Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Sometimes I have doubts.

Sometimes I have doubts.

Scheduled Pinned Locked Moved Uncategorized
21 Posts 5 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tschaefer@ipv6.socialT tschaefer@ipv6.social

    @kasperd @camille

    Thanks.
    But about the maintenance/disruption of NAT64 GW service: I would expect a rerouting or useful failover on the network/server side, never a change of the prefix! It would need to be changed by DNS64 too.

    kasperd@westergaard.socialK This user is from outside of this forum
    kasperd@westergaard.socialK This user is from outside of this forum
    kasperd@westergaard.social
    wrote last edited by
    #8

    I assume you never operated a public NAT64 service. There are networks between the NAT64 gateway and the client which are completely outside of my control. But I can achieve high availability by running multiple NAT64 gateways in independent locations.

    I have health checks of the gateways which automatically updates DNS64 accordingly. And I give clients addresses using multiple prefixes to allow for client-side failover. Client-side failover is crucial as sometimes individual clients are unable to reach specific gateways for reasons that are on networks that I don't use myself and thus outside the visibility of my health checks.

    A client with a good implementation of fallback between AAAA records works great in this scenario. 464-xlat doesn't handle this as well.

    tschaefer@ipv6.socialT 1 Reply Last reply
    0
    • goetz@chaos.socialG goetz@chaos.social

      @kasperd @tschaefer @camille

      Could you please send this observation to the mailinglist?

      kasperd@westergaard.socialK This user is from outside of this forum
      kasperd@westergaard.socialK This user is from outside of this forum
      kasperd@westergaard.social
      wrote last edited by
      #9

      I have done so in the past, but their mailing list software is not letting my mails through.

      goetz@chaos.socialG 1 Reply Last reply
      0
      • kasperd@westergaard.socialK kasperd@westergaard.social

        I assume you never operated a public NAT64 service. There are networks between the NAT64 gateway and the client which are completely outside of my control. But I can achieve high availability by running multiple NAT64 gateways in independent locations.

        I have health checks of the gateways which automatically updates DNS64 accordingly. And I give clients addresses using multiple prefixes to allow for client-side failover. Client-side failover is crucial as sometimes individual clients are unable to reach specific gateways for reasons that are on networks that I don't use myself and thus outside the visibility of my health checks.

        A client with a good implementation of fallback between AAAA records works great in this scenario. 464-xlat doesn't handle this as well.

        tschaefer@ipv6.socialT This user is from outside of this forum
        tschaefer@ipv6.socialT This user is from outside of this forum
        tschaefer@ipv6.social
        wrote last edited by
        #10

        @kasperd

        You are right. I never operated public NAT64 services. (and I don't use yours, because they weren't not reliable for me in the past - sorry to say that).

        But beside the fact of your engagement - from the Telekom (the gateway I use all the time, not public) I don't expect changing prefixes, I expect more or less good monitored reliability.

        tschaefer@ipv6.socialT 1 Reply Last reply
        0
        • tschaefer@ipv6.socialT tschaefer@ipv6.social

          @kasperd

          You are right. I never operated public NAT64 services. (and I don't use yours, because they weren't not reliable for me in the past - sorry to say that).

          But beside the fact of your engagement - from the Telekom (the gateway I use all the time, not public) I don't expect changing prefixes, I expect more or less good monitored reliability.

          tschaefer@ipv6.socialT This user is from outside of this forum
          tschaefer@ipv6.socialT This user is from outside of this forum
          tschaefer@ipv6.social
          wrote last edited by
          #11

          @kasperd

          My employers network has also only one gateway as far as i know. (of course he maintains it, but probably the interrupts are so short, nobody notices it)

          tschaefer@ipv6.socialT 1 Reply Last reply
          0
          • tschaefer@ipv6.socialT tschaefer@ipv6.social

            @kasperd

            My employers network has also only one gateway as far as i know. (of course he maintains it, but probably the interrupts are so short, nobody notices it)

            tschaefer@ipv6.socialT This user is from outside of this forum
            tschaefer@ipv6.socialT This user is from outside of this forum
            tschaefer@ipv6.social
            wrote last edited by
            #12

            @kasperd

            To introduce more complexity at client side is not the right way, I think.

            Anyway, It is a transition technology - not planned to stay for ever.

            kasperd@westergaard.socialK 1 Reply Last reply
            0
            • tschaefer@ipv6.socialT tschaefer@ipv6.social

              @kasperd

              To introduce more complexity at client side is not the right way, I think.

              Anyway, It is a transition technology - not planned to stay for ever.

              kasperd@westergaard.socialK This user is from outside of this forum
              kasperd@westergaard.socialK This user is from outside of this forum
              kasperd@westergaard.social
              wrote last edited by
              #13

              Client side failover is a necessity if you want reliability. Even when IPv4 is long gone, I predict the failover code is here to stay. The failover code may even get a little bit more sophisticated.

              If we want to minimize client side complexity during the transition, then DNS64 is the way to go. Dual-stack and 464xlat both add complexity on the client side, which you can avoid when using DNS64.

              I agree transition technologies should not stay forever. Had people been upgrading in due time, we would never have needed DNS64 and NAT64 in the first place.

              tschaefer@ipv6.socialT 1 Reply Last reply
              0
              • kasperd@westergaard.socialK kasperd@westergaard.social

                Client side failover is a necessity if you want reliability. Even when IPv4 is long gone, I predict the failover code is here to stay. The failover code may even get a little bit more sophisticated.

                If we want to minimize client side complexity during the transition, then DNS64 is the way to go. Dual-stack and 464xlat both add complexity on the client side, which you can avoid when using DNS64.

                I agree transition technologies should not stay forever. Had people been upgrading in due time, we would never have needed DNS64 and NAT64 in the first place.

                tschaefer@ipv6.socialT This user is from outside of this forum
                tschaefer@ipv6.socialT This user is from outside of this forum
                tschaefer@ipv6.social
                wrote last edited by
                #14

                @kasperd

                But at your DNS64 servers it is unnecessarily complex. They provide three different NAT64 prefixes.
                No CLAT implementation can switch between three instances simultaneously. Android's CLAT is quite mature.
                Client failover isn't there - for 12 years.

                tschaefer@ipv6.socialT 1 Reply Last reply
                0
                • tschaefer@ipv6.socialT tschaefer@ipv6.social

                  @kasperd

                  But at your DNS64 servers it is unnecessarily complex. They provide three different NAT64 prefixes.
                  No CLAT implementation can switch between three instances simultaneously. Android's CLAT is quite mature.
                  Client failover isn't there - for 12 years.

                  tschaefer@ipv6.socialT This user is from outside of this forum
                  tschaefer@ipv6.socialT This user is from outside of this forum
                  tschaefer@ipv6.social
                  wrote last edited by
                  #15

                  @kasperd

                  The NAT64 GW has to be good. Just a similar example:
                  cgn - it has also no second chance at the client. It works or it doesn't work.

                  kasperd@westergaard.socialK 1 Reply Last reply
                  0
                  • tschaefer@ipv6.socialT tschaefer@ipv6.social

                    @kasperd

                    The NAT64 GW has to be good. Just a similar example:
                    cgn - it has also no second chance at the client. It works or it doesn't work.

                    kasperd@westergaard.socialK This user is from outside of this forum
                    kasperd@westergaard.socialK This user is from outside of this forum
                    kasperd@westergaard.social
                    wrote last edited by
                    #16

                    That just supports the point I am making. Use of DNS64+NAT64 can achieve some benefits that are hard to achieve with 464-XLAT and close to impossible with an IPv4-only CGN.

                    The added complexity on the DNS64 servers is minor. And if that means end-users can have a simpler setup on their network, I think it's a good trade-off.

                    I have considered implementing a 464-XLAT that can utilize redundant NAT64 gateways. But so far I haven't had time for that.

                    goetz@ipv6.socialG 1 Reply Last reply
                    0
                    • kasperd@westergaard.socialK kasperd@westergaard.social

                      I have done so in the past, but their mailing list software is not letting my mails through.

                      goetz@chaos.socialG This user is from outside of this forum
                      goetz@chaos.socialG This user is from outside of this forum
                      goetz@chaos.social
                      wrote last edited by
                      #17

                      @kasperd @tschaefer @camille IETF ?

                      kasperd@westergaard.socialK 1 Reply Last reply
                      0
                      • goetz@chaos.socialG goetz@chaos.social

                        @kasperd @tschaefer @camille IETF ?

                        kasperd@westergaard.socialK This user is from outside of this forum
                        kasperd@westergaard.socialK This user is from outside of this forum
                        kasperd@westergaard.social
                        wrote last edited by
                        #18

                        Yes. I received an automated response stating:

                        Your mail to 'v6ops' with the subject
                        
                            Re: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-only-resolver-00.txt
                        
                        Is being held until the list moderator can review it for approval.
                        
                        1 Reply Last reply
                        0
                        • kasperd@westergaard.socialK kasperd@westergaard.social

                          That just supports the point I am making. Use of DNS64+NAT64 can achieve some benefits that are hard to achieve with 464-XLAT and close to impossible with an IPv4-only CGN.

                          The added complexity on the DNS64 servers is minor. And if that means end-users can have a simpler setup on their network, I think it's a good trade-off.

                          I have considered implementing a 464-XLAT that can utilize redundant NAT64 gateways. But so far I haven't had time for that.

                          goetz@ipv6.socialG This user is from outside of this forum
                          goetz@ipv6.socialG This user is from outside of this forum
                          goetz@ipv6.social
                          wrote last edited by
                          #19

                          @kasperd @tschaefer
                          Regarding Implementation of ipv4only.arpa on DNS64 resolvers.
                          From RFC 8880
                          "All DNS64 recursive resolvers MUST recognize 'ipv4only.arpa' (and all of its subdomains) as special, and they MUST NOT attempt to look up NS records for 'ipv4only.arpa' or otherwise query authoritative name servers in an attempt to resolve this name. Instead, DNS64 recursive resolvers MUST act as authoritative for this zone, by generating immediate responses for all

                          goetz@ipv6.socialG 1 Reply Last reply
                          0
                          • goetz@ipv6.socialG goetz@ipv6.social

                            @kasperd @tschaefer
                            Regarding Implementation of ipv4only.arpa on DNS64 resolvers.
                            From RFC 8880
                            "All DNS64 recursive resolvers MUST recognize 'ipv4only.arpa' (and all of its subdomains) as special, and they MUST NOT attempt to look up NS records for 'ipv4only.arpa' or otherwise query authoritative name servers in an attempt to resolve this name. Instead, DNS64 recursive resolvers MUST act as authoritative for this zone, by generating immediate responses for all

                            goetz@ipv6.socialG This user is from outside of this forum
                            goetz@ipv6.socialG This user is from outside of this forum
                            goetz@ipv6.social
                            wrote last edited by
                            #20

                            queries for 'ipv4only.arpa' (and any subdomain of 'ipv4only.arpa'),
                            "
                            @tschaefer @kasperd

                            kasperd@westergaard.socialK 1 Reply Last reply
                            0
                            • goetz@ipv6.socialG goetz@ipv6.social

                              queries for 'ipv4only.arpa' (and any subdomain of 'ipv4only.arpa'),
                              "
                              @tschaefer @kasperd

                              kasperd@westergaard.socialK This user is from outside of this forum
                              kasperd@westergaard.socialK This user is from outside of this forum
                              kasperd@westergaard.social
                              wrote last edited by
                              #21

                              I have seen some inconsistent behavior of BIND9 in that regard. However I am done filing bug reports about that software.

                              1 Reply Last reply
                              1
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups