[ipv6hackers] Revised IETF I-D: "IPv6 Address Usage Recommendations" (draft-gont-6man-address-usage-recommendations)
jsklein at gmail.com
Thu Mar 9 02:37:40 CET 2017
The idea is not new. Several of us created documents in 2006 which
addressed this method, along with moving targets and networks
technologies. I have also been teaching some of these techniques since
2008. Sadly at the time, no one was interested. So yes, the guidance is
warranted it's about time to see this best practices documented on this
You might also want to look at the implications on VMs, Docker, switches,
overlay network techniques. I have discovered and documented (but not
published) many unpredictable and at time devastating impact on network
"Inveniam viam aut faciam"
PGP Fingerprint: 295E 2691 F377 C87D 2841 00C1 4174 FEDF 8ECF 0CC8
On Tue, Mar 7, 2017 at 2:14 PM, Fernando Gont <fgont at si6networks.com> wrote:
> This document analyzes the security and privacy implications of IPv6
> addresses based on a number of properties such as address scope,
> stability, and usage type. It analyzes what properties are desirable
> for some popular scenarios, and provides advice regarding the
> configuration and usage of such addresses.
> There's quite a few things one could do with IPv6 addresses. But with so
> many addresses (stable vs temporary, global vs. local, etc.), I believe
> guidance is warranted. Otherwise we will not only *not* leverage the
> possibilities offered by such address, but will rather run into problems.
> Comments welcome.
> Best regards,
> Fernando Gont
> SI6 Networks
> e-mail: fgont at si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
More information about the Ipv6hackers