Bringing IPv6 connectivity to the general public.

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Security Issues In Mobile IP
Copyright (c) 2002 Japan Network Information Center Introduction of JPNICs New Registry System Izumi Okutani IP Address Section Japan Network Information.
1 Taiwan Routing table statistics – a new service in TWNIC Ching-Heng Ku IP Department TWNIC.
Multihoming and Multi-path Routing
Multihoming and Multi-path Routing
IPv6 Transition for Enterprises Light Reading Live 14 July 2011 John Curran President and CEO ARIN.
Planning Your Conversion from IPv4 to IPv6 John Curran ARIN President & CEO This presentation describes the impending depletion of Internet Protocol version.
Deploying IPv6: The time is now Are you ready? SFTA 24 May 2012 John Curran President and CEO, ARIN.
IPv6: No Longer Optional John Curran President & CEO, ARIN.
Disruption (and Recovery) of the ISP Business Model with IPv4 Depletion PTC12 15 January 2012 John Curran President and CEO, ARIN.
Demystifying IPv6: Ensuring a Smooth Transition John Curran ARIN President & CEO This presentation describes the impending depletion of Internet Protocol.
R I P E N e t w o r k C o o r d i n a t i o n C e n t r e. h t t p : / / w w w. r i p e. n e t. n c r i p e. n e t 1 The Internet Registry System IPv4.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
1 Linux IP Masquerading Brian Vargyas XNet Information Systems.
1 Processes and Threads Creation and Termination States Usage Implementations.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
HotNets-VI 1 Architecting Citywide Ubiquitous Wi-Fi Access Nishanth Sastry Jon Crowcroft, Karen Sollins.
Internet Number Resources 1. Internet IPv4 addresses IPv6 addresses Autonomous System number Fully Qualified Domain Name Key Internet resources.
The Internet and the World Wide Web. Una DooneySlide 2Internet and WWW What is the Internet? This is the physical infrastructure or backbone of computers,
Internet Governance Community Use Slide Deck Courtesy of ARIN May 2014.
1 Peripheral Component Interconnect (PCI). 2 PCI based System.
Chapter 1: Introduction to Scaling Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
1 Effective, secure and reliable hosted security and continuity solution.
What is access control list (ACL)?
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Configuring and Troubleshooting ACLs
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
ICmyNet.Flow Network Traffic Analysis System If You Want to See Your Net
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Introduction to TCP/IP, the Internet, IP Addressing, and Domain Name.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
DMZ (De-Militarized Zone)
DMZ (De-Militarized Zone)
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Internetdagarna October 2008 Folkets Hus, Stockholm IPv6 Golden Networks Jeroen Massar, SixXS /
25 seconds left…...
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Mirjam Kühne 1 RIPE 34, September 1999 RIPE NCC Status RIPE NCC Staff presented by Mirjam Kühne.
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
Enabling IPv6 in Corporate Intranet Networks
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
CIS 450 – Network Security Chapter 3 – Information Gathering.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Role Of Network IDS in Network Perimeter Defense.
6to4
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Presentation transcript:

Bringing IPv6 connectivity to the general public

IIR - Feb2002Pim van Pelt 2 Contents Pim van Pelt, Business Internet Trends IP next generations

IIR - Feb2002Pim van Pelt 3 Contents Introduction: What is a tunnel broker Why should we develop/maintain them Whom should we address Part two: How did IPng tackle things Which services do we provide Open discussion: how to procede?

IIR - Feb2002Pim van Pelt Tunnelbroker A term for an IPv4/IPv6 connected host IPv6 connectivity via proto-41 tunnels IPv4 connectivity at a well connected site Informative web- and portal site A place where end users can turn to with operational matters Tracking and active maintenance of: Users and their activities Peering and transit issues

IIR - Feb2002Pim van Pelt Why deploy ? Bring IPv6 to the public Advocate the use of IPv6 properly to end users (company and individual) Gain a user base, and thus: Gain expertise on the matter with a live network Collect invaluable feedback from the field Present cases and bug reports to vendors

IIR - Feb2002Pim van Pelt Whom to address ? Companies Enabling engineers to take a look at the operational tasks in IPv6 Stimulating provision: top-down from ISP to end user Private individuals Gaining a higher educational level of Internet users Creating demand: bottom-up from end user to ISP

IIR - Feb2002Pim van Pelt Tunnelbroker system Find an answer to the following topics: IPv6 aggregation – pTLA or sTLA Local user authenticity, validity Database structure Tunnelserver OS choice Tunnelserver configuration IP filtering and abuse (DDoS) Addressing local users

IIR - Feb2002Pim van Pelt pTLA or sTLA sTLA are production quality, native connection oriented, b2b pTLA are meant for testing deployments (using proto-41 tunneling), b2bc IPng uses pTLA because Absence of official collaboration between network operators Use of tunnels degrades network stability

IIR - Feb2002Pim van Pelt Registering users Name, address, phone number We require users to create person objects at the 6bone registry Needed to create preliminary barrier Help keeping abuse kids out Help administer IPng at whois.6bone.net We use the nichdl to uniquely identify the user

IIR - Feb2002Pim van Pelt DB Structure MySQL is DBM of choice Table of users, by nichdl Table of tunnels, one per nichdl Table of subnet allocations, one per tunnel Blacklist and deletion tracking Recividist malicious users IPv4 networks denied access (prior abuse) Notes and things for internal use Reasons for tunnel deletion

IIR - Feb2002Pim van Pelt OS choice Linux Pro: dynamic amt of tunnel devices (sit) and /proc for device stats gathering Con: difficult scope handling, uncertain stability BSD Pro: decent IP filtering, proper scope handling (ff02::2%gif0), greater stability Con: static amt. of tunnel devices (gif) Cisco IOS Con: expensive, relatively low pps Pro: solid state, corporate, stable

IIR - Feb2002Pim van Pelt Server config We chose Linux, kernel 2.4 Simple scripting for tunnel maintenance Newtunnel.sh, newsubnet.sh, movetunnel.sh Automatic mailing system with autoresponses Possibility of ‘cronned’ tasks Packet/octet counters Hourly pingstats and daily uptime checks Dynamic filtering Ease of use – perl, sh, pike, c(++)

IIR - Feb2002Pim van Pelt Daily maintenence Traffic statistics (five-minutely) Track bandwidth consumption (bps) Find possible attack victims (pps) rrdtool by Tobias Oetiker Ping statistics (hourly) Check latency Check packet loss Check availability of remote endpoint fping ported by Jeroen Massar

IIR - Feb2002Pim van Pelt Daily maintenence Downtime check (once daily) Mail users with excess downtime Try to keep them motivated Alternatively: Get rid of non-participating users DNS checkup (four times a day) Do not delegate downstream DNS (lame) Grab zone files, process them into a large zone file and publish this via IPng DNS Shellscripts for unix, dig(1) and bind 9.2

IIR - Feb2002Pim van Pelt IP filtering Handle IPv4 incoming traffic Accept traffic only from known destinations Handle IPv4 outgoing traffic Never send proto-41 traffic to unexpecting nodes 24/7 static IP for remote users Deny non-local IPv6 traffic from downstreams

IIR - Feb2002Pim van Pelt DDoS attacks Public IPv6 sites get attacked too Primary reason: IRC abuse Take care with unknown users on IRC Common attack forms Stacheldraht UDP/TCP fragmentation attacks Let IPv4 transit providers block your tunnel endpoint at their border, allow only proto-41 Use PI space and don’t announce to transit providers (no route to you from non peered nets)

IIR - Feb2002Pim van Pelt Services provided Stimulation of end users and companies IPv6-only public services, such as IRC (chat) server SMS portal Webhosting Mail and DNS service

IIR - Feb2002Pim van Pelt Expertise gained Feedback from the users to the vendor User remarks, requests, findings Representing users at conferences Feedback from community to users Relaying new policies from 6bone Forming and commenting on RFCs

IIR - Feb2002Pim van Pelt Progress Future plans include Prolongued tunnelbroker activity Roadmap for ISPs in the Netherlands Creating and maintaining IPv6 exchange points (Ede)

IIR - Feb2002Pim van Pelt Roadmap to IPv6 A working group of predominantly Dutch ISPs (xs4all, bit, intouch) Creating a step-by-step introduction for AMS-IX connected sites Consulting, helping and explaining these businesses how they could start to use IPv6 Ultimately: interconnecting their AS

IIR - Feb2002Pim van Pelt IX activity Connecting to AMS-IX natively Jumpstarting traffic exchange on own hardware – respecting AMS-IX board Offering alternative peering points Ede, Gelderland Almere, Flevoland Amsterdam, Zuid Holland Interconnecting these Exchanges

IIR - Feb2002Pim van Pelt Collaboration Each company chips in to create European and global consensus on how to educate new ISPs and telco industries We offer support and software for those wanting to set up a tunnelbroker

IIR - Feb2002Pim van Pelt Discussion Questions, comments, discussion. Dutch contact: Foreign input much appreciated