Mailing List Archive

Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block
Hi, Vasilenko:

1)    ... These “multi-national conglo” has enough influence on the IETF
to not permit it.":

    As classified by Vint Cerf, 240/4 enabled EzIP is an overlay
network that may be deployed stealthily (just like the events reported
by the RIPE-LAB). So, EzIP deployment does not need permission from the
IETF.

Regards,


Abe (2024-01-11 21:38 EST)




On 2024-01-11 01:17, Vasilenko Eduard wrote:
>
> > It has been known that multi-national conglomerates have been using
> it without announcement.
>
> This is an assurance that 240/4 would never be permitted for Public
> Internet. These “multi-national conglo” has enough influence on the
> IETF to not permit it.
>
> Ed/
>
> *From:* NANOG
> [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org] *On
> Behalf Of *Abraham Y. Chen
> *Sent:* Wednesday, January 10, 2024 3:35 PM
> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca>
> *Cc:* nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
> *Subject:* 202401100645.AYC Re: IPv4 address block
> *Importance:* High
>
> Hi, Karim:
>
> 1)    If you have control of your own equipment (I presume that your
> business includes IAP - Internet Access Provider, since you are asking
> to buy IPv4 blocks.), you can get a large block of reserved IPv4
> address */_for free_/* by */_disabling_/* the program codes in your
> current facility that has been */_disabling_/* the use of 240/4
> netblock. Please have a look at the below whitepaper. Utilized
> according to the outlined disciplines, this is a practically unlimited
> resources. It has been known that multi-national conglomerates have
> been using it without announcement. So, you can do so stealthily
> according to the proposed mechanism which establishes uniform
> practices, just as well.
>
> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>
> 2)    Being an unorthodox solution, if not controversial, please
> follow up with me offline. Unless, other NANOGers express their interests.
>
> Regards,
>
> Abe (2024-01-10 07:34 EST)
>
> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>
> Hi Nanog Community
>
> Any idea please on the best way to buy IPv4 blocs and what is the
> price?
>
> Thank you
>
> KARIM
>
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
>
>
> Virus-free.www.avast.com
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>


--
This email has been checked for viruses by Avast antivirus software.
www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Abraham,

You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.

Ryan
________________________________
From: NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of Abraham Y. Chen <aychen@avinta.com>
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <nanog@nanog.org>
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.

Hi, Vasilenko:

1) ... These ?multi-national conglo? has enough influence on the IETF to not permit it.":

As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.

Regards,


Abe (2024-01-11 21:38 EST)




On 2024-01-11 01:17, Vasilenko Eduard wrote:

> It has been known that multi-national conglomerates have been using it without announcement.

This is an assurance that 240/4 would never be permitted for Public Internet. These ?multi-national conglo? has enough influence on the IETF to not permit it.

Ed/

From: NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca><mailto:amekkaoui@mektel.ca>
Cc: nanog@nanog.org<mailto:nanog@nanog.org>; Chen, Abraham Y. <AYChen@alum.MIT.edu><mailto:AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High



Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:

Hi Nanog Community



Any idea please on the best way to buy IPv4 blocs and what is the price?



Thank you



KARIM







[https://s-install.avcdn.net/ipm/preview/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>

Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
RE: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Public side of the NAT would need a huge IPv4 Public pool.
Replacing Private pool to something bigger is a very corner case.
Mobile Carriers identify subscribers not by the IP, they could easy tolerate many overlapping 10/8 even on one Mobile Core.
Huge private pool 240/4 is needed only for Cloud providers that have many micro-services.
Nothing to dispute here. The people that need it already well aware about it.
Eduard
From: Abraham Y. Chen [mailto:aychen@avinta.com]
Sent: Friday, January 12, 2024 5:39 AM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: nanog@nanog.org; KARIM MEKKAOUI <amekkaoui@mektel.ca>; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block
Importance: High

Hi, Vasilenko:

1) ... These “multi-national conglo” has enough influence on the IETF to not permit it.":

As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.

Regards,


Abe (2024-01-11 21:38 EST)




On 2024-01-11 01:17, Vasilenko Eduard wrote:
> It has been known that multi-national conglomerates have been using it without announcement.
This is an assurance that 240/4 would never be permitted for Public Internet. These “multi-national conglo” has enough influence on the IETF to not permit it.
Ed/
From: NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca><mailto:amekkaoui@mektel.ca>
Cc: nanog@nanog.org<mailto:nanog@nanog.org>; Chen, Abraham Y. <AYChen@alum.MIT.edu><mailto:AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High

Hi, Karim:

1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.

https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf

2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.


Regards,


Abe (2024-01-10 07:34 EST)



On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
Hi Nanog Community

Any idea please on the best way to buy IPv4 blocs and what is the price?

Thank you

KARIM




[https://s-install.avcdn.net/ipm/preview/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>

Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
" every networking vendor, hardware vendor, and OS vendor"


How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP

----- Original Message -----

From: "Ryan Hamel" <ryan@rkhtech.org>
To: "Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <vasilenko.eduard@huawei.com>
Cc: "Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
Sent: Thursday, January 11, 2024 11:04:31 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block


Abraham,


You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.



Ryan

From: NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of Abraham Y. Chen <aychen@avinta.com>
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <nanog@nanog.org>
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block



Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.


Hi, Vasilenko:


1) ... These “ multi-national conglo ” has enough influence on the IETF to not permit it. ":


As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.


Regards,




Abe (2024-01-11 21:38 EST)









On 2024-01-11 01:17, Vasilenko Eduard wrote:




> It has been known that multi-national conglomerates have been using it without announcement.
This is an assurance that 240/4 would never be permitted for Public Internet. These “ multi-national conglo ” has enough influence on the IETF to not permit it.
Ed/



From: NANOG [ mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org ] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca>
Cc: nanog@nanog.org ; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High


Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
<blockquote>

Hi Nanog Community

Any idea please on the best way to buy IPv4 blocs and what is the price?

Thank you

KARIM








Virus-free. www.avast.com

</blockquote>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
>
> How far are we from that, in reality? I don't have any intention on using
> the space, but I would like to put some definition to this boogey man.


It's unknowable really.

Lots of network software works just fine today with it. Some don't. To my
knowledge some NOS vendors have outright refused to support 240/4 unless
it's reclassified. Beyond network equipment, there is an unknowable number
of software packages , drivers, etc out in the world which 240/4 is still
hardcoded not to work. It's been unfortunate to see this fact handwaved
away in many discussions on the subject.

The Mirai worm surfaced in 2016. The software vulnerabilities used in its
attack vectors are still unpatched and present in massive numbers
across the internet; there are countless variants that still use the same
methods, 8 years later. Other vulnerabilities still exist after
multiple decades. But we somehow think devices will be patched to support
240/4 quickly?

It's just unrealistic.

On Fri, Jan 12, 2024 at 1:03?PM Mike Hammett <nanog@ics-il.net> wrote:

> " every networking vendor, hardware vendor, and OS vendor"
>
> How far are we from that, in reality? I don't have any intention on using
> the space, but I would like to put some definition to this boogey man.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL>
> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
> <https://www.linkedin.com/company/intelligent-computing-solutions>
> <https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix>
> <https://www.linkedin.com/company/midwest-internet-exchange>
> <https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp>
> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------
> *From: *"Ryan Hamel" <ryan@rkhtech.org>
> *To: *"Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <
> vasilenko.eduard@huawei.com>
> *Cc: *"Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
> *Sent: *Thursday, January 11, 2024 11:04:31 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
> address block
>
> Abraham,
>
> You may not need permission from the IETF, but you effectively need it
> from every networking vendor, hardware vendor, and OS vendor. If you do not
> have buy in from key stakeholders, it's dead-on arrival.
>
> Ryan
> ------------------------------
> *From:* NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of
> Abraham Y. Chen <aychen@avinta.com>
> *Sent:* Thursday, January 11, 2024 6:38:52 PM
> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
> *Cc:* Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <
> nanog@nanog.org>
> *Subject:* Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address
> block
>
> Caution: This is an external email and may be malicious. Please take care
> when clicking links or opening attachments.
>
> Hi, Vasilenko:
>
> 1) ... These “multi-national conglo” has enough influence on the IETF
> to not permit it.":
>
> As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network
> that may be deployed stealthily (just like the events reported by the
> RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
>
> Regards,
>
>
> Abe (2024-01-11 21:38 EST)
>
>
>
>
> On 2024-01-11 01:17, Vasilenko Eduard wrote:
>
> > It has been known that multi-national conglomerates have been using it
> without announcement.
>
> This is an assurance that 240/4 would never be permitted for Public
> Internet. These “multi-national conglo” has enough influence on the IETF
> to not permit it.
>
> Ed/
>
> *From:* NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org
> <nanog-bounces+vasilenko.eduard=huawei.com@nanog.org>] *On Behalf Of *Abraham
> Y. Chen
> *Sent:* Wednesday, January 10, 2024 3:35 PM
> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca> <amekkaoui@mektel.ca>
> *Cc:* nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
> <AYChen@alum.MIT.edu>
> *Subject:* 202401100645.AYC Re: IPv4 address block
> *Importance:* High
>
>
>
> Hi, Karim:
>
>
>
> 1) If you have control of your own equipment (I presume that your
> business includes IAP - Internet Access Provider, since you are asking to
> buy IPv4 blocks.), you can get a large block of reserved IPv4 address *for
> free* by *disabling* the program codes in your current facility that has
> been *disabling* the use of 240/4 netblock. Please have a look at the
> below whitepaper. Utilized according to the outlined disciplines, this is a
> practically unlimited resources. It has been known that multi-national
> conglomerates have been using it without announcement. So, you can do so
> stealthily according to the proposed mechanism which establishes uniform
> practices, just as well.
>
>
>
> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>
>
>
> 2) Being an unorthodox solution, if not controversial, please follow up
> with me offline. Unless, other NANOGers express their interests.
>
>
>
>
>
> Regards,
>
>
>
>
>
> Abe (2024-01-10 07:34 EST)
>
>
>
>
>
>
>
> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>
> Hi Nanog Community
>
>
>
> Any idea please on the best way to buy IPv4 blocs and what is the price?
>
>
>
> Thank you
>
>
>
> KARIM
>
>
>
>
>
>
>
>
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
> Virus-free.www.avast.com
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
>
>
>
>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
I wouldn't say it's unknowable, just that no one with a sufficient enough interest in the cause has been loud enough with the research they've done, assuming some research has been done..


You don't need everything in the world to support it, just the things "you" use.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP

----- Original Message -----

From: "Tom Beecher" <beecher@beecher.cc>
To: "Mike Hammett" <nanog@ics-il.net>
Cc: "Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <AYChen@alum.mit.edu>, nanog@nanog.org
Sent: Friday, January 12, 2024 1:16:53 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block




How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.




It's unknowable really.


Lots of network software works just fine today with it. Some don't. To my knowledge some NOS vendors have outright refused to support 240/4 unless it's reclassified. Beyond network equipment, there is an unknowable number of software packages , drivers, etc out in the world which 240/4 is still hardcoded not to work. It's been unfortunate to see this fact handwaved away in many discussions on the subject.


The Mirai worm surfaced in 2016. The software vulnerabilities used in its attack vectors are still unpatched and present in massive numbers across the internet; there are countless variants that still use the same methods, 8 years later. Other vulnerabilities still exist after multiple decades. But we somehow think devices will be patched to support 240/4 quickly?


It's just unrealistic.


On Fri, Jan 12, 2024 at 1:03 PM Mike Hammett < nanog@ics-il.net > wrote:

<blockquote>



" every networking vendor, hardware vendor, and OS vendor"


How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP



From: "Ryan Hamel" < ryan@rkhtech.org >
To: "Abraham Y. Chen" < aychen@avinta.com >, "Vasilenko Eduard" < vasilenko.eduard@huawei.com >
Cc: "Abraham Y. Chen" < AYChen@alum.MIT.edu >, nanog@nanog.org
Sent: Thursday, January 11, 2024 11:04:31 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block


Abraham,


You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.



Ryan

From: NANOG <nanog-bounces+ryan= rkhtech.org@nanog.org > on behalf of Abraham Y. Chen < aychen@avinta.com >
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard < vasilenko.eduard@huawei.com >
Cc: Chen, Abraham Y. < AYChen@alum.MIT.edu >; nanog@nanog.org < nanog@nanog.org >
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block



Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.


Hi, Vasilenko:


1) ... These “ multi-national conglo ” has enough influence on the IETF to not permit it. ":


As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.


Regards,




Abe (2024-01-11 21:38 EST)









On 2024-01-11 01:17, Vasilenko Eduard wrote:

<blockquote>


> It has been known that multi-national conglomerates have been using it without announcement.
This is an assurance that 240/4 would never be permitted for Public Internet. These “ multi-national conglo ” has enough influence on the IETF to not permit it.
Ed/



From: NANOG [ mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org ] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca>
Cc: nanog@nanog.org ; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High


Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
<blockquote>

Hi Nanog Community

Any idea please on the best way to buy IPv4 blocs and what is the price?

Thank you

KARIM

</blockquote>






Virus-free. www.avast.com

</blockquote>




</blockquote>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
>
> You don't need everything in the world to support it, just the things
> "you" use.


You run an ISP, let me posit something.

Stipulate your entire network infra, services, and applications support
240/4, and that it's approved for global , public use tomorrow. Some
company gets a block in there, stands up some website. Here are some
absolutely plausible scenarios that you might have to deal with.

- Some of your customers are running operating systems / network gear that
doesn't support 240/4.
- Some of your customers may be using 3rd party DNS resolvers that don't
support 240/4.
- Some network in between you and the dest missed a few bogon ACLs ,
dropping your customer's traffic.

All of this becomes support issues you have to deal with.

On Fri, Jan 12, 2024 at 2:21?PM Mike Hammett <nanog@ics-il.net> wrote:

> I wouldn't say it's unknowable, just that no one with a sufficient enough
> interest in the cause has been loud enough with the research they've done,
> assuming some research has been done..
>
> You don't need everything in the world to support it, just the things
> "you" use.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL>
> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
> <https://www.linkedin.com/company/intelligent-computing-solutions>
> <https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix>
> <https://www.linkedin.com/company/midwest-internet-exchange>
> <https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp>
> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------
> *From: *"Tom Beecher" <beecher@beecher.cc>
> *To: *"Mike Hammett" <nanog@ics-il.net>
> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <
> AYChen@alum.mit.edu>, nanog@nanog.org
> *Sent: *Friday, January 12, 2024 1:16:53 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
> address block
>
> How far are we from that, in reality? I don't have any intention on using
>> the space, but I would like to put some definition to this boogey man.
>
>
> It's unknowable really.
>
> Lots of network software works just fine today with it. Some don't. To my
> knowledge some NOS vendors have outright refused to support 240/4 unless
> it's reclassified. Beyond network equipment, there is an unknowable number
> of software packages , drivers, etc out in the world which 240/4 is still
> hardcoded not to work. It's been unfortunate to see this fact handwaved
> away in many discussions on the subject.
>
> The Mirai worm surfaced in 2016. The software vulnerabilities used in its
> attack vectors are still unpatched and present in massive numbers
> across the internet; there are countless variants that still use the same
> methods, 8 years later. Other vulnerabilities still exist after
> multiple decades. But we somehow think devices will be patched to support
> 240/4 quickly?
>
> It's just unrealistic.
>
> On Fri, Jan 12, 2024 at 1:03?PM Mike Hammett <nanog@ics-il.net> wrote:
>
>> " every networking vendor, hardware vendor, and OS vendor"
>>
>> How far are we from that, in reality? I don't have any intention on using
>> the space, but I would like to put some definition to this boogey man.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>> *From: *"Ryan Hamel" <ryan@rkhtech.org>
>> *To: *"Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <
>> vasilenko.eduard@huawei.com>
>> *Cc: *"Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
>> *Sent: *Thursday, January 11, 2024 11:04:31 PM
>> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>> address block
>>
>> Abraham,
>>
>> You may not need permission from the IETF, but you effectively need it
>> from every networking vendor, hardware vendor, and OS vendor. If you do not
>> have buy in from key stakeholders, it's dead-on arrival.
>>
>> Ryan
>> ------------------------------
>> *From:* NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of
>> Abraham Y. Chen <aychen@avinta.com>
>> *Sent:* Thursday, January 11, 2024 6:38:52 PM
>> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
>> *Cc:* Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <
>> nanog@nanog.org>
>> *Subject:* Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>> address block
>>
>> Caution: This is an external email and may be malicious. Please take
>> care when clicking links or opening attachments.
>>
>> Hi, Vasilenko:
>>
>> 1) ... These “multi-national conglo” has enough influence on the IETF
>> to not permit it.":
>>
>> As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network
>> that may be deployed stealthily (just like the events reported by the
>> RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
>>
>> Regards,
>>
>>
>> Abe (2024-01-11 21:38 EST)
>>
>>
>>
>>
>> On 2024-01-11 01:17, Vasilenko Eduard wrote:
>>
>> > It has been known that multi-national conglomerates have been using it
>> without announcement.
>>
>> This is an assurance that 240/4 would never be permitted for Public
>> Internet. These “multi-national conglo” has enough influence on the IETF
>> to not permit it.
>>
>> Ed/
>>
>> *From:* NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org
>> <nanog-bounces+vasilenko.eduard=huawei.com@nanog.org>] *On Behalf Of *Abraham
>> Y. Chen
>> *Sent:* Wednesday, January 10, 2024 3:35 PM
>> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca> <amekkaoui@mektel.ca>
>> *Cc:* nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
>> <AYChen@alum.MIT.edu>
>> *Subject:* 202401100645.AYC Re: IPv4 address block
>> *Importance:* High
>>
>>
>>
>> Hi, Karim:
>>
>>
>>
>> 1) If you have control of your own equipment (I presume that your
>> business includes IAP - Internet Access Provider, since you are asking to
>> buy IPv4 blocks.), you can get a large block of reserved IPv4 address *for
>> free* by *disabling* the program codes in your current facility that has
>> been *disabling* the use of 240/4 netblock. Please have a look at the
>> below whitepaper. Utilized according to the outlined disciplines, this is a
>> practically unlimited resources. It has been known that multi-national
>> conglomerates have been using it without announcement. So, you can do so
>> stealthily according to the proposed mechanism which establishes uniform
>> practices, just as well.
>>
>>
>>
>> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>>
>>
>>
>> 2) Being an unorthodox solution, if not controversial, please follow
>> up with me offline. Unless, other NANOGers express their interests.
>>
>>
>>
>>
>>
>> Regards,
>>
>>
>>
>>
>>
>> Abe (2024-01-10 07:34 EST)
>>
>>
>>
>>
>>
>>
>>
>> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>>
>> Hi Nanog Community
>>
>>
>>
>> Any idea please on the best way to buy IPv4 blocs and what is the price?
>>
>>
>>
>> Thank you
>>
>>
>>
>> KARIM
>>
>>
>>
>>
>>
>>
>>
>>
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>
>> Virus-free.www.avast.com
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>
>>
>>
>>
>>
>>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
I'm not talking about global, public use, only private use.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP

----- Original Message -----

From: "Tom Beecher" <beecher@beecher.cc>
To: "Mike Hammett" <nanog@ics-il.net>
Cc: "Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <AYChen@alum.mit.edu>, nanog@nanog.org
Sent: Friday, January 12, 2024 2:06:32 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block




You don't need everything in the world to support it, just the things "you" use.




You run an ISP, let me posit something.


Stipulate your entire network infra, services, and applications support 240/4, and that it's approved for global , public use tomorrow. Some company gets a block in there, stands up some website. Here are some absolutely plausible scenarios that you might have to deal with.


- Some of your customers are running operating systems / network gear that doesn't support 240/4.
- Some of your customers may be using 3rd party DNS resolvers that don't support 240/4.
- Some network in between you and the dest missed a few bogon ACLs , dropping your customer's traffic.


All of this becomes support issues you have to deal with.


On Fri, Jan 12, 2024 at 2:21 PM Mike Hammett < nanog@ics-il.net > wrote:

<blockquote>



I wouldn't say it's unknowable, just that no one with a sufficient enough interest in the cause has been loud enough with the research they've done, assuming some research has been done..


You don't need everything in the world to support it, just the things "you" use.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP



From: "Tom Beecher" < beecher@beecher.cc >
To: "Mike Hammett" < nanog@ics-il.net >
Cc: "Ryan Hamel" < ryan@rkhtech.org >, "Abraham Y. Chen" < AYChen@alum.mit.edu >, nanog@nanog.org
Sent: Friday, January 12, 2024 1:16:53 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block



<blockquote>
How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.
</blockquote>



It's unknowable really.


Lots of network software works just fine today with it. Some don't. To my knowledge some NOS vendors have outright refused to support 240/4 unless it's reclassified. Beyond network equipment, there is an unknowable number of software packages , drivers, etc out in the world which 240/4 is still hardcoded not to work. It's been unfortunate to see this fact handwaved away in many discussions on the subject.


The Mirai worm surfaced in 2016. The software vulnerabilities used in its attack vectors are still unpatched and present in massive numbers across the internet; there are countless variants that still use the same methods, 8 years later. Other vulnerabilities still exist after multiple decades. But we somehow think devices will be patched to support 240/4 quickly?


It's just unrealistic.


On Fri, Jan 12, 2024 at 1:03 PM Mike Hammett < nanog@ics-il.net > wrote:

<blockquote>



" every networking vendor, hardware vendor, and OS vendor"


How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.




-----
Mike Hammett
Intelligent Computing Solutions

Midwest Internet Exchange

The Brothers WISP



From: "Ryan Hamel" < ryan@rkhtech.org >
To: "Abraham Y. Chen" < aychen@avinta.com >, "Vasilenko Eduard" < vasilenko.eduard@huawei.com >
Cc: "Abraham Y. Chen" < AYChen@alum.MIT.edu >, nanog@nanog.org
Sent: Thursday, January 11, 2024 11:04:31 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block


Abraham,


You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.



Ryan

From: NANOG <nanog-bounces+ryan= rkhtech.org@nanog.org > on behalf of Abraham Y. Chen < aychen@avinta.com >
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard < vasilenko.eduard@huawei.com >
Cc: Chen, Abraham Y. < AYChen@alum.MIT.edu >; nanog@nanog.org < nanog@nanog.org >
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block



Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.


Hi, Vasilenko:


1) ... These “ multi-national conglo ” has enough influence on the IETF to not permit it. ":


As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.


Regards,




Abe (2024-01-11 21:38 EST)









On 2024-01-11 01:17, Vasilenko Eduard wrote:

<blockquote>


> It has been known that multi-national conglomerates have been using it without announcement.
This is an assurance that 240/4 would never be permitted for Public Internet. These “ multi-national conglo ” has enough influence on the IETF to not permit it.
Ed/



From: NANOG [ mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org ] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca>
Cc: nanog@nanog.org ; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High


Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
<blockquote>

Hi Nanog Community

Any idea please on the best way to buy IPv4 blocs and what is the price?

Thank you

KARIM

</blockquote>






Virus-free. www.avast.com

</blockquote>




</blockquote>


</blockquote>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Fair enough, I misunderstood your question.

I still think it's basically not knowable.

On Fri, Jan 12, 2024 at 3:16?PM Mike Hammett <nanog@ics-il.net> wrote:

> I'm not talking about global, public use, only private use.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL>
> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
> <https://www.linkedin.com/company/intelligent-computing-solutions>
> <https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix>
> <https://www.linkedin.com/company/midwest-internet-exchange>
> <https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp>
> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------
> *From: *"Tom Beecher" <beecher@beecher.cc>
> *To: *"Mike Hammett" <nanog@ics-il.net>
> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <
> AYChen@alum.mit.edu>, nanog@nanog.org
> *Sent: *Friday, January 12, 2024 2:06:32 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
> address block
>
> You don't need everything in the world to support it, just the things
>> "you" use.
>
>
> You run an ISP, let me posit something.
>
> Stipulate your entire network infra, services, and applications support
> 240/4, and that it's approved for global , public use tomorrow. Some
> company gets a block in there, stands up some website. Here are some
> absolutely plausible scenarios that you might have to deal with.
>
> - Some of your customers are running operating systems / network gear that
> doesn't support 240/4.
> - Some of your customers may be using 3rd party DNS resolvers that don't
> support 240/4.
> - Some network in between you and the dest missed a few bogon ACLs ,
> dropping your customer's traffic.
>
> All of this becomes support issues you have to deal with.
>
> On Fri, Jan 12, 2024 at 2:21?PM Mike Hammett <nanog@ics-il.net> wrote:
>
>> I wouldn't say it's unknowable, just that no one with a sufficient enough
>> interest in the cause has been loud enough with the research they've done,
>> assuming some research has been done..
>>
>> You don't need everything in the world to support it, just the things
>> "you" use.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>> *From: *"Tom Beecher" <beecher@beecher.cc>
>> *To: *"Mike Hammett" <nanog@ics-il.net>
>> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <
>> AYChen@alum.mit.edu>, nanog@nanog.org
>> *Sent: *Friday, January 12, 2024 1:16:53 PM
>> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>> address block
>>
>> How far are we from that, in reality? I don't have any intention on using
>>> the space, but I would like to put some definition to this boogey man.
>>
>>
>> It's unknowable really.
>>
>> Lots of network software works just fine today with it. Some don't. To my
>> knowledge some NOS vendors have outright refused to support 240/4 unless
>> it's reclassified. Beyond network equipment, there is an unknowable number
>> of software packages , drivers, etc out in the world which 240/4 is still
>> hardcoded not to work. It's been unfortunate to see this fact handwaved
>> away in many discussions on the subject.
>>
>> The Mirai worm surfaced in 2016. The software vulnerabilities used in its
>> attack vectors are still unpatched and present in massive numbers
>> across the internet; there are countless variants that still use the same
>> methods, 8 years later. Other vulnerabilities still exist after
>> multiple decades. But we somehow think devices will be patched to support
>> 240/4 quickly?
>>
>> It's just unrealistic.
>>
>> On Fri, Jan 12, 2024 at 1:03?PM Mike Hammett <nanog@ics-il.net> wrote:
>>
>>> " every networking vendor, hardware vendor, and OS vendor"
>>>
>>> How far are we from that, in reality? I don't have any intention on
>>> using the space, but I would like to put some definition to this boogey man.
>>>
>>>
>>>
>>> -----
>>> Mike Hammett
>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>> <https://www.facebook.com/ICSIL>
>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>> <https://twitter.com/ICSIL>
>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>> <https://www.facebook.com/mdwestix>
>>> <https://www.linkedin.com/company/midwest-internet-exchange>
>>> <https://twitter.com/mdwestix>
>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>> <https://www.facebook.com/thebrotherswisp>
>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>> ------------------------------
>>> *From: *"Ryan Hamel" <ryan@rkhtech.org>
>>> *To: *"Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <
>>> vasilenko.eduard@huawei.com>
>>> *Cc: *"Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
>>> *Sent: *Thursday, January 11, 2024 11:04:31 PM
>>> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>>> address block
>>>
>>> Abraham,
>>>
>>> You may not need permission from the IETF, but you effectively need it
>>> from every networking vendor, hardware vendor, and OS vendor. If you do not
>>> have buy in from key stakeholders, it's dead-on arrival.
>>>
>>> Ryan
>>> ------------------------------
>>> *From:* NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of
>>> Abraham Y. Chen <aychen@avinta.com>
>>> *Sent:* Thursday, January 11, 2024 6:38:52 PM
>>> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
>>> *Cc:* Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <
>>> nanog@nanog.org>
>>> *Subject:* Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>>> address block
>>>
>>> Caution: This is an external email and may be malicious. Please take
>>> care when clicking links or opening attachments.
>>>
>>> Hi, Vasilenko:
>>>
>>> 1) ... These “multi-national conglo” has enough influence on the
>>> IETF to not permit it.":
>>>
>>> As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network
>>> that may be deployed stealthily (just like the events reported by the
>>> RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
>>>
>>> Regards,
>>>
>>>
>>> Abe (2024-01-11 21:38 EST)
>>>
>>>
>>>
>>>
>>> On 2024-01-11 01:17, Vasilenko Eduard wrote:
>>>
>>> > It has been known that multi-national conglomerates have been using
>>> it without announcement.
>>>
>>> This is an assurance that 240/4 would never be permitted for Public
>>> Internet. These “multi-national conglo” has enough influence on the
>>> IETF to not permit it.
>>>
>>> Ed/
>>>
>>> *From:* NANOG [
>>> mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org
>>> <nanog-bounces+vasilenko.eduard=huawei.com@nanog.org>] *On Behalf Of *Abraham
>>> Y. Chen
>>> *Sent:* Wednesday, January 10, 2024 3:35 PM
>>> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca> <amekkaoui@mektel.ca>
>>> *Cc:* nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
>>> <AYChen@alum.MIT.edu>
>>> *Subject:* 202401100645.AYC Re: IPv4 address block
>>> *Importance:* High
>>>
>>>
>>>
>>> Hi, Karim:
>>>
>>>
>>>
>>> 1) If you have control of your own equipment (I presume that your
>>> business includes IAP - Internet Access Provider, since you are asking to
>>> buy IPv4 blocks.), you can get a large block of reserved IPv4 address *for
>>> free* by *disabling* the program codes in your current facility that
>>> has been *disabling* the use of 240/4 netblock. Please have a look at
>>> the below whitepaper. Utilized according to the outlined disciplines, this
>>> is a practically unlimited resources. It has been known that multi-national
>>> conglomerates have been using it without announcement. So, you can do so
>>> stealthily according to the proposed mechanism which establishes uniform
>>> practices, just as well.
>>>
>>>
>>>
>>> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>>>
>>>
>>>
>>> 2) Being an unorthodox solution, if not controversial, please follow
>>> up with me offline. Unless, other NANOGers express their interests.
>>>
>>>
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>>
>>>
>>>
>>> Abe (2024-01-10 07:34 EST)
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>>>
>>> Hi Nanog Community
>>>
>>>
>>>
>>> Any idea please on the best way to buy IPv4 blocs and what is the price?
>>>
>>>
>>>
>>> Thank you
>>>
>>>
>>>
>>> KARIM
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>>
>>> Virus-free.www.avast.com
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Windows, Mac, Linux, bad are all done. Juniper, MikroTik, even Cisco are done.Most consumer routers sold in the last 2-3 years are done.
Not sure what “hardware vendor” would be necessary beyond those. There are probably some little used corner cases of routers, os, etc. but for the most part, we are actually there, it’s just deployment at this point.
What’s missing to some extent:
Applications (some, less every day)Logging/monitoring/log parsing (some, getting better)Technical training (especially service providers)
Owen

On Jan 12, 2024, at 10:02, Mike Hammett <nanog@ics-il.net> wrote:

?" every networking vendor, hardware vendor, and OS vendor"
How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.



-----
Mike Hammett
http://www.ics-il.com/"]Intelligent Computing Solutions
https://www.facebook.com/ICSIL"]https://plus.google.com/+IntelligentComputingSolutionsDeKalb"]https://www.linkedin.com/company/intelligent-computing-solutions"]https://twitter.com/ICSIL"]
http://www.midwest-ix.com/"]Midwest Internet Exchange
https://www.facebook.com/mdwestix"]https://www.linkedin.com/company/midwest-internet-exchange"]https://twitter.com/mdwestix"]
http://www.thebrotherswisp.com/"]The Brothers WISP
https://www.facebook.com/thebrotherswisp"]https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg"]

From: "Ryan Hamel" <ryan@rkhtech.org>
To: "Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <vasilenko.eduard@huawei.com>
Cc: "Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
Sent: Thursday, January 11, 2024 11:04:31 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

Abraham,
You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.
Ryan
From: NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of Abraham Y. Chen <aychen@avinta.com>
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <nanog@nanog.org>
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block
Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.
Hi, Vasilenko:
1) ... These “multi-national conglo” has enough influence on the IETF to not permit it.":
As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
Regards,

Abe (2024-01-11 21:38 EST)




On 2024-01-11 01:17, Vasilenko Eduard wrote:


> It has been known that multi-national conglomerates have been using it without announcement.

This is an assurance that 240/4 would never be permitted for Public Internet. These “multi-national conglo” has enough influence on the IETF to not permit it.

Ed/

From: NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca>
Cc: nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High



Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf"] https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:


Hi Nanog Community



Any idea please on the best way to buy IPv4 blocs and what is the price?



Thank you



KARIM







https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]

Virus-free.https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]www.avast.com





Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Apologies, I failed to realize that we were still discussing the absurdity of 240/4 and thought we were talking IPv6. All my comments below apply to v6 progress. 240/4 remains in the who knows?/who cares? Category as far as I’m concerned.
Owen

On Jan 12, 2024, at 22:51, Owen DeLong <owen@delong.com> wrote:

?Windows, Mac, Linux, bad are all done. Juniper, MikroTik, even Cisco are done.Most consumer routers sold in the last 2-3 years are done.
Not sure what “hardware vendor” would be necessary beyond those. There are probably some little used corner cases of routers, os, etc. but for the most part, we are actually there, it’s just deployment at this point.
What’s missing to some extent:
Applications (some, less every day)Logging/monitoring/log parsing (some, getting better)Technical training (especially service providers)
Owen

On Jan 12, 2024, at 10:02, Mike Hammett <nanog@ics-il.net> wrote:

?" every networking vendor, hardware vendor, and OS vendor"
How far are we from that, in reality? I don't have any intention on using the space, but I would like to put some definition to this boogey man.



-----
Mike Hammett
http://www.ics-il.com/"]Intelligent Computing Solutions
https://www.facebook.com/ICSIL"]https://plus.google.com/+IntelligentComputingSolutionsDeKalb"]https://www.linkedin.com/company/intelligent-computing-solutions"]https://twitter.com/ICSIL"]
http://www.midwest-ix.com/"]Midwest Internet Exchange
https://www.facebook.com/mdwestix"]https://www.linkedin.com/company/midwest-internet-exchange"]https://twitter.com/mdwestix"]
http://www.thebrotherswisp.com/"]The Brothers WISP
https://www.facebook.com/thebrotherswisp"]https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg"]

From: "Ryan Hamel" <ryan@rkhtech.org>
To: "Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <vasilenko.eduard@huawei.com>
Cc: "Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
Sent: Thursday, January 11, 2024 11:04:31 PM
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

Abraham,
You may not need permission from the IETF, but you effectively need it from every networking vendor, hardware vendor, and OS vendor. If you do not have buy in from key stakeholders, it's dead-on arrival.
Ryan
From: NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of Abraham Y. Chen <aychen@avinta.com>
Sent: Thursday, January 11, 2024 6:38:52 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>
Cc: Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <nanog@nanog.org>
Subject: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block
Caution: This is an external email and may be malicious. Please take care when clicking links or opening attachments.
Hi, Vasilenko:
1) ... These “multi-national conglo” has enough influence on the IETF to not permit it.":
As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network that may be deployed stealthily (just like the events reported by the RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
Regards,

Abe (2024-01-11 21:38 EST)




On 2024-01-11 01:17, Vasilenko Eduard wrote:


> It has been known that multi-national conglomerates have been using it without announcement.

This is an assurance that 240/4 would never be permitted for Public Internet. These “multi-national conglo” has enough influence on the IETF to not permit it.

Ed/

From: NANOG [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org] On Behalf Of Abraham Y. Chen
Sent: Wednesday, January 10, 2024 3:35 PM
To: KARIM MEKKAOUI <amekkaoui@mektel.ca>
Cc: nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
Subject: 202401100645.AYC Re: IPv4 address block
Importance: High



Hi, Karim:



1) If you have control of your own equipment (I presume that your business includes IAP - Internet Access Provider, since you are asking to buy IPv4 blocks.), you can get a large block of reserved IPv4 address for free by disabling the program codes in your current facility that has been disabling the use of 240/4 netblock. Please have a look at the below whitepaper. Utilized according to the outlined disciplines, this is a practically unlimited resources. It has been known that multi-national conglomerates have been using it without announcement. So, you can do so stealthily according to the proposed mechanism which establishes uniform practices, just as well.



https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf"] https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf



2) Being an unorthodox solution, if not controversial, please follow up with me offline. Unless, other NANOGers express their interests.





Regards,





Abe (2024-01-10 07:34 EST)







On 2024-01-07 22:46, KARIM MEKKAOUI wrote:


Hi Nanog Community



Any idea please on the best way to buy IPv4 blocs and what is the price?



Thank you



KARIM







https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]

Virus-free.https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]www.avast.com





Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Hi, Mike:

1)   "... only private use. ...":

    The EzIP deployment plan is to use 240/4 netblock as "Semi-Public"
addresses for the existing CG-NAT facility. With many RG-NATs (Routing /
Residential Gateway -NATs) already capable of being 240/4 clients thru
the upgrade to OpenWrt, no IoT on any private premises will sense any
change.

Regards,


Abe (2024-01-14 23:04)


On 2024-01-12 15:16, Mike Hammett wrote:
> I'm not talking about global, public use, only private use.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp><https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------------------------------------------------
> *From: *"Tom Beecher" <beecher@beecher.cc>
> *To: *"Mike Hammett" <nanog@ics-il.net>
> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen"
> <AYChen@alum.mit.edu>, nanog@nanog.org
> *Sent: *Friday, January 12, 2024 2:06:32 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
> address block
>
> You don't need everything in the world to support it, just the
> things "you" use.
>
>
> You run an ISP, let me posit something.
>
> Stipulate your entire network infra, services, and applications
> support 240/4, and that it's approved for global , public use
> tomorrow. Some company gets a block in there, stands up some website.
> Here are some absolutely plausible scenarios that you might have to
> deal with.
>
> - Some of your customers are running operating systems / network gear
> that doesn't support 240/4.
> - Some of your customers may be using 3rd party DNS resolvers that
> don't support 240/4.
> - Some network in between you and the dest missed a few bogon ACLs ,
> dropping your customer's traffic.
>
> All of this becomes support issues you have to deal with.
>
> On Fri, Jan 12, 2024 at 2:21?PM Mike Hammett <nanog@ics-il.net> wrote:
>
> I wouldn't say it's unknowable, just that no one with a sufficient
> enough interest in the cause has been loud enough with the
> research they've done, assuming some research has been done..
>
> You don't need everything in the world to support it, just the
> things "you" use.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp><https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------------------------------------------------
> *From: *"Tom Beecher" <beecher@beecher.cc>
> *To: *"Mike Hammett" <nanog@ics-il.net>
> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen"
> <AYChen@alum.mit.edu>, nanog@nanog.org
> *Sent: *Friday, January 12, 2024 1:16:53 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re:
> IPv4 address block
>
> How far are we from that, in reality? I don't have any
> intention on using the space, but I would like to put some
> definition to this boogey man.
>
>
> It's unknowable really.
>
> Lots of network software works just fine today with it. Some
> don't. To my knowledge some NOS vendors have outright refused to
> support 240/4 unless it's reclassified. Beyond network equipment,
> there is an unknowable number of software packages , drivers, etc
> out in the world which 240/4 is still hardcoded not to work. It's
> been unfortunate to see this fact handwaved away in many
> discussions on the subject.
>
> The Mirai worm surfaced in 2016. The software vulnerabilities used
> in its attack vectors are still unpatched and present in massive
> numbers across the internet; there are countless variants that
> still use the same methods, 8 years later. Other
> vulnerabilities still exist after multiple decades. But we somehow
> think devices will be patched to support 240/4 quickly?
>
> It's just unrealistic.
>
> On Fri, Jan 12, 2024 at 1:03?PM Mike Hammett <nanog@ics-il.net> wrote:
>
> " every networking vendor, hardware vendor, and OS vendor"
>
> How far are we from that, in reality? I don't have any
> intention on using the space, but I would like to put some
> definition to this boogey man.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp><https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------------------------------------------------
> *From: *"Ryan Hamel" <ryan@rkhtech.org>
> *To: *"Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko
> Eduard" <vasilenko.eduard@huawei.com>
> *Cc: *"Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
> *Sent: *Thursday, January 11, 2024 11:04:31 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC
> Re: IPv4 address block
>
> Abraham,
>
> You may not need permission from the IETF, but you effectively
> need it from every networking vendor, hardware vendor, and OS
> vendor. If you do not have buy in from key stakeholders, it's
> dead-on arrival.
>
> Ryan
> ------------------------------------------------------------------------
> *From:* NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on
> behalf of Abraham Y. Chen <aychen@avinta.com>
> *Sent:* Thursday, January 11, 2024 6:38:52 PM
> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
> *Cc:* Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org
> <nanog@nanog.org>
> *Subject:* Stealthy Overlay Network Re: 202401100645.AYC Re:
> IPv4 address block
>
>
> Caution: This is an external email and may be malicious.
> Please take care when clicking links or opening attachments.
>
>
> Hi, Vasilenko:
>
> 1)    ... These “multi-national conglo” has enough influence
> on the IETF to not permit it.":
>
>     As classified by Vint Cerf, 240/4 enabled EzIP is an
> overlay network that may be deployed stealthily (just like the
> events reported by the RIPE-LAB). So, EzIP deployment does not
> need permission from the IETF.
>
> Regards,
>
>
> Abe (2024-01-11 21:38 EST)
>
>
>
>
> On 2024-01-11 01:17, Vasilenko Eduard wrote:
>
> > It has been known that multi-national conglomerates have
> been using it without announcement.
>
> This is an assurance that 240/4 would never be permitted
> for Public Internet. These “multi-national conglo” has
> enough influence on the IETF to not permit it.
>
> Ed/
>
> *From:* NANOG
> [mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org
> <mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org>]
> *On Behalf Of *Abraham Y. Chen
> *Sent:* Wednesday, January 10, 2024 3:35 PM
> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca>
> <mailto:amekkaoui@mektel.ca>
> *Cc:* nanog@nanog.org; Chen, Abraham Y.
> <AYChen@alum.MIT.edu> <mailto:AYChen@alum.MIT.edu>
> *Subject:* 202401100645.AYC Re: IPv4 address block
> *Importance:* High
>
> Hi, Karim:
>
> 1)    If you have control of your own equipment (I presume
> that your business includes IAP - Internet Access
> Provider, since you are asking to buy IPv4 blocks.), you
> can get a large block of reserved IPv4 address */_for
> free_/* by */_disabling_/* the program codes in your
> current facility that has been */_disabling_/* the use of
> 240/4 netblock. Please have a look at the below
> whitepaper. Utilized according to the outlined
> disciplines, this is a practically unlimited resources. It
> has been known that multi-national conglomerates have been
> using it without announcement. So, you can do so
> stealthily according to the proposed mechanism which
> establishes uniform practices, just as well.
>
> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>
> 2)    Being an unorthodox solution, if not controversial,
> please follow up with me offline. Unless, other NANOGers
> express their interests.
>
> Regards,
>
> Abe (2024-01-10 07:34 EST)
>
> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>
> Hi Nanog Community
>
> Any idea please on the best way to buy IPv4 blocs and
> what is the price?
>
> Thank you
>
> KARIM
>
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
>
>
> Virus-free.www.avast.com
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
>
>
>
>


--
This email has been checked for viruses by Avast antivirus software.
www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait, I'm
lost...

With CGNAT, there is either public IP space in front of the gateway, or
private space behind it. There is no such thing as "semi-private" space in
the world of CGNAT, as devices with public IPs can't directly access
devices behind a CGNAT gateway with a 100.64/10 address. It's either a
public address, or a private address (not to be confused with an RFC1918
private address).

Let's talk hypothetically for a minute and assume that 240/4 is used as
CGNAT space. Your "solution" to residential gateways not supporting the use
of 240/4 space being upgraded to OpenWRT won't work, because not all CPE
supports OpenWRT.

Instead of attempting to use a larger prefix for CGNAT, IPv6 is definitely
the easier solution to implement as the vast majority of vendors already
support v6.

Regards,
Christopher Hawker

On Mon, 15 Jan 2024 at 15:06, Abraham Y. Chen <aychen@avinta.com> wrote:

> Hi, Mike:
>
> 1) "... only private use. ...":
>
> The EzIP deployment plan is to use 240/4 netblock as "Semi-Public"
> addresses for the existing CG-NAT facility. With many RG-NATs (Routing /
> Residential Gateway -NATs) already capable of being 240/4 clients thru the
> upgrade to OpenWrt, no IoT on any private premises will sense any change.
>
> Regards,
>
>
> Abe (2024-01-14 23:04)
>
>
> On 2024-01-12 15:16, Mike Hammett wrote:
>
> I'm not talking about global, public use, only private use.
>
>
>
> -----
> Mike Hammett
> Intelligent Computing Solutions <http://www.ics-il.com/>
> <https://www.facebook.com/ICSIL>
> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
> <https://www.linkedin.com/company/intelligent-computing-solutions>
> <https://twitter.com/ICSIL>
> Midwest Internet Exchange <http://www.midwest-ix.com/>
> <https://www.facebook.com/mdwestix>
> <https://www.linkedin.com/company/midwest-internet-exchange>
> <https://twitter.com/mdwestix>
> The Brothers WISP <http://www.thebrotherswisp.com/>
> <https://www.facebook.com/thebrotherswisp>
> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> ------------------------------
> *From: *"Tom Beecher" <beecher@beecher.cc> <beecher@beecher.cc>
> *To: *"Mike Hammett" <nanog@ics-il.net> <nanog@ics-il.net>
> *Cc: *"Ryan Hamel" <ryan@rkhtech.org> <ryan@rkhtech.org>, "Abraham Y.
> Chen" <AYChen@alum.mit.edu> <AYChen@alum.mit.edu>, nanog@nanog.org
> *Sent: *Friday, January 12, 2024 2:06:32 PM
> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
> address block
>
> You don't need everything in the world to support it, just the things
>> "you" use.
>
>
> You run an ISP, let me posit something.
>
> Stipulate your entire network infra, services, and applications support
> 240/4, and that it's approved for global , public use tomorrow. Some
> company gets a block in there, stands up some website. Here are some
> absolutely plausible scenarios that you might have to deal with.
>
> - Some of your customers are running operating systems / network gear that
> doesn't support 240/4.
> - Some of your customers may be using 3rd party DNS resolvers that don't
> support 240/4.
> - Some network in between you and the dest missed a few bogon ACLs ,
> dropping your customer's traffic.
>
> All of this becomes support issues you have to deal with.
>
> On Fri, Jan 12, 2024 at 2:21?PM Mike Hammett <nanog@ics-il.net> wrote:
>
>> I wouldn't say it's unknowable, just that no one with a sufficient enough
>> interest in the cause has been loud enough with the research they've done,
>> assuming some research has been done..
>>
>> You don't need everything in the world to support it, just the things
>> "you" use.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>> *From: *"Tom Beecher" <beecher@beecher.cc>
>> *To: *"Mike Hammett" <nanog@ics-il.net>
>> *Cc: *"Ryan Hamel" <ryan@rkhtech.org>, "Abraham Y. Chen" <
>> AYChen@alum.mit.edu>, nanog@nanog.org
>> *Sent: *Friday, January 12, 2024 1:16:53 PM
>> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>> address block
>>
>> How far are we from that, in reality? I don't have any intention on using
>>> the space, but I would like to put some definition to this boogey man.
>>
>>
>> It's unknowable really.
>>
>> Lots of network software works just fine today with it. Some don't. To my
>> knowledge some NOS vendors have outright refused to support 240/4 unless
>> it's reclassified. Beyond network equipment, there is an unknowable number
>> of software packages , drivers, etc out in the world which 240/4 is still
>> hardcoded not to work. It's been unfortunate to see this fact handwaved
>> away in many discussions on the subject.
>>
>> The Mirai worm surfaced in 2016. The software vulnerabilities used in its
>> attack vectors are still unpatched and present in massive numbers
>> across the internet; there are countless variants that still use the same
>> methods, 8 years later. Other vulnerabilities still exist after
>> multiple decades. But we somehow think devices will be patched to support
>> 240/4 quickly?
>>
>> It's just unrealistic.
>>
>> On Fri, Jan 12, 2024 at 1:03?PM Mike Hammett <nanog@ics-il.net> wrote:
>>
>>> " every networking vendor, hardware vendor, and OS vendor"
>>>
>>> How far are we from that, in reality? I don't have any intention on
>>> using the space, but I would like to put some definition to this boogey man.
>>>
>>>
>>>
>>> -----
>>> Mike Hammett
>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>> <https://www.facebook.com/ICSIL>
>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>> <https://twitter.com/ICSIL>
>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>> <https://www.facebook.com/mdwestix>
>>> <https://www.linkedin.com/company/midwest-internet-exchange>
>>> <https://twitter.com/mdwestix>
>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>> <https://www.facebook.com/thebrotherswisp>
>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>> ------------------------------
>>> *From: *"Ryan Hamel" <ryan@rkhtech.org>
>>> *To: *"Abraham Y. Chen" <aychen@avinta.com>, "Vasilenko Eduard" <
>>> vasilenko.eduard@huawei.com>
>>> *Cc: *"Abraham Y. Chen" <AYChen@alum.MIT.edu>, nanog@nanog.org
>>> *Sent: *Thursday, January 11, 2024 11:04:31 PM
>>> *Subject: *Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>>> address block
>>>
>>> Abraham,
>>>
>>> You may not need permission from the IETF, but you effectively need it
>>> from every networking vendor, hardware vendor, and OS vendor. If you do not
>>> have buy in from key stakeholders, it's dead-on arrival.
>>>
>>> Ryan
>>> ------------------------------
>>> *From:* NANOG <nanog-bounces+ryan=rkhtech.org@nanog.org> on behalf of
>>> Abraham Y. Chen <aychen@avinta.com>
>>> *Sent:* Thursday, January 11, 2024 6:38:52 PM
>>> *To:* Vasilenko Eduard <vasilenko.eduard@huawei.com>
>>> *Cc:* Chen, Abraham Y. <AYChen@alum.MIT.edu>; nanog@nanog.org <
>>> nanog@nanog.org>
>>> *Subject:* Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4
>>> address block
>>>
>>>
>>> Caution: This is an external email and may be malicious. Please take
>>> care when clicking links or opening attachments.
>>>
>>> Hi, Vasilenko:
>>>
>>> 1) ... These “multi-national conglo” has enough influence on the
>>> IETF to not permit it.":
>>>
>>> As classified by Vint Cerf, 240/4 enabled EzIP is an overlay network
>>> that may be deployed stealthily (just like the events reported by the
>>> RIPE-LAB). So, EzIP deployment does not need permission from the IETF.
>>>
>>> Regards,
>>>
>>>
>>> Abe (2024-01-11 21:38 EST)
>>>
>>>
>>>
>>>
>>> On 2024-01-11 01:17, Vasilenko Eduard wrote:
>>>
>>> > It has been known that multi-national conglomerates have been using
>>> it without announcement.
>>>
>>> This is an assurance that 240/4 would never be permitted for Public
>>> Internet. These “multi-national conglo” has enough influence on the
>>> IETF to not permit it.
>>>
>>> Ed/
>>>
>>> *From:* NANOG [
>>> mailto:nanog-bounces+vasilenko.eduard=huawei.com@nanog.org
>>> <nanog-bounces+vasilenko.eduard=huawei.com@nanog.org>] *On Behalf Of *Abraham
>>> Y. Chen
>>> *Sent:* Wednesday, January 10, 2024 3:35 PM
>>> *To:* KARIM MEKKAOUI <amekkaoui@mektel.ca> <amekkaoui@mektel.ca>
>>> *Cc:* nanog@nanog.org; Chen, Abraham Y. <AYChen@alum.MIT.edu>
>>> <AYChen@alum.MIT.edu>
>>> *Subject:* 202401100645.AYC Re: IPv4 address block
>>> *Importance:* High
>>>
>>>
>>>
>>> Hi, Karim:
>>>
>>>
>>>
>>> 1) If you have control of your own equipment (I presume that your
>>> business includes IAP - Internet Access Provider, since you are asking to
>>> buy IPv4 blocks.), you can get a large block of reserved IPv4 address *for
>>> free* by *disabling* the program codes in your current facility that
>>> has been *disabling* the use of 240/4 netblock. Please have a look at
>>> the below whitepaper. Utilized according to the outlined disciplines, this
>>> is a practically unlimited resources. It has been known that multi-national
>>> conglomerates have been using it without announcement. So, you can do so
>>> stealthily according to the proposed mechanism which establishes uniform
>>> practices, just as well.
>>>
>>>
>>>
>>> https://www.avinta.com/phoenix-1/home/RevampTheInternet.pdf
>>>
>>>
>>>
>>> 2) Being an unorthodox solution, if not controversial, please follow
>>> up with me offline. Unless, other NANOGers express their interests.
>>>
>>>
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>>
>>>
>>>
>>> Abe (2024-01-10 07:34 EST)
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On 2024-01-07 22:46, KARIM MEKKAOUI wrote:
>>>
>>> Hi Nanog Community
>>>
>>>
>>>
>>> Any idea please on the best way to buy IPv4 blocs and what is the price?
>>>
>>>
>>>
>>> Thank you
>>>
>>>
>>>
>>> KARIM
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>>
>>> Virus-free.www.avast.com
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Hi, Christopher:

1)    " Hang on... So EzIP is now about using 240/4 as CGNAT space?
Wait, I'm lost...   ":

    Correct. This is one way to visualize the EzIP deployment. This
configuration is so far the most concise manner to describe the the EzIP
building block, RAN (Regional Area Network). The nice thing about this
approach is that everything exists and is already working daily in each
CG-NAT cluster. All needed to expand its capability is a larger
netblock. Since 240/4 is fundamentally not an outlier in the overall
IPv4 address pool, except being classified as "Reserved" for a long
time, enabling it to work in a CG-NAT should not be any big challenge.

2)    "   ... There is no such thing as "semi-private" space in the
world of CGNAT, ... ":

    Correct. However, not distinguishing 100.64/10 netblock from the
common public and private parts of the IPv4 space made it vague as which
function does it provide. That is, in terms of re-usability for each
isolated geographical area, it is like another RFC1918 private netblock.
On the other hand, CG-NAT is clearly used in geographically public
areas. So, 100.64/10 should be classified as "public". In addition,
100.64/10 is listed according to "IANA IPv4 Address Space Registry" as
part of the 100/8 netblock under ARIN, but now used by everyone
worldwide. To avoid similar ambiguity that leads to confusions, we
decided to call 240/4 as "semi-public" to more explicitly convey the
concept. (Actually, we initially called 240/4 "semi-private" thinking
that it could be the fourth RFC1918 netblock, until we realized that the
RFC6589 environment was a much better fit.)

3)    " Your "solution" to residential gateways not supporting the use
of 240/4 space being upgraded to OpenWrt won't work, because not all CPE
supports OpenWrt.   ":

    OpenWrt is just an open source RG code that can replace that in
commercial RGs that have been supporting CPEs. Like the EzIP concept,
the OpenWrt upgrade of RG-NAT is an enhancement to the existing RG
functionality. Thus, OpenWrt enabled RGs can operate with the
combination of public (including RFC6589) with 240/4 netblocks on the
upstream (WAN) side, and private (RFC1918) with 240/4 netblocks on the
downstream (LAN) side. So, there is no compatibility change that a CPE
(on-premises IoT) can sense. This critical characteristics was the
result of an OpenWrt core code upgrade in 2019 contributed by Dave Taht
of "IPv4 Unicast Extensions Project". Before that, EzIP was just a
theoretically feasible scheme.

4)    In addition, OpenWrt at least works with one network router by
D-Link (see URL below). This means that, with both WAN and LAN sides of
a router supporting 240/4, a beginner's reference RAN can be built and
experimented with it:

https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch

5)    " Instead of attempting to use a larger prefix for CGNAT, IPv6 is
definitely the easier solution to implement as the vast majority of
vendors already support v6. ":

    Since the general consensus is that for moving ahead, we will rely
on Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist
for the foreseeable future, it would more expedient for the community as
a whole, if we could focus on technical discussions for each camp
respectively, while minimizing invitation messages from the other side.
I hope you do agree.

Regards,


Abe (2024-01-15 11:27)



On 2024-01-15 00:09, Christopher Hawker wrote:
> Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait, I'm
> lost...
>
> With CGNAT, there is either public IP space in front of the gateway,
> or private space behind it. There is no such thing as "semi-private"
> space in the world of CGNAT, as devices with public IPs can't directly
> access devices behind a CGNAT gateway with a 100.64/10 address. It's
> either a public address, or a private address (not to be confused with
> an RFC1918 private address).
>
> Let's talk hypothetically for a minute and assume that 240/4 is used
> as CGNAT space. Your "solution" to residential gateways not supporting
> the use of 240/4 space being upgraded to OpenWRT won't work, because
> not all CPE supports OpenWRT.
>
> Instead of attempting to use a larger prefix for CGNAT, IPv6 is
> definitely the easier solution to implement as the vast majority of
> vendors already support v6.
>
> Regards,
> Christopher Hawker
>
> On Mon, 15 Jan 2024 at 15:06, Abraham Y. Chen <aychen@avinta.com> wrote:
>
> Hi, Mike:
>
> 1)   "... only private use. ...":
>
>     The EzIP deployment plan is to use 240/4 netblock as
> "Semi-Public" addresses for the existing CG-NAT facility. With
> many RG-NATs (Routing / Residential Gateway -NATs) already capable
> of being 240/4 clients thru the upgrade to OpenWrt, no IoT on any
> private premises will sense any change.
>
> Regards,
>
>
> Abe (2024-01-14 23:04)
>
>
> On 2024-01-12 15:16, Mike Hammett wrote:
>> I'm not talking about global, public use, only private use.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp><https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------------------------------------------------
>>


--
This email has been checked for viruses by Avast antivirus software.
www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is,
not rename something that already exists and attempt to claim it as a new
idea.

It is completely unnecessary to use 240/4 as CGNAT space. Here are a few
reasons why:

1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a
/24 from this to be used for CGNAT gateways, load balancing, etc. this
still allows for 4,194,048 usable addresses for CPE. When performing NAT,
you would need to allocate each subscriber approximately 1000 ports for NAT
to work successfully. The entire /10 (less the /24) would require the
equivalent of a /16 public IPv4 prefix to use the entire 100.64/10 space in
one region. To put this into comparison, you would use the entire 100.64/10
space in a city the size of New York or Los Angeles allowing for one
internet service per 4 or 2 people respectively. It's not practical.
2. Multiple CGNAT regions that are at capacity would not have a need for
uniquely routable IP space between them. It's heavily designed for traffic
from the user to the wider internet, not for inter-region routing. Carriers
already have systems in place where subscribers can request a public
address if they need it (such as working from home with advanced corporate
networks, etc).

100.64/10 is not public IP space, because it is not usable in the DFZ. I
don't believe there is any confusion or ambiguity about this space because
if you do a Whois lookup on 100.64.0.0/10 at any one of the five RIRs, it
reflects that it is IANA shared address space for service providers.
Footnote 6 on the page you referenced reads "100.64.0.0/10 reserved for
Shared Address Space". It has not been delegated to ARIN. Rather clear as
to its use case.

I don't think you quite grasp the concept that OpenWRT is not compatible
with devices that do not support it. It would only work on routers for
which it is compatible and it would not be appropriate to expect every
device vendor to support it. To add-on to this, why would vendors need to
enable 240/4 CGNAT support when their customers don't have a need for it?

You've provided a link to a D-Link managed switch, not a router. Just
because it can support L2 routing, doesn't make it a router.

I'm all for discussing ideas and suggestions and working towards proper
IPv6 deployment. It certainly appears to be the case that the community
does not support your proposed "EzIP" solution. If you are recommending
that 240/4 space be used for CGNAT space under RFC6598, then call it as it
is instead of inventing new terminology.

Regards,
Christopher Hawker

On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com> wrote:

> Hi, Christopher:
>
> 1) " Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait,
> I'm lost... ":
>
> Correct. This is one way to visualize the EzIP deployment. This
> configuration is so far the most concise manner to describe the the EzIP
> building block, RAN (Regional Area Network). The nice thing about this
> approach is that everything exists and is already working daily in each
> CG-NAT cluster. All needed to expand its capability is a larger netblock.
> Since 240/4 is fundamentally not an outlier in the overall IPv4 address
> pool, except being classified as "Reserved" for a long time, enabling it to
> work in a CG-NAT should not be any big challenge.
> 2) " ... There is no such thing as "semi-private" space in the world
> of CGNAT, ... ":
>
> Correct. However, not distinguishing 100.64/10 netblock from the
> common public and private parts of the IPv4 space made it vague as which
> function does it provide. That is, in terms of re-usability for each
> isolated geographical area, it is like another RFC1918 private netblock. On
> the other hand, CG-NAT is clearly used in geographically public areas. So,
> 100.64/10 should be classified as "public". In addition, 100.64/10 is
> listed according to "IANA IPv4 Address Space Registry" as part of the 100/8
> netblock under ARIN, but now used by everyone worldwide. To avoid similar
> ambiguity that leads to confusions, we decided to call 240/4 as
> "semi-public" to more explicitly convey the concept. (Actually, we
> initially called 240/4 "semi-private" thinking that it could be the fourth
> RFC1918 netblock, until we realized that the RFC6589 environment was a much
> better fit.)
>
> 3) " Your "solution" to residential gateways not supporting the use of
> 240/4 space being upgraded to OpenWrt won't work, because not all CPE
> supports OpenWrt. ":
>
> OpenWrt is just an open source RG code that can replace that in
> commercial RGs that have been supporting CPEs. Like the EzIP concept, the
> OpenWrt upgrade of RG-NAT is an enhancement to the existing RG
> functionality. Thus, OpenWrt enabled RGs can operate with the combination
> of public (including RFC6589) with 240/4 netblocks on the upstream (WAN)
> side, and private (RFC1918) with 240/4 netblocks on the downstream (LAN)
> side. So, there is no compatibility change that a CPE (on-premises IoT) can
> sense. This critical characteristics was the result of an OpenWrt core code
> upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast Extensions
> Project". Before that, EzIP was just a theoretically feasible scheme.
>
> 4) In addition, OpenWrt at least works with one network router by
> D-Link (see URL below). This means that, with both WAN and LAN sides of a
> router supporting 240/4, a beginner's reference RAN can be built and
> experimented with it:
>
>
> https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch
>
> 5) " Instead of attempting to use a larger prefix for CGNAT, IPv6 is
> definitely the easier solution to implement as the vast majority of vendors
> already support v6. ":
>
> Since the general consensus is that for moving ahead, we will rely on
> Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist for the
> foreseeable future, it would more expedient for the community as a whole,
> if we could focus on technical discussions for each camp respectively,
> while minimizing invitation messages from the other side. I hope you do
> agree.
>
> Regards,
>
>
> Abe (2024-01-15 11:27)
>
>
>
> On 2024-01-15 00:09, Christopher Hawker wrote:
>
> Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait, I'm
> lost...
>
> With CGNAT, there is either public IP space in front of the gateway, or
> private space behind it. There is no such thing as "semi-private" space in
> the world of CGNAT, as devices with public IPs can't directly access
> devices behind a CGNAT gateway with a 100.64/10 address. It's either a
> public address, or a private address (not to be confused with an RFC1918
> private address).
>
> Let's talk hypothetically for a minute and assume that 240/4 is used as
> CGNAT space. Your "solution" to residential gateways not supporting the use
> of 240/4 space being upgraded to OpenWRT won't work, because not all CPE
> supports OpenWRT.
>
> Instead of attempting to use a larger prefix for CGNAT, IPv6 is definitely
> the easier solution to implement as the vast majority of vendors already
> support v6.
>
> Regards,
> Christopher Hawker
>
> On Mon, 15 Jan 2024 at 15:06, Abraham Y. Chen <aychen@avinta.com> wrote:
>
>> Hi, Mike:
>>
>> 1) "... only private use. ...":
>>
>> The EzIP deployment plan is to use 240/4 netblock as "Semi-Public"
>> addresses for the existing CG-NAT facility. With many RG-NATs (Routing /
>> Residential Gateway -NATs) already capable of being 240/4 clients thru the
>> upgrade to OpenWrt, no IoT on any private premises will sense any change.
>>
>> Regards,
>>
>>
>> Abe (2024-01-14 23:04)
>>
>>
>> On 2024-01-12 15:16, Mike Hammett wrote:
>>
>> I'm not talking about global, public use, only private use.
>>
>>
>>
>> -----
>> Mike Hammett
>> Intelligent Computing Solutions <http://www.ics-il.com/>
>> <https://www.facebook.com/ICSIL>
>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>> <https://twitter.com/ICSIL>
>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>> <https://www.facebook.com/mdwestix>
>> <https://www.linkedin.com/company/midwest-internet-exchange>
>> <https://twitter.com/mdwestix>
>> The Brothers WISP <http://www.thebrotherswisp.com/>
>> <https://www.facebook.com/thebrotherswisp>
>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>> ------------------------------
>>
>>
>
>
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
> Virus-free.www.avast.com
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
> <#m_3753820813357424668_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
>
> If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is,
> not rename something that already exists and attempt to claim it as a new
> idea.
>

Yes he is essentially re-creating NAT/CGNAT, but in a worse way.

If you ignore all the multitude of technical issues, if you grabbed an
"EZIP packet" in flight from the DFZ, you would STILL see SRC and DST as
normal IPv4 addresses, just with extra stuff in the options field.
Translations still happen at what he calls 'SPRs' , just differently.


On Mon, Jan 15, 2024 at 6:35?PM Christopher Hawker <chris@thesysadmin.au>
wrote:

> If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is,
> not rename something that already exists and attempt to claim it as a new
> idea.
>
> It is completely unnecessary to use 240/4 as CGNAT space. Here are a few
> reasons why:
>
> 1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a
> /24 from this to be used for CGNAT gateways, load balancing, etc. this
> still allows for 4,194,048 usable addresses for CPE. When performing NAT,
> you would need to allocate each subscriber approximately 1000 ports for NAT
> to work successfully. The entire /10 (less the /24) would require the
> equivalent of a /16 public IPv4 prefix to use the entire 100.64/10 space in
> one region. To put this into comparison, you would use the entire 100.64/10
> space in a city the size of New York or Los Angeles allowing for one
> internet service per 4 or 2 people respectively. It's not practical.
> 2. Multiple CGNAT regions that are at capacity would not have a need
> for uniquely routable IP space between them. It's heavily designed for
> traffic from the user to the wider internet, not for inter-region routing.
> Carriers already have systems in place where subscribers can request a
> public address if they need it (such as working from home with advanced
> corporate networks, etc).
>
> 100.64/10 is not public IP space, because it is not usable in the DFZ. I
> don't believe there is any confusion or ambiguity about this space because
> if you do a Whois lookup on 100.64.0.0/10 at any one of the five RIRs, it
> reflects that it is IANA shared address space for service providers.
> Footnote 6 on the page you referenced reads "100.64.0.0/10 reserved for
> Shared Address Space". It has not been delegated to ARIN. Rather clear as
> to its use case.
>
> I don't think you quite grasp the concept that OpenWRT is not compatible
> with devices that do not support it. It would only work on routers for
> which it is compatible and it would not be appropriate to expect every
> device vendor to support it. To add-on to this, why would vendors need to
> enable 240/4 CGNAT support when their customers don't have a need for it?
>
> You've provided a link to a D-Link managed switch, not a router. Just
> because it can support L2 routing, doesn't make it a router.
>
> I'm all for discussing ideas and suggestions and working towards proper
> IPv6 deployment. It certainly appears to be the case that the community
> does not support your proposed "EzIP" solution. If you are recommending
> that 240/4 space be used for CGNAT space under RFC6598, then call it as it
> is instead of inventing new terminology.
>
> Regards,
> Christopher Hawker
>
> On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com> wrote:
>
>> Hi, Christopher:
>>
>> 1) " Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait,
>> I'm lost... ":
>>
>> Correct. This is one way to visualize the EzIP deployment. This
>> configuration is so far the most concise manner to describe the the EzIP
>> building block, RAN (Regional Area Network). The nice thing about this
>> approach is that everything exists and is already working daily in each
>> CG-NAT cluster. All needed to expand its capability is a larger netblock.
>> Since 240/4 is fundamentally not an outlier in the overall IPv4 address
>> pool, except being classified as "Reserved" for a long time, enabling it to
>> work in a CG-NAT should not be any big challenge.
>> 2) " ... There is no such thing as "semi-private" space in the world
>> of CGNAT, ... ":
>>
>> Correct. However, not distinguishing 100.64/10 netblock from the
>> common public and private parts of the IPv4 space made it vague as which
>> function does it provide. That is, in terms of re-usability for each
>> isolated geographical area, it is like another RFC1918 private netblock. On
>> the other hand, CG-NAT is clearly used in geographically public areas. So,
>> 100.64/10 should be classified as "public". In addition, 100.64/10 is
>> listed according to "IANA IPv4 Address Space Registry" as part of the 100/8
>> netblock under ARIN, but now used by everyone worldwide. To avoid similar
>> ambiguity that leads to confusions, we decided to call 240/4 as
>> "semi-public" to more explicitly convey the concept. (Actually, we
>> initially called 240/4 "semi-private" thinking that it could be the fourth
>> RFC1918 netblock, until we realized that the RFC6589 environment was a much
>> better fit.)
>>
>> 3) " Your "solution" to residential gateways not supporting the use of
>> 240/4 space being upgraded to OpenWrt won't work, because not all CPE
>> supports OpenWrt. ":
>>
>> OpenWrt is just an open source RG code that can replace that in
>> commercial RGs that have been supporting CPEs. Like the EzIP concept, the
>> OpenWrt upgrade of RG-NAT is an enhancement to the existing RG
>> functionality. Thus, OpenWrt enabled RGs can operate with the combination
>> of public (including RFC6589) with 240/4 netblocks on the upstream (WAN)
>> side, and private (RFC1918) with 240/4 netblocks on the downstream (LAN)
>> side. So, there is no compatibility change that a CPE (on-premises IoT) can
>> sense. This critical characteristics was the result of an OpenWrt core code
>> upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast Extensions
>> Project". Before that, EzIP was just a theoretically feasible scheme.
>>
>> 4) In addition, OpenWrt at least works with one network router by
>> D-Link (see URL below). This means that, with both WAN and LAN sides of a
>> router supporting 240/4, a beginner's reference RAN can be built and
>> experimented with it:
>>
>>
>> https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch
>>
>> 5) " Instead of attempting to use a larger prefix for CGNAT, IPv6 is
>> definitely the easier solution to implement as the vast majority of vendors
>> already support v6. ":
>>
>> Since the general consensus is that for moving ahead, we will rely on
>> Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist for the
>> foreseeable future, it would more expedient for the community as a whole,
>> if we could focus on technical discussions for each camp respectively,
>> while minimizing invitation messages from the other side. I hope you do
>> agree.
>>
>> Regards,
>>
>>
>> Abe (2024-01-15 11:27)
>>
>>
>>
>> On 2024-01-15 00:09, Christopher Hawker wrote:
>>
>> Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait, I'm
>> lost...
>>
>> With CGNAT, there is either public IP space in front of the gateway, or
>> private space behind it. There is no such thing as "semi-private" space in
>> the world of CGNAT, as devices with public IPs can't directly access
>> devices behind a CGNAT gateway with a 100.64/10 address. It's either a
>> public address, or a private address (not to be confused with an RFC1918
>> private address).
>>
>> Let's talk hypothetically for a minute and assume that 240/4 is used as
>> CGNAT space. Your "solution" to residential gateways not supporting the use
>> of 240/4 space being upgraded to OpenWRT won't work, because not all CPE
>> supports OpenWRT.
>>
>> Instead of attempting to use a larger prefix for CGNAT, IPv6 is
>> definitely the easier solution to implement as the vast majority of vendors
>> already support v6.
>>
>> Regards,
>> Christopher Hawker
>>
>> On Mon, 15 Jan 2024 at 15:06, Abraham Y. Chen <aychen@avinta.com> wrote:
>>
>>> Hi, Mike:
>>>
>>> 1) "... only private use. ...":
>>>
>>> The EzIP deployment plan is to use 240/4 netblock as "Semi-Public"
>>> addresses for the existing CG-NAT facility. With many RG-NATs (Routing /
>>> Residential Gateway -NATs) already capable of being 240/4 clients thru the
>>> upgrade to OpenWrt, no IoT on any private premises will sense any change.
>>>
>>> Regards,
>>>
>>>
>>> Abe (2024-01-14 23:04)
>>>
>>>
>>> On 2024-01-12 15:16, Mike Hammett wrote:
>>>
>>> I'm not talking about global, public use, only private use.
>>>
>>>
>>>
>>> -----
>>> Mike Hammett
>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>> <https://www.facebook.com/ICSIL>
>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>> <https://twitter.com/ICSIL>
>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>> <https://www.facebook.com/mdwestix>
>>> <https://www.linkedin.com/company/midwest-internet-exchange>
>>> <https://twitter.com/mdwestix>
>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>> <https://www.facebook.com/thebrotherswisp>
>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>> ------------------------------
>>>
>>>
>>
>>
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>> Virus-free.www.avast.com
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>> <#m_4516043769261218358_m_3753820813357424668_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Hi, Christopher:

1) " If "EzIP" is about using 240/4 as CGNAT space, ...   ":

    This correlation is just the starting point for EzIP deployment, so
that it would not be regarded as a base-less crazy dream. Once a 240/4
enabled RAN is established as a new network overlaying on the CG-NAT
infrastructure, the benefits of making use of the 240/4 resources can
begin to be considered. For example, with sufficient addresses, static
address administration can be practiced within a RAN which will remove
the need for DHCP service. From this, related consequences may be
discussed.


2)    " I don't think you quite grasp the concept that OpenWRT is not
compatible with devices that do not support it. .... it would not be
appropriate to expect every device vendor to support it. ...   ":

    Perhaps we have some offset about the terminology of "who supports
whom?" My understanding of the OpenWrt project is that it is an
open-source program code that supports a long list (but not all) of
primarily commercial RGs (Residential/Routing Gateways) and WiFi routers
that serve / support CPE devices (on-premises IoTs). Its basic purpose
is to let private network owners to replace the firmware code in the RGs
with the OpenWrt equivalent so that they will have full control of their
RGs and then modify them if desired. Thus, the basic release of each
OpenWrt code maintains most of the original functionalities in the OEM
device. So, neither the original RG nor any IoT manufacturers need be
involved with the OpenWrt, let alone supporting it. My reference to its
V19.07.3 was the version that expanded its usable address pool to
include 240/4. That was all.

    For sure, OpenWrt does not run on all RGs in the field. But, this
does not restrict an overlay network like RAN from starting to network
only those premises with RGs that run on OpenWrt (plus those RGs
compatible with 240/4 from the factories). Since the existing CG-NAT is
not disturbed and daily Internet services are going normally, RAN growth
can take its time.

3)    " You've provided a link to a D-Link managed switch, not a router.
Just because it can support L2 routing, doesn't make it a router.   ":

    Correct, this is just a basic example for networking the RGs to
experiment the RAN configuration. It is not intended to be a
full-fledged router which will have other considerations that are way
beyond what EzIP should be involved with.



Regards,


Abe (2024-01-18 22:48)


On 2024-01-15 18:33, Christopher Hawker wrote:
> If "EzIP" is about using 240/4 as CGNAT space, let's call it what it
> is, not rename something that already exists and attempt to claim it
> as a new idea.
>
> It is completely unnecessary to use 240/4 as CGNAT space. Here are a
> few reasons why:
>
> 1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a
> /24 from this to be used for CGNAT gateways, load balancing, etc.
> this still allows for 4,194,048 usable addresses for CPE. When
> performing NAT, you would need to allocate each subscriber
> approximately 1000 ports for NAT to work successfully. The entire
> /10 (less the /24) would require the equivalent of a /16 public
> IPv4 prefix to use the entire 100.64/10 space in one region. To
> put this into comparison, you would use the entire 100.64/10 space
> in a city the size of New York or Los Angeles allowing for one
> internet service per 4 or 2 people respectively. It's not practical.
> 2. Multiple CGNAT regions that are at capacity would not have a need
> for uniquely routable IP space between them. It's heavily designed
> for traffic from the user to the wider internet, not for
> inter-region routing. Carriers already have systems in place where
> subscribers can request a public address if they need it (such as
> working from home with advanced corporate networks, etc).
>
> 100.64/10 is not public IP space, because it is not usable in the DFZ.
> I don't believe there is any confusion or ambiguity about this space
> because if you do a Whois lookup on 100.64.0.0/10
> <http://100.64.0.0/10> at any one of the five RIRs, it reflects that
> it is IANA shared address space for service providers. Footnote 6 on
> the page you referenced reads "100.64.0.0/10 <http://100.64.0.0/10>
> reserved for Shared Address Space". It has not been delegated to ARIN.
> Rather clear as to its use case.
>
> I don't think you quite grasp the concept that OpenWRT is not
> compatible with devices that do not support it. It would only work on
> routers for which it is compatible and it would not be appropriate to
> expect every device vendor to support it. To add-on to this, why would
> vendors need to enable 240/4 CGNAT support when their customers don't
> have a need for it?
>
> You've provided a link to a D-Link managed switch, not a router. Just
> because it can support L2 routing, doesn't make it a router.
>
> I'm all for discussing ideas and suggestions and working towards
> proper IPv6 deployment. It certainly appears to be the case that the
> community does not support your proposed "EzIP" solution. If you are
> recommending that 240/4 space be used for CGNAT space under RFC6598,
> then call it as it is instead of inventing new terminology.
>
> Regards,
> Christopher Hawker
>
> On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com> wrote:
>
> Hi, Christopher:
>
> 1)    " Hang on... So EzIP is now about using 240/4 as CGNAT
> space? Wait, I'm lost...   ":
>
>     Correct. This is one way to visualize the EzIP deployment.
> This configuration is so far the most concise manner to describe
> the the EzIP building block, RAN (Regional Area Network). The nice
> thing about this approach is that everything exists and is already
> working daily in each CG-NAT cluster. All needed to expand its
> capability is a larger netblock. Since 240/4 is fundamentally not
> an outlier in the overall IPv4 address pool, except being
> classified as "Reserved" for a long time, enabling it to work in a
> CG-NAT should not be any big challenge.
>
> 2)    "   ... There is no such thing as "semi-private" space in
> the world of CGNAT, ... ":
>
>     Correct. However, not distinguishing 100.64/10 netblock from
> the common public and private parts of the IPv4 space made it
> vague as which function does it provide. That is, in terms of
> re-usability for each isolated geographical area, it is like
> another RFC1918 private netblock. On the other hand, CG-NAT is
> clearly used in geographically public areas. So, 100.64/10 should
> be classified as "public". In addition, 100.64/10 is listed
> according to "IANA IPv4 Address Space Registry" as part of the
> 100/8 netblock under ARIN, but now used by everyone worldwide. To
> avoid similar ambiguity that leads to confusions, we decided to
> call 240/4 as "semi-public" to more explicitly convey the concept.
> (Actually, we initially called 240/4 "semi-private" thinking that
> it could be the fourth RFC1918 netblock, until we realized that
> the RFC6589 environment was a much better fit.)
>
> 3)    " Your "solution" to residential gateways not supporting the
> use of 240/4 space being upgraded to OpenWrt won't work, because
> not all CPE supports OpenWrt.   ":
>
>     OpenWrt is just an open source RG code that can replace that
> in commercial RGs that have been supporting CPEs. Like the EzIP
> concept, the OpenWrt upgrade of RG-NAT is an enhancement to the
> existing RG functionality. Thus, OpenWrt enabled RGs can operate
> with the combination of public (including RFC6589) with 240/4
> netblocks on the upstream (WAN) side, and private (RFC1918) with
> 240/4 netblocks on the downstream (LAN) side. So, there is no
> compatibility change that a CPE (on-premises IoT) can sense. This
> critical characteristics was the result of an OpenWrt core code
> upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast
> Extensions Project". Before that, EzIP was just a theoretically
> feasible scheme.
>
> 4)    In addition,  OpenWrt at least works with one network router
> by D-Link (see URL below). This means that, with both WAN and LAN
> sides of a router supporting 240/4, a beginner's reference RAN can
> be built and experimented with it:
>
> https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch
>
> 5)    " Instead of attempting to use a larger prefix for CGNAT,
> IPv6 is definitely the easier solution to implement as the vast
> majority of vendors already support v6. ":
>
>     Since the general consensus is that for moving ahead, we will
> rely on Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to
> coexist for the foreseeable future, it would more expedient for
> the community as a whole, if we could focus on technical
> discussions for each camp respectively, while minimizing
> invitation messages from the other side. I hope you do agree.
>
> Regards,
>
>
> Abe (2024-01-15 11:27)
>
>
>
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
> Virus-free.www.avast.com
> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>
>
> <#m_3753820813357424668_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>


--
This email has been checked for viruses by Avast antivirus software.
www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
According to the diagram on page 8 of the presentation on your website at
https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it simply
identifies 240/4 as CGNAT space. Routing between regional access networks
typically doesn't take place when using such space on an ISP network, and
most ISPs (that I know of) will offer public addressing when it is
required. Further, if you think the need for DHCP will be eliminated
through the use of your solution, I hate to say it, but ISPs will not
statically configure WAN addressing on CPE for residential services. It
would simply increase the workload of their support and provisioning teams.
Right now, in cases where ISPs use DHCP, they can simply ship a router to
an end-user, the user plugs it in, turns it on, and away they go.
Connectivity to the internet.

If an end-user has a router that does not support OpenWRT, it will require
the end-user to replace their router with one that does in order to connect
to an EzIP-enabled network. This is not reasonably practical. This would
also require router vendors to support connectivity to a proprietary
"semi-public router".

Again, for the sake of completeness, this solution is a waste of time and
resources. A carrier would not have a need for more than ~4.1m devices on a
single regional access network and some may run more than one in a single
region, so as not to put all of their proverbial eggs into the same basket.

Regards,
Christopher Hawker

On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com> wrote:

> Hi, Christopher:
>
> 1) " If "EzIP" is about using 240/4 as CGNAT space, ... ":
>
> This correlation is just the starting point for EzIP deployment, so
> that it would not be regarded as a base-less crazy dream. Once a 240/4
> enabled RAN is established as a new network overlaying on the CG-NAT
> infrastructure, the benefits of making use of the 240/4 resources can begin
> to be considered. For example, with sufficient addresses, static address
> administration can be practiced within a RAN which will remove the need for
> DHCP service. From this, related consequences may be discussed.
>
> 2) " I don't think you quite grasp the concept that OpenWRT is not
> compatible with devices that do not support it. .... it would not be
> appropriate to expect every device vendor to support it. ... ":
>
> Perhaps we have some offset about the terminology of "who supports
> whom?" My understanding of the OpenWrt project is that it is an open-source
> program code that supports a long list (but not all) of primarily
> commercial RGs (Residential/Routing Gateways) and WiFi routers that serve /
> support CPE devices (on-premises IoTs). Its basic purpose is to let private
> network owners to replace the firmware code in the RGs with the OpenWrt
> equivalent so that they will have full control of their RGs and then modify
> them if desired. Thus, the basic release of each OpenWrt code maintains
> most of the original functionalities in the OEM device. So, neither the
> original RG nor any IoT manufacturers need be involved with the OpenWrt,
> let alone supporting it. My reference to its V19.07.3 was the version that
> expanded its usable address pool to include 240/4. That was all.
>
> For sure, OpenWrt does not run on all RGs in the field. But, this does
> not restrict an overlay network like RAN from starting to network only
> those premises with RGs that run on OpenWrt (plus those RGs compatible with
> 240/4 from the factories). Since the existing CG-NAT is not disturbed and
> daily Internet services are going normally, RAN growth can take its time.
> 3) " You've provided a link to a D-Link managed switch, not a router.
> Just because it can support L2 routing, doesn't make it a router. ":
>
> Correct, this is just a basic example for networking the RGs to
> experiment the RAN configuration. It is not intended to be a full-fledged
> router which will have other considerations that are way beyond what EzIP
> should be involved with.
>
>
> Regards,
>
>
> Abe (2024-01-18 22:48)
>
>
> On 2024-01-15 18:33, Christopher Hawker wrote:
>
> If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is,
> not rename something that already exists and attempt to claim it as a new
> idea.
>
> It is completely unnecessary to use 240/4 as CGNAT space. Here are a few
> reasons why:
>
> 1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a
> /24 from this to be used for CGNAT gateways, load balancing, etc. this
> still allows for 4,194,048 usable addresses for CPE. When performing NAT,
> you would need to allocate each subscriber approximately 1000 ports for NAT
> to work successfully. The entire /10 (less the /24) would require the
> equivalent of a /16 public IPv4 prefix to use the entire 100.64/10 space in
> one region. To put this into comparison, you would use the entire 100.64/10
> space in a city the size of New York or Los Angeles allowing for one
> internet service per 4 or 2 people respectively. It's not practical.
> 2. Multiple CGNAT regions that are at capacity would not have a need
> for uniquely routable IP space between them. It's heavily designed for
> traffic from the user to the wider internet, not for inter-region routing.
> Carriers already have systems in place where subscribers can request a
> public address if they need it (such as working from home with advanced
> corporate networks, etc).
>
> 100.64/10 is not public IP space, because it is not usable in the DFZ. I
> don't believe there is any confusion or ambiguity about this space because
> if you do a Whois lookup on 100.64.0.0/10 at any one of the five RIRs, it
> reflects that it is IANA shared address space for service providers.
> Footnote 6 on the page you referenced reads "100.64.0.0/10 reserved for
> Shared Address Space". It has not been delegated to ARIN. Rather clear as
> to its use case.
>
> I don't think you quite grasp the concept that OpenWRT is not compatible
> with devices that do not support it. It would only work on routers for
> which it is compatible and it would not be appropriate to expect every
> device vendor to support it. To add-on to this, why would vendors need to
> enable 240/4 CGNAT support when their customers don't have a need for it?
>
> You've provided a link to a D-Link managed switch, not a router. Just
> because it can support L2 routing, doesn't make it a router.
>
> I'm all for discussing ideas and suggestions and working towards proper
> IPv6 deployment. It certainly appears to be the case that the community
> does not support your proposed "EzIP" solution. If you are recommending
> that 240/4 space be used for CGNAT space under RFC6598, then call it as it
> is instead of inventing new terminology.
>
> Regards,
> Christopher Hawker
>
> On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com> wrote:
>
>> Hi, Christopher:
>>
>> 1) " Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait,
>> I'm lost... ":
>>
>> Correct. This is one way to visualize the EzIP deployment. This
>> configuration is so far the most concise manner to describe the the EzIP
>> building block, RAN (Regional Area Network). The nice thing about this
>> approach is that everything exists and is already working daily in each
>> CG-NAT cluster. All needed to expand its capability is a larger netblock.
>> Since 240/4 is fundamentally not an outlier in the overall IPv4 address
>> pool, except being classified as "Reserved" for a long time, enabling it to
>> work in a CG-NAT should not be any big challenge.
>> 2) " ... There is no such thing as "semi-private" space in the world
>> of CGNAT, ... ":
>>
>> Correct. However, not distinguishing 100.64/10 netblock from the
>> common public and private parts of the IPv4 space made it vague as which
>> function does it provide. That is, in terms of re-usability for each
>> isolated geographical area, it is like another RFC1918 private netblock. On
>> the other hand, CG-NAT is clearly used in geographically public areas. So,
>> 100.64/10 should be classified as "public". In addition, 100.64/10 is
>> listed according to "IANA IPv4 Address Space Registry" as part of the 100/8
>> netblock under ARIN, but now used by everyone worldwide. To avoid similar
>> ambiguity that leads to confusions, we decided to call 240/4 as
>> "semi-public" to more explicitly convey the concept. (Actually, we
>> initially called 240/4 "semi-private" thinking that it could be the fourth
>> RFC1918 netblock, until we realized that the RFC6589 environment was a much
>> better fit.)
>>
>> 3) " Your "solution" to residential gateways not supporting the use of
>> 240/4 space being upgraded to OpenWrt won't work, because not all CPE
>> supports OpenWrt. ":
>>
>> OpenWrt is just an open source RG code that can replace that in
>> commercial RGs that have been supporting CPEs. Like the EzIP concept, the
>> OpenWrt upgrade of RG-NAT is an enhancement to the existing RG
>> functionality. Thus, OpenWrt enabled RGs can operate with the combination
>> of public (including RFC6589) with 240/4 netblocks on the upstream (WAN)
>> side, and private (RFC1918) with 240/4 netblocks on the downstream (LAN)
>> side. So, there is no compatibility change that a CPE (on-premises IoT) can
>> sense. This critical characteristics was the result of an OpenWrt core code
>> upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast Extensions
>> Project". Before that, EzIP was just a theoretically feasible scheme.
>>
>> 4) In addition, OpenWrt at least works with one network router by
>> D-Link (see URL below). This means that, with both WAN and LAN sides of a
>> router supporting 240/4, a beginner's reference RAN can be built and
>> experimented with it:
>>
>>
>> https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch
>>
>> 5) " Instead of attempting to use a larger prefix for CGNAT, IPv6 is
>> definitely the easier solution to implement as the vast majority of vendors
>> already support v6. ":
>>
>> Since the general consensus is that for moving ahead, we will rely on
>> Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist for the
>> foreseeable future, it would more expedient for the community as a whole,
>> if we could focus on technical discussions for each camp respectively,
>> while minimizing invitation messages from the other side. I hope you do
>> agree.
>>
>> Regards,
>>
>>
>> Abe (2024-01-15 11:27)
>>
>>
>>
>>
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>> Virus-free.www.avast.com
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>> <#m_-3116000417587349579_m_3753820813357424668_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>
>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Why is this conversation even still going on?
It's been established ~100 messages ago that the plan here is nonsense.
it's been established ~80 messages ago that the 'lemme swap subjects to
confuse the issue' is nonsense.

stop feeding the troll.

On Thu, Jan 18, 2024 at 11:20?PM Christopher Hawker <chris@thesysadmin.au>
wrote:

> According to the diagram on page 8 of the presentation on your website at
> https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it simply
> identifies 240/4 as CGNAT space. Routing between regional access networks
> typically doesn't take place when using such space on an ISP network, and
> most ISPs (that I know of) will offer public addressing when it is
> required. Further, if you think the need for DHCP will be eliminated
> through the use of your solution, I hate to say it, but ISPs will not
> statically configure WAN addressing on CPE for residential services. It
> would simply increase the workload of their support and provisioning teams.
> Right now, in cases where ISPs use DHCP, they can simply ship a router to
> an end-user, the user plugs it in, turns it on, and away they go.
> Connectivity to the internet.
>
> If an end-user has a router that does not support OpenWRT, it will require
> the end-user to replace their router with one that does in order to connect
> to an EzIP-enabled network. This is not reasonably practical. This would
> also require router vendors to support connectivity to a proprietary
> "semi-public router".
>
> Again, for the sake of completeness, this solution is a waste of time and
> resources. A carrier would not have a need for more than ~4.1m devices on a
> single regional access network and some may run more than one in a single
> region, so as not to put all of their proverbial eggs into the same basket.
>
> Regards,
> Christopher Hawker
>
> On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com> wrote:
>
>> Hi, Christopher:
>>
>> 1) " If "EzIP" is about using 240/4 as CGNAT space, ... ":
>>
>> This correlation is just the starting point for EzIP deployment, so
>> that it would not be regarded as a base-less crazy dream. Once a 240/4
>> enabled RAN is established as a new network overlaying on the CG-NAT
>> infrastructure, the benefits of making use of the 240/4 resources can begin
>> to be considered. For example, with sufficient addresses, static address
>> administration can be practiced within a RAN which will remove the need for
>> DHCP service. From this, related consequences may be discussed.
>>
>> 2) " I don't think you quite grasp the concept that OpenWRT is not
>> compatible with devices that do not support it. .... it would not be
>> appropriate to expect every device vendor to support it. ... ":
>>
>> Perhaps we have some offset about the terminology of "who supports
>> whom?" My understanding of the OpenWrt project is that it is an open-source
>> program code that supports a long list (but not all) of primarily
>> commercial RGs (Residential/Routing Gateways) and WiFi routers that serve /
>> support CPE devices (on-premises IoTs). Its basic purpose is to let private
>> network owners to replace the firmware code in the RGs with the OpenWrt
>> equivalent so that they will have full control of their RGs and then modify
>> them if desired. Thus, the basic release of each OpenWrt code maintains
>> most of the original functionalities in the OEM device. So, neither the
>> original RG nor any IoT manufacturers need be involved with the OpenWrt,
>> let alone supporting it. My reference to its V19.07.3 was the version that
>> expanded its usable address pool to include 240/4. That was all.
>>
>> For sure, OpenWrt does not run on all RGs in the field. But, this
>> does not restrict an overlay network like RAN from starting to network only
>> those premises with RGs that run on OpenWrt (plus those RGs compatible with
>> 240/4 from the factories). Since the existing CG-NAT is not disturbed and
>> daily Internet services are going normally, RAN growth can take its time.
>> 3) " You've provided a link to a D-Link managed switch, not a router.
>> Just because it can support L2 routing, doesn't make it a router. ":
>>
>> Correct, this is just a basic example for networking the RGs to
>> experiment the RAN configuration. It is not intended to be a full-fledged
>> router which will have other considerations that are way beyond what EzIP
>> should be involved with.
>>
>>
>> Regards,
>>
>>
>> Abe (2024-01-18 22:48)
>>
>>
>> On 2024-01-15 18:33, Christopher Hawker wrote:
>>
>> If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is,
>> not rename something that already exists and attempt to claim it as a new
>> idea.
>>
>> It is completely unnecessary to use 240/4 as CGNAT space. Here are a few
>> reasons why:
>>
>> 1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a
>> /24 from this to be used for CGNAT gateways, load balancing, etc. this
>> still allows for 4,194,048 usable addresses for CPE. When performing NAT,
>> you would need to allocate each subscriber approximately 1000 ports for NAT
>> to work successfully. The entire /10 (less the /24) would require the
>> equivalent of a /16 public IPv4 prefix to use the entire 100.64/10 space in
>> one region. To put this into comparison, you would use the entire 100.64/10
>> space in a city the size of New York or Los Angeles allowing for one
>> internet service per 4 or 2 people respectively. It's not practical.
>> 2. Multiple CGNAT regions that are at capacity would not have a need
>> for uniquely routable IP space between them. It's heavily designed for
>> traffic from the user to the wider internet, not for inter-region routing.
>> Carriers already have systems in place where subscribers can request a
>> public address if they need it (such as working from home with advanced
>> corporate networks, etc).
>>
>> 100.64/10 is not public IP space, because it is not usable in the DFZ. I
>> don't believe there is any confusion or ambiguity about this space because
>> if you do a Whois lookup on 100.64.0.0/10 at any one of the five RIRs,
>> it reflects that it is IANA shared address space for service providers.
>> Footnote 6 on the page you referenced reads "100.64.0.0/10 reserved for
>> Shared Address Space". It has not been delegated to ARIN. Rather clear as
>> to its use case.
>>
>> I don't think you quite grasp the concept that OpenWRT is not compatible
>> with devices that do not support it. It would only work on routers for
>> which it is compatible and it would not be appropriate to expect every
>> device vendor to support it. To add-on to this, why would vendors need to
>> enable 240/4 CGNAT support when their customers don't have a need for it?
>>
>> You've provided a link to a D-Link managed switch, not a router. Just
>> because it can support L2 routing, doesn't make it a router.
>>
>> I'm all for discussing ideas and suggestions and working towards proper
>> IPv6 deployment. It certainly appears to be the case that the community
>> does not support your proposed "EzIP" solution. If you are recommending
>> that 240/4 space be used for CGNAT space under RFC6598, then call it as it
>> is instead of inventing new terminology.
>>
>> Regards,
>> Christopher Hawker
>>
>> On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com> wrote:
>>
>>> Hi, Christopher:
>>>
>>> 1) " Hang on... So EzIP is now about using 240/4 as CGNAT space?
>>> Wait, I'm lost... ":
>>>
>>> Correct. This is one way to visualize the EzIP deployment. This
>>> configuration is so far the most concise manner to describe the the EzIP
>>> building block, RAN (Regional Area Network). The nice thing about this
>>> approach is that everything exists and is already working daily in each
>>> CG-NAT cluster. All needed to expand its capability is a larger netblock.
>>> Since 240/4 is fundamentally not an outlier in the overall IPv4 address
>>> pool, except being classified as "Reserved" for a long time, enabling it to
>>> work in a CG-NAT should not be any big challenge.
>>> 2) " ... There is no such thing as "semi-private" space in the
>>> world of CGNAT, ... ":
>>>
>>> Correct. However, not distinguishing 100.64/10 netblock from the
>>> common public and private parts of the IPv4 space made it vague as which
>>> function does it provide. That is, in terms of re-usability for each
>>> isolated geographical area, it is like another RFC1918 private netblock. On
>>> the other hand, CG-NAT is clearly used in geographically public areas. So,
>>> 100.64/10 should be classified as "public". In addition, 100.64/10 is
>>> listed according to "IANA IPv4 Address Space Registry" as part of the 100/8
>>> netblock under ARIN, but now used by everyone worldwide. To avoid similar
>>> ambiguity that leads to confusions, we decided to call 240/4 as
>>> "semi-public" to more explicitly convey the concept. (Actually, we
>>> initially called 240/4 "semi-private" thinking that it could be the fourth
>>> RFC1918 netblock, until we realized that the RFC6589 environment was a much
>>> better fit.)
>>>
>>> 3) " Your "solution" to residential gateways not supporting the use
>>> of 240/4 space being upgraded to OpenWrt won't work, because not all CPE
>>> supports OpenWrt. ":
>>>
>>> OpenWrt is just an open source RG code that can replace that in
>>> commercial RGs that have been supporting CPEs. Like the EzIP concept, the
>>> OpenWrt upgrade of RG-NAT is an enhancement to the existing RG
>>> functionality. Thus, OpenWrt enabled RGs can operate with the combination
>>> of public (including RFC6589) with 240/4 netblocks on the upstream (WAN)
>>> side, and private (RFC1918) with 240/4 netblocks on the downstream (LAN)
>>> side. So, there is no compatibility change that a CPE (on-premises IoT) can
>>> sense. This critical characteristics was the result of an OpenWrt core code
>>> upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast Extensions
>>> Project". Before that, EzIP was just a theoretically feasible scheme.
>>>
>>> 4) In addition, OpenWrt at least works with one network router by
>>> D-Link (see URL below). This means that, with both WAN and LAN sides of a
>>> router supporting 240/4, a beginner's reference RAN can be built and
>>> experimented with it:
>>>
>>>
>>> https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch
>>>
>>> 5) " Instead of attempting to use a larger prefix for CGNAT, IPv6 is
>>> definitely the easier solution to implement as the vast majority of vendors
>>> already support v6. ":
>>>
>>> Since the general consensus is that for moving ahead, we will rely
>>> on Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist for
>>> the foreseeable future, it would more expedient for the community as a
>>> whole, if we could focus on technical discussions for each camp
>>> respectively, while minimizing invitation messages from the other side. I
>>> hope you do agree.
>>>
>>> Regards,
>>>
>>>
>>> Abe (2024-01-15 11:27)
>>>
>>>
>>>
>>>
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>> Virus-free.www.avast.com
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>> <#m_6838144186223039214_m_-3116000417587349579_m_3753820813357424668_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>>
>>
>>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
That seems to be what NANOG is good at. There is always a topic that seems to drag on for weeks after all valid points of the discussion have been fully discussed.


-richey

From: NANOG <nanog-bounces+richey.goldberg=gmail.com@nanog.org> on behalf of Christopher Morrow <morrowc.lists@gmail.com>
Date: Thursday, January 18, 2024 at 11:29 PM
To: Christopher Hawker <chris@thesysadmin.au>
Cc: Abraham Y. Chen <AYChen@alum.mit.edu>, nanog@nanog.org <nanog@nanog.org>
Subject: Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block
Why is this conversation even still going on?
It's been established ~100 messages ago that the plan here is nonsense.
it's been established ~80 messages ago that the 'lemme swap subjects to confuse the issue' is nonsense.

stop feeding the troll.

On Thu, Jan 18, 2024 at 11:20?PM Christopher Hawker <chris@thesysadmin.au<mailto:chris@thesysadmin.au>> wrote:
According to the diagram on page 8 of the presentation on your website at https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it simply identifies 240/4 as CGNAT space. Routing between regional access networks typically doesn't take place when using such space on an ISP network, and most ISPs (that I know of) will offer public addressing when it is required. Further, if you think the need for DHCP will be eliminated through the use of your solution, I hate to say it, but ISPs will not statically configure WAN addressing on CPE for residential services. It would simply increase the workload of their support and provisioning teams. Right now, in cases where ISPs use DHCP, they can simply ship a router to an end-user, the user plugs it in, turns it on, and away they go. Connectivity to the internet.

If an end-user has a router that does not support OpenWRT, it will require the end-user to replace their router with one that does in order to connect to an EzIP-enabled network. This is not reasonably practical. This would also require router vendors to support connectivity to a proprietary "semi-public router".

Again, for the sake of completeness, this solution is a waste of time and resources. A carrier would not have a need for more than ~4.1m devices on a single regional access network and some may run more than one in a single region, so as not to put all of their proverbial eggs into the same basket.

Regards,
Christopher Hawker

On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com<mailto:aychen@avinta.com>> wrote:
Hi, Christopher:

1) " If "EzIP" is about using 240/4 as CGNAT space, ... ":

This correlation is just the starting point for EzIP deployment, so that it would not be regarded as a base-less crazy dream. Once a 240/4 enabled RAN is established as a new network overlaying on the CG-NAT infrastructure, the benefits of making use of the 240/4 resources can begin to be considered. For example, with sufficient addresses, static address administration can be practiced within a RAN which will remove the need for DHCP service. From this, related consequences may be discussed.

2) " I don't think you quite grasp the concept that OpenWRT is not compatible with devices that do not support it. .... it would not be appropriate to expect every device vendor to support it. ... ":

Perhaps we have some offset about the terminology of "who supports whom?" My understanding of the OpenWrt project is that it is an open-source program code that supports a long list (but not all) of primarily commercial RGs (Residential/Routing Gateways) and WiFi routers that serve / support CPE devices (on-premises IoTs). Its basic purpose is to let private network owners to replace the firmware code in the RGs with the OpenWrt equivalent so that they will have full control of their RGs and then modify them if desired. Thus, the basic release of each OpenWrt code maintains most of the original functionalities in the OEM device. So, neither the original RG nor any IoT manufacturers need be involved with the OpenWrt, let alone supporting it. My reference to its V19.07.3 was the version that expanded its usable address pool to include 240/4. That was all.

For sure, OpenWrt does not run on all RGs in the field. But, this does not restrict an overlay network like RAN from starting to network only those premises with RGs that run on OpenWrt (plus those RGs compatible with 240/4 from the factories). Since the existing CG-NAT is not disturbed and daily Internet services are going normally, RAN growth can take its time.
3) " You've provided a link to a D-Link managed switch, not a router. Just because it can support L2 routing, doesn't make it a router. ":

Correct, this is just a basic example for networking the RGs to experiment the RAN configuration. It is not intended to be a full-fledged router which will have other considerations that are way beyond what EzIP should be involved with.


Regards,


Abe (2024-01-18 22:48)


On 2024-01-15 18:33, Christopher Hawker wrote:
If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is, not rename something that already exists and attempt to claim it as a new idea.

It is completely unnecessary to use 240/4 as CGNAT space. Here are a few reasons why:

1. There are 4,194,304 IPv4 addresses in a /10 prefix. Allowing for a /24 from this to be used for CGNAT gateways, load balancing, etc. this still allows for 4,194,048 usable addresses for CPE. When performing NAT, you would need to allocate each subscriber approximately 1000 ports for NAT to work successfully. The entire /10 (less the /24) would require the equivalent of a /16 public IPv4 prefix to use the entire 100.64/10 space in one region. To put this into comparison, you would use the entire 100.64/10 space in a city the size of New York or Los Angeles allowing for one internet service per 4 or 2 people respectively. It's not practical.
2. Multiple CGNAT regions that are at capacity would not have a need for uniquely routable IP space between them. It's heavily designed for traffic from the user to the wider internet, not for inter-region routing. Carriers already have systems in place where subscribers can request a public address if they need it (such as working from home with advanced corporate networks, etc).
100.64/10 is not public IP space, because it is not usable in the DFZ. I don't believe there is any confusion or ambiguity about this space because if you do a Whois lookup on 100.64.0.0/10<http://100.64.0.0/10> at any one of the five RIRs, it reflects that it is IANA shared address space for service providers. Footnote 6 on the page you referenced reads "100.64.0.0/10<http://100.64.0.0/10> reserved for Shared Address Space". It has not been delegated to ARIN. Rather clear as to its use case.

I don't think you quite grasp the concept that OpenWRT is not compatible with devices that do not support it. It would only work on routers for which it is compatible and it would not be appropriate to expect every device vendor to support it. To add-on to this, why would vendors need to enable 240/4 CGNAT support when their customers don't have a need for it?

You've provided a link to a D-Link managed switch, not a router. Just because it can support L2 routing, doesn't make it a router.

I'm all for discussing ideas and suggestions and working towards proper IPv6 deployment. It certainly appears to be the case that the community does not support your proposed "EzIP" solution. If you are recommending that 240/4 space be used for CGNAT space under RFC6598, then call it as it is instead of inventing new terminology.

Regards,
Christopher Hawker

On Tue, 16 Jan 2024 at 03:27, Abraham Y. Chen <aychen@avinta.com<mailto:aychen@avinta.com>> wrote:
Hi, Christopher:

1) " Hang on... So EzIP is now about using 240/4 as CGNAT space? Wait, I'm lost... ":

Correct. This is one way to visualize the EzIP deployment. This configuration is so far the most concise manner to describe the the EzIP building block, RAN (Regional Area Network). The nice thing about this approach is that everything exists and is already working daily in each CG-NAT cluster. All needed to expand its capability is a larger netblock. Since 240/4 is fundamentally not an outlier in the overall IPv4 address pool, except being classified as "Reserved" for a long time, enabling it to work in a CG-NAT should not be any big challenge.
2) " ... There is no such thing as "semi-private" space in the world of CGNAT, ... ":

Correct. However, not distinguishing 100.64/10 netblock from the common public and private parts of the IPv4 space made it vague as which function does it provide. That is, in terms of re-usability for each isolated geographical area, it is like another RFC1918 private netblock. On the other hand, CG-NAT is clearly used in geographically public areas. So, 100.64/10 should be classified as "public". In addition, 100.64/10 is listed according to "IANA IPv4 Address Space Registry" as part of the 100/8 netblock under ARIN, but now used by everyone worldwide. To avoid similar ambiguity that leads to confusions, we decided to call 240/4 as "semi-public" to more explicitly convey the concept. (Actually, we initially called 240/4 "semi-private" thinking that it could be the fourth RFC1918 netblock, until we realized that the RFC6589 environment was a much better fit.)

3) " Your "solution" to residential gateways not supporting the use of 240/4 space being upgraded to OpenWrt won't work, because not all CPE supports OpenWrt. ":

OpenWrt is just an open source RG code that can replace that in commercial RGs that have been supporting CPEs. Like the EzIP concept, the OpenWrt upgrade of RG-NAT is an enhancement to the existing RG functionality. Thus, OpenWrt enabled RGs can operate with the combination of public (including RFC6589) with 240/4 netblocks on the upstream (WAN) side, and private (RFC1918) with 240/4 netblocks on the downstream (LAN) side. So, there is no compatibility change that a CPE (on-premises IoT) can sense. This critical characteristics was the result of an OpenWrt core code upgrade in 2019 contributed by Dave Taht of "IPv4 Unicast Extensions Project". Before that, EzIP was just a theoretically feasible scheme.

4) In addition, OpenWrt at least works with one network router by D-Link (see URL below). This means that, with both WAN and LAN sides of a router supporting 240/4, a beginner's reference RAN can be built and experimented with it:

https://us.dlink.com/en/products/dgs-1210-28-28-port-gigabit-smart-managed-switch

5) " Instead of attempting to use a larger prefix for CGNAT, IPv6 is definitely the easier solution to implement as the vast majority of vendors already support v6. ":

Since the general consensus is that for moving ahead, we will rely on Dual-Stack to bridge IPv6 and IPv4 worlds enabling them to coexist for the foreseeable future, it would more expedient for the community as a whole, if we could focus on technical discussions for each camp respectively, while minimizing invitation messages from the other side. I hope you do agree.

Regards,


Abe (2024-01-15 11:27)



Error! Filename not specified.<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Hi, Christopher:

1)     "    ... It would simply increase the workload of their support
and provisioning teams. Right now, in cases where ISPs use DHCP, they
can simply ship a router to an end-user, the user plugs it in, turns it
on, and away they go. ":

    I do understand the current practice that you are describing.
However, there is nothing wrong by instructing a subscriber to attempt
accessing the ISP's sign-up website with his browser when first turning
on the router, so that a process of checking the credentials of the
subscriber can go through, then a static WAN (240/4) address is assigned
to the router. From there on, everything should operate normally  as far
as the subscriber is concrned. This process is not special. For example,
when a traveler checks into a hotel these days, he would go through
pretty much the same steps with minimal identification (Certain hotel
network even knew which room I was in by popping my name on the screen,
perhaps because the WiFi access point was fed by wired Ethernet! Only
password provided by the front desk was needed.) Then, everything works
just like at home.

2)    "   ...  If an end-user has a router that does not support
OpenWrt, it will require the end-user to replace their router with one
that does in order to connect to an EzIP-enabled network. ":

    Correct. But, RAN is an overlay network that provides a parallel
route to the same services as the current CG-NAT. So, an end-user has
the option to use it. Nothing hurts, if he decides to ignore the RAN.

3)    "  A carrier would not have a need for more than ~4.1m devices on
a single regional access network ...   ":

    This is a system level planning consideration. That is, even if
some carriers do not need EzIP, it does not mean that the capability
should not be presented to the general audience. Let's hold this off for
the moment.

Regards,


Abe (2024-01-20 11:55)




On 2024-01-18 23:19, Christopher Hawker wrote:
> According to the diagram on page 8 of the presentation on your website
> at https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it
> simply identifies 240/4 as CGNAT space. Routing between regional
> access networks typically doesn't take place when using such space on
> an ISP network, and most ISPs (that I know of) will offer public
> addressing when it is required. Further, if you think the need for
> DHCP will be eliminated through the use of your solution, I hate to
> say it, but ISPs will not statically configure WAN addressing on CPE
> for residential services. It would simply increase the workload of
> their support and provisioning teams. Right now, in cases where ISPs
> use DHCP, they can simply ship a router to an end-user, the user plugs
> it in, turns it on, and away they go. Connectivity to the internet.
>
> If an end-user has a router that does not support OpenWRT, it will
> require the end-user to replace their router with one that does in
> order to connect to an EzIP-enabled network. This is not reasonably
> practical. This would also require router vendors to support
> connectivity to a proprietary "semi-public router".
>
> Again, for the sake of completeness, this solution is a waste of time
> and resources. A carrier would not have a need for more than ~4.1m
> devices on a single regional access network and some may run more than
> one in a single region, so as not to put all of their proverbial eggs
> into the same basket.
>
> Regards,
> Christopher Hawker
>
> On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com> wrote:
>
> Hi, Christopher:
>
> 1)    " If "EzIP" is about using 240/4 as CGNAT space, ...   ":
>
>     This correlation is just the starting point for EzIP
> deployment, so that it would not be regarded as a base-less crazy
> dream. Once a 240/4 enabled RAN is established as a new network
> overlaying on the CG-NAT infrastructure, the benefits of making
> use of the 240/4 resources can begin to be considered. For
> example, with sufficient addresses, static address administration
> can be practiced within a RAN which will remove the need for DHCP
> service. From this, related consequences may be discussed.
>
>
> 2)    " I don't think you quite grasp the concept that OpenWRT is
> not compatible with devices that do not support it. .... it would
> not be appropriate to expect every device vendor to support it. 
> ...   ":
>
>     Perhaps we have some offset about the terminology of "who
> supports whom?" My understanding of the OpenWrt project is that it
> is an open-source program code that supports a long list (but not
> all) of primarily commercial RGs (Residential/Routing Gateways)
> and WiFi routers that serve / support CPE devices (on-premises
> IoTs). Its basic purpose is to let private network owners to
> replace the firmware code in the RGs with the OpenWrt equivalent
> so that they will have full control of their RGs and then modify
> them if desired. Thus, the basic release of each OpenWrt code
> maintains most of the original functionalities in the OEM device.
> So, neither the original RG nor any IoT manufacturers need be
> involved with the OpenWrt, let alone supporting it. My reference
> to its V19.07.3 was the version that expanded its usable address
> pool to include 240/4. That was all.
>
>     For sure, OpenWrt does not run on all RGs in the field. But,
> this does not restrict an overlay network like RAN from starting
> to network only those premises with RGs that run on OpenWrt (plus
> those RGs compatible with 240/4 from the factories). Since the
> existing CG-NAT is not disturbed and daily Internet services are
> going normally, RAN growth can take its time.
>
> 3)    " You've provided a link to a D-Link managed switch, not a
> router. Just because it can support L2 routing, doesn't make it a
> router.   ":
>
>     Correct, this is just a basic example for networking the RGs
> to experiment the RAN configuration. It is not intended to be a
> full-fledged router which will have other considerations that are
> way beyond what EzIP should be involved with.
>
>
>
> Regards,
>
>
> Abe (2024-01-18 22:48)
>
>


--
This email has been checked for viruses by Avast antivirus software.
www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
I am curious if anyone has ever given you positive feedback on this idea? So far all I’ve seen is the entire community thinking it’s a bad idea. Why do you insist this is a good solution?
Shane
On Jan 20, 2024, at 11:56?AM, Abraham Y. Chen <aychen@avinta.com> wrote:

?

Hi, Christopher:

1) " ... It would simply increase the workload of their support and provisioning teams. Right now, in cases where ISPs use DHCP, they can simply ship a router to an end-user, the user plugs it in, turns it on, and away they go. ":


I do understand the current practice that you are describing. However, there is nothing wrong by instructing a subscriber to attempt accessing the ISP's sign-up website with his browser when first turning on the router, so that a process of checking the credentials of the subscriber can go through, then a static WAN (240/4) address is assigned to the router. From there on, everything should operate normally as far as the subscriber is concrned. This process is not special. For example, when a traveler checks into a hotel these days, he would go through pretty much the same steps with minimal identification (Certain hotel network even knew which room I was in by popping my name on the screen, perhaps because the WiFi access point was fed by wired Ethernet! Only password provided by the front desk was needed.) Then, everything works just like at home.

2) " ... If an end-user has a router that does not support OpenWrt, it will require the end-user to replace their router with one that does in order to connect to an EzIP-enabled network. ":


Correct. But, RAN is an overlay network that provides a parallel route to the same services as the current CG-NAT. So, an end-user has the option to use it. Nothing hurts, if he decides to ignore the RAN.
3) " A carrier would not have a need for more than ~4.1m devices on a single regional access network ... ":


This is a system level planning consideration. That is, even if some carriers do not need EzIP, it does not mean that the capability should not be presented to the general audience. Let's hold this off for the moment.

Regards,




Abe (2024-01-20 11:55)





On 2024-01-18 23:19, Christopher Hawker wrote:
According to the diagram on page 8 of the presentation on your website at https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf"]https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it simply identifies 240/4 as CGNAT space. Routing between regional access networks typically doesn't take place when using such space on an ISP network, and most ISPs (that I know of) will offer public addressing when it is required. Further, if you think the need for DHCP will be eliminated through the use of your solution, I hate to say it, but ISPs will not statically configure WAN addressing on CPE for residential services. It would simply increase the workload of their support and provisioning teams. Right now, in cases where ISPs use DHCP, they can simply ship a router to an end-user, the user plugs it in, turns it on, and away they go. Connectivity to the internet.
If an end-user has a router that does not support OpenWRT, it will require the end-user to replace their router with one that does in order to connect to an EzIP-enabled network. This is not reasonably practical. This would also require router vendors to support connectivity to a proprietary "semi-public router".
Again, for the sake of completeness, this solution is a waste of time and resources. A carrier would not have a need for more than ~4.1m devices on a single regional access network and some may run more than one in a single region, so as not to put all of their proverbial eggs into the same basket.
Regards, Christopher Hawker
On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com> wrote:
Hi, Christopher:
1) " If "EzIP" is about using 240/4 as CGNAT space, ... ":

This correlation is just the starting point for EzIP deployment, so that it would not be regarded as a base-less crazy dream. Once a 240/4 enabled RAN is established as a new network overlaying on the CG-NAT infrastructure, the benefits of making use of the 240/4 resources can begin to be considered. For example, with sufficient addresses, static address administration can be practiced within a RAN which will remove the need for DHCP service. From this, related consequences may be discussed.
2) " I don't think you quite grasp the concept that OpenWRT is not compatible with devices that do not support it. .... it would not be appropriate to expect every device vendor to support it. ... ":


Perhaps we have some offset about the terminology of "who supports whom?" My understanding of the OpenWrt project is that it is an open-source program code that supports a long list (but not all) of primarily commercial RGs (Residential/Routing Gateways) and WiFi routers that serve / support CPE devices (on-premises IoTs). Its basic purpose is to let private network owners to replace the firmware code in the RGs with the OpenWrt equivalent so that they will have full control of their RGs and then modify them if desired. Thus, the basic release of each OpenWrt code maintains most of the original functionalities in the OEM device. So, neither the original RG nor any IoT manufacturers need be involved with the OpenWrt, let alone supporting it. My reference to its V19.07.3 was the version that expanded its usable address pool to include 240/4. That was all.

For sure, OpenWrt does not run on all RGs in the field. But, this does not restrict an overlay network like RAN from starting to network only those premises with RGs that run on OpenWrt (plus those RGs compatible with 240/4 from the factories). Since the existing CG-NAT is not disturbed and daily Internet services are going normally, RAN growth can take its time.
3) " You've provided a link to a D-Link managed switch, not a router. Just because it can support L2 routing, doesn't make it a router. ":


Correct, this is just a basic example for networking the RGs to experiment the RAN configuration. It is not intended to be a full-fledged router which will have other considerations that are way beyond what EzIP should be involved with.


Regards,


Abe (2024-01-18 22:48)







https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]Virus-free.https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient"]www.avast.com
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
Once upon a time, sronan@ronan-online.com <sronan@ronan-online.com> said:
> I am curious if anyone has ever given you positive feedback on this idea? So far
> all I’ve seen is the entire community thinking it’s a bad idea. Why do you
> insist this is a good solution?

Because people keep responding.
--
Chris Adams <cma@cmadams.net>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
>
> Because people keep responding.
>

Doesn't really make any difference. Mr. Chen filed his first draft in Dec
2016. He finds a reason to talk about it on every mailing list and forum
he can find, but doesn't spend any time engaging in the standards
processes, other than renewing his draft every 6 months.

I do agree it's better to just block him and ignore. He's still not going
to stop though.



On Sat, Jan 20, 2024 at 12:51?PM Chris Adams <cma@cmadams.net> wrote:

> Once upon a time, sronan@ronan-online.com <sronan@ronan-online.com> said:
> > I am curious if anyone has ever given you positive feedback on this
> idea? So far
> > all I’ve seen is the entire community thinking it’s a bad idea. Why do
> you
> > insist this is a good solution?
>
> Because people keep responding.
> --
> Chris Adams <cma@cmadams.net>
>
Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block [ In reply to ]
On Jan 20, 2024, at 11:56?AM, Abraham Y. Chen <aychen@avinta.com> wrote:
>
> Hi, Christopher:
>
> 1) " ... It would simply increase the workload of their support and provisioning teams. Right now, in cases where ISPs use DHCP, they can simply ship a router to an end-user, the user plugs it in, turns it on, and away they go. ":
>
> I do understand the current practice that you are describing. However, there is nothing wrong by instructing a subscriber to attempt accessing the ISP's sign-up website with his browser when first turning on the router, so that a process of checking the credentials of the subscriber can go through, then a static WAN (240/4) address is assigned to the router. From there on, everything should operate normally as far as the subscriber is concrned. This process is not special. For example, when a traveler checks into a hotel these days, he would go through pretty much the same steps with minimal identification (Certain hotel network even knew which room I was in by popping my name on the screen, perhaps because the WiFi access point was fed by wired Ethernet! Only password provided by the front desk was needed.) Then, everything works just like at home.
>
> 2) " ... If an end-user has a router that does not support OpenWrt, it will require the end-user to replace their router with one that does in order to connect to an EzIP-enabled network. ":
>
> Correct. But, RAN is an overlay network that provides a parallel route to the same services as the current CG-NAT. So, an end-user has the option to use it. Nothing hurts, if he decides to ignore the RAN.
>
> 3) " A carrier would not have a need for more than ~4.1m devices on a single regional access network ... ":
> This is a system level planning consideration. That is, even if some carriers do not need EzIP, it does not mean that the capability should not be presented to the general audience. Let's hold this off for the moment.
>
> Regards,
>
>
>
> Abe (2024-01-20 11:55)
>
>
>
>
>
> On 2024-01-18 23:19, Christopher Hawker wrote:
>> According to the diagram on page 8 of the presentation on your website at https://www.avinta.com/phoenix-1/home/EzIPenhancedInternet.pdf, it simply identifies 240/4 as CGNAT space. Routing between regional access networks typically doesn't take place when using such space on an ISP network, and most ISPs (that I know of) will offer public addressing when it is required. Further, if you think the need for DHCP will be eliminated through the use of your solution, I hate to say it, but ISPs will not statically configure WAN addressing on CPE for residential services. It would simply increase the workload of their support and provisioning teams. Right now, in cases where ISPs use DHCP, they can simply ship a router to an end-user, the user plugs it in, turns it on, and away they go. Connectivity to the internet.
>>
>> If an end-user has a router that does not support OpenWRT, it will require the end-user to replace their router with one that does in order to connect to an EzIP-enabled network. This is not reasonably practical. This would also require router vendors to support connectivity to a proprietary "semi-public router".
>>
>> Again, for the sake of completeness, this solution is a waste of time and resources. A carrier would not have a need for more than ~4.1m devices on a single regional access network and some may run more than one in a single region, so as not to put all of their proverbial eggs into the same basket.
>>
>> Regards,
>> Christopher Hawker
>>
>> On Fri, 19 Jan 2024 at 14:49, Abraham Y. Chen <aychen@avinta.com <mailto:aychen@avinta.com>> wrote:
>>> Hi, Christopher:
>>>
>>> 1) " If "EzIP" is about using 240/4 as CGNAT space, ... ":
>>> This correlation is just the starting point for EzIP deployment, so that it would not be regarded as a base-less crazy dream. Once a 240/4 enabled RAN is established as a new network overlaying on the CG-NAT infrastructure, the benefits of making use of the 240/4 resources can begin to be considered. For example, with sufficient addresses, static address administration can be practiced within a RAN which will remove the need for DHCP service. From this, related consequences may be discussed.
>>>
>>>
>>> 2) " I don't think you quite grasp the concept that OpenWRT is not compatible with devices that do not support it. .... it would not be appropriate to expect every device vendor to support it. ... ":
>>> Perhaps we have some offset about the terminology of "who supports whom?" My understanding of the OpenWrt project is that it is an open-source program code that supports a long list (but not all) of primarily commercial RGs (Residential/Routing Gateways) and WiFi routers that serve / support CPE devices (on-premises IoTs). Its basic purpose is to let private network owners to replace the firmware code in the RGs with the OpenWrt equivalent so that they will have full control of their RGs and then modify them if desired. Thus, the basic release of each OpenWrt code maintains most of the original functionalities in the OEM device. So, neither the original RG nor any IoT manufacturers need be involved with the OpenWrt, let alone supporting it. My reference to its V19.07.3 was the version that expanded its usable address pool to include 240/4. That was all.
>>>
>>> For sure, OpenWrt does not run on all RGs in the field. But, this does not restrict an overlay network like RAN from starting to network only those premises with RGs that run on OpenWrt (plus those RGs compatible with 240/4 from the factories). Since the existing CG-NAT is not disturbed and daily Internet services are going normally, RAN growth can take its time.
>>>
>>> 3) " You've provided a link to a D-Link managed switch, not a router. Just because it can support L2 routing, doesn't make it a router. ":
>>> Correct, this is just a basic example for networking the RGs to experiment the RAN configuration. It is not intended to be a full-fledged router which will have other considerations that are way beyond what EzIP should be involved with.
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>> Abe (2024-01-18 22:48)
>>>
>>>


Wow, changes happen when one is busy. When was the acronym "RAN" applied to a "Stealthy Overlay Network"? In my experience RAN is most often a Radio Access Network (military and cellular nets). Return Authorization Number is accepted usage in commerce. I now have several questions:

Shouldn't the acronym be SON, except that is also used many places?
Why are we discussing a "Stealthy Overlay Network" anyway? If truly is stealthy, it is probably not guided by RFC.
What does OpenWRT have to do with this?
I saw the beginning of this discussion long long ago. I still do not understand the merits of messing with IPv4 address allocations, especially comparing cost of a limited lifetime "Stealthy Overlay Network" as comparted to actually deploying and using IPv6. Where will be the long term savings? IPv6 has an expected lifetime far in excess of any hacks to extend IPv4 lifetime.
Show me the money.
-
James R Cutler
James.cutler@consultant.com

1 2  View All