site that offers a
script (YMMV, I haven’t checked it):
https://sites.google.com/site/jrey42/Home/ipv6/prefixpolicies
But if that is the cause of the original issue, maybe switching off the
ULA prefix would be easier, and nicer than switching off IPv6.
Brian Carpenter
cheers
Marc
On 19 December 2015 at 22:37, Kurt Buff wrote:
All,
I ran into an interesting situation some months ago which still
baffles me, and though I was able to work around it, I expect it will
happen again.
We implemented MSFT DirectAcess at our company quite some time ago
(using 2008R2 and Forefront 2010), and it works extremely well.
At least it worked well for everyone until one of the employees got
his Comcast connection upgraded, and then DirectAccess didn’t work for
that employee any more.
We proved that if he tethered to his cell phone, that would work, and
if he used an SSL VPN client while on his Comcast connect that would
work, but DirectAccess would not work at home.
Finally, I discovered that his Comcast-installed router was handing
our IPv6 addresses on his home LAN. Turning that off enabled
DirectAccess to work again.
We do not have an assigned IPv6 block from our ISP, though of course
MSFT OSes use it, and auto-assign themselves addresses, but for now
we’re ignoring it.
Has anyone run into this problem and solved it – not by turning off
iIPv6 address assignment for the home LAN, but really solved it? If
so, how did you do that?
Would getting and implementing an IPv6 assignment from our ISP cure
the problem, or make it worse?
I’ve found little guidance from MSFT about DirectAccess in an IPv6
environment, though I admit I haven’t been terribly diligent in my
searches.
Kurt
Two suspect NICs at this point:
– Intel® 82579LM found in some HP laptops. Disabling the IPV6 TCP checksum offloading resolves the problem.
– Realtek RTL8111E – The problem is inconsistent
Since rolling out dual-stack IPV6 to our consumer Internet customers, we’ve had a couple of customer incidents with very slow IPV6 TCP performance to dual-stacked websites (facebook, Wikipedia.org, …). The problems only occurs with Windows 7/8/10 PCs connected via Ethernet NICs. Disabling IPV6 TCP checksum offloading will resolve the performance issues in some cases, but not in all cases. We have tried updating the Windows NIC driver to the latest version, but that didn’t help. I’m wondering if anybody else has seen this issue with Windows PCs.
For the avoidance of mystery: Google performs measurements of IPv6 connectivity and latency on an ongoing basis. The Google DNS servers do not return AAAA records to DNS resolvers if our measurements indicate that for users of those resolvers, HTTP/HTTPS access to dual-stack Google services is substantially worse than to equivalent IPv4-only services. “Worse” covers both reliability (e.g., failure to load a URL) and latency (e.g., IPv6 is 100ms worse than IPv4 because it goes over an ocean). The resolvers must also have a minimum query volume, which is fairly low.
Tips:
I suggest checking if any of your affected users have broken 6to4 setups,
and that you are applying the relevant mitigations in RFC 6343.
MTU size issues and high latency have also both been mentioned as
possible reasons for the mysterious AAAA blacklist.
Here’s a quick basic FNF (from ASR 1000):
flow exporter PRIMARY_NMS
description FNF export to Primary NMS
destination 192.168.100.100
source Loopback0
transport udp 9996
template data timeout 60
!
flow monitor MONITOR_V4
description IPv4 netflow monitor
record netflow ipv4 original-input
exporter PRIMARY_NMS
cache timeout active 900
cache entries 200000
!
flow monitor MONITOR_V6
description IPv6 netflow monitor
record netflow ipv6 original-input
exporter PRIMARY_NMS
cache timeout active 900
cache entries 200000
!
!For each interface ....
!
interface GigabitEthernet0/0/0
ip flow monitor MONITOR_V4 input
ipv6 flow monitor MONITOR_V6 input
!
interface GigabitEthernet1/0/0
ip flow monitor MONITOR_V4 input
ipv6 flow monitor MONITOR_V6 input