SlideShare a Scribd company logo
Lessons from
     IPv6 day, 2011
               Jon Warbrick
University of Cambridge Computing Service
         jw35@cam.ac.uk / @jw35
IPv4


131.111.8.37
IPv6


2001:630:212:8::d:a0
8th June 2011
Objective
“ On 8 June, 2011, top websites and Internet
   service providers around the world joined
together for a successful global-scale trial of the
  new Internet Protocol, IPv6. By providing a
  coordinated 24-hour “test flight”, the event
    helped demonstrate that major websites
 around the world are well-positioned for the
move to a global IPv6-enabled Internet, enabling
       its continued exponential growth.
                                              ”
                                      http://www.worldipv6day.org/
Participants




       ...and at least 1,000 more
Gotchas
(predicted)
Auto-configuration
• You may have an address without knowing
  it!
• The router you got it from may not work
• If it’s not registered, it’s not in cam.ac.uk or
  ox.ac.uk
• Auto-config not suitable for servers
v4 service != v6 service

• Separate name address mapping
• Application layer - e.g.Virtual hosting
• May not respond
Packet filters and
    firewalls
‘Private’ addresses
localhost


127.0.0.1 != ::1
Log Analysis

    “2001:630:212:8::d:a0”
         does not match
/d{1,3}.d{1,3}.d{1,3}.d{1,3}/
Gotchas
(less obvious)
Fragmentation and
     ICMP6
  The magic number is 1280
Old (and not-so-old)
      software
So, the plan...
• E-mail (*.hermes.cam.ac.uk, mx.cam.ac.uk)
• Web servers (www.cam.ac.uk,
  [web-]search.cam.ac.uk, Raven
  (authentication))
• The Streaming Media Service
• The DNS servers
• Training booking
So, the plan...
• E-mail (*.hermes.cam.ac.uk, mx.cam.ac.uk)
• Web servers (www.cam.ac.uk,
  [web-]search.cam.ac.uk, Raven
  (authentication))
• The Streaming Media Service
• The DNS servers
• Training booking
On the day...

Internal access to external
         resources
On the day...


Access to internal resources
IPv6 proportions
   www.cam       1.5% requests
                  0.55% logins
Hermes Webmail
                 0.46% requests
 Hermes IMAP      0.15% logins
 Hermes POP       0.04% logins
 Hermes SMTP     0.25% messages
   PP Switch     3.1% messages
   mx.cam        1.0% messages
www.cam: top 10 countries
                2619      UCS STAFF
                1373         China
                1290         Brazil
                 835        JANET
                 630     UNIVERSITY
                 420    United Kingdom
                 293     United States
                 171        Greece
                 123        France
                 110    Czech Republic
8,351 requests total, from 230 clients, 28 countries
The trouble with
         tunnels

• www.cam: 50 clients, 630 requests over
  6to4
 • 36 clients from within the University
• 20% of smtp.hermes messages
131.111.10.33
                               6to4                    IPv4
2002:836f:a21::                          192:88:99.1

                                                              IPv6

                          IPv6 packets
                           inside IPv4




                  Router for
                   2002::/16
Tunnel issues
• 6to4 hosts can advertise themselves as
  routers
• 6to4 only works for machines with public
  addresses
• Teredo supports privately addressed
  machines using 2001:0::/32
• Both mean that machines on your network
  can have addresses not on your network!
The bottom line:

• IPv6 day was an almost complete non-event
The bottom line:

• IPv6 day was an almost complete non-event
• And so a success
The bottom line:

• IPv6 day was an almost complete non-event
• And so a success
• And so, almost exactly a year later ...
6th June 2012
That’s it
If you have been, thanks for listening

More Related Content

Viewers also liked

An introduction to Version Control Systems
An introduction to Version Control SystemsAn introduction to Version Control Systems
An introduction to Version Control Systems
Jon Warbrick
 
Google Apps @ Cambridge - What we did
Google Apps @ Cambridge - What we didGoogle Apps @ Cambridge - What we did
Google Apps @ Cambridge - What we did
Jon Warbrick
 
Google Apps - SSO and Identity Management at the University of Cambridge
Google Apps - SSO and Identity Management at the University of CambridgeGoogle Apps - SSO and Identity Management at the University of Cambridge
Google Apps - SSO and Identity Management at the University of Cambridge
Jon Warbrick
 
Dunbar's Number, and what it means to the UIS
Dunbar's Number, and what it means to the UISDunbar's Number, and what it means to the UIS
Dunbar's Number, and what it means to the UIS
Jon Warbrick
 
Banner+H&W+Feb+2011
Banner+H&W+Feb+2011Banner+H&W+Feb+2011
Banner+H&W+Feb+2011
judiburns6
 
(Why) Passwords don't work
(Why) Passwords don't work(Why) Passwords don't work
(Why) Passwords don't work
Jon Warbrick
 
Syndicated content on your web pages
Syndicated content on your web pagesSyndicated content on your web pages
Syndicated content on your web pages
Jon Warbrick
 
Monitoring Skills
Monitoring SkillsMonitoring Skills
Monitoring Skills
Monadnock Community Hospital
 
Hypertension
HypertensionHypertension
Web Authenication with Shibboleth - a view from the Flat East
Web Authenication with Shibboleth - a view from the Flat EastWeb Authenication with Shibboleth - a view from the Flat East
Web Authenication with Shibboleth - a view from the Flat East
Jon Warbrick
 
Hyperlipidemia
HyperlipidemiaHyperlipidemia
State of the Raven
State of the RavenState of the Raven
State of the Raven
Jon Warbrick
 
F.I.T.T. Principles and METs
F.I.T.T. Principles and METsF.I.T.T. Principles and METs
F.I.T.T. Principles and METs
Monadnock Community Hospital
 

Viewers also liked (13)

An introduction to Version Control Systems
An introduction to Version Control SystemsAn introduction to Version Control Systems
An introduction to Version Control Systems
 
Google Apps @ Cambridge - What we did
Google Apps @ Cambridge - What we didGoogle Apps @ Cambridge - What we did
Google Apps @ Cambridge - What we did
 
Google Apps - SSO and Identity Management at the University of Cambridge
Google Apps - SSO and Identity Management at the University of CambridgeGoogle Apps - SSO and Identity Management at the University of Cambridge
Google Apps - SSO and Identity Management at the University of Cambridge
 
Dunbar's Number, and what it means to the UIS
Dunbar's Number, and what it means to the UISDunbar's Number, and what it means to the UIS
Dunbar's Number, and what it means to the UIS
 
Banner+H&W+Feb+2011
Banner+H&W+Feb+2011Banner+H&W+Feb+2011
Banner+H&W+Feb+2011
 
(Why) Passwords don't work
(Why) Passwords don't work(Why) Passwords don't work
(Why) Passwords don't work
 
Syndicated content on your web pages
Syndicated content on your web pagesSyndicated content on your web pages
Syndicated content on your web pages
 
Monitoring Skills
Monitoring SkillsMonitoring Skills
Monitoring Skills
 
Hypertension
HypertensionHypertension
Hypertension
 
Web Authenication with Shibboleth - a view from the Flat East
Web Authenication with Shibboleth - a view from the Flat EastWeb Authenication with Shibboleth - a view from the Flat East
Web Authenication with Shibboleth - a view from the Flat East
 
Hyperlipidemia
HyperlipidemiaHyperlipidemia
Hyperlipidemia
 
State of the Raven
State of the RavenState of the Raven
State of the Raven
 
F.I.T.T. Principles and METs
F.I.T.T. Principles and METsF.I.T.T. Principles and METs
F.I.T.T. Principles and METs
 

Similar to Lessons fro IPv6 day, 2011

Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
Olivier Bonaventure
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
Olivier Bonaventure
 
Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
Olivier Bonaventure
 
The End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident RespondersThe End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident Responders
Carlos Martinez Cagnazzo
 
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloudLAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
Jisc
 
IPv6 experience from a large enterprise - Networkshop44
IPv6 experience from a large enterprise - Networkshop44IPv6 experience from a large enterprise - Networkshop44
IPv6 experience from a large enterprise - Networkshop44
Jisc
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
ULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
ULLPTT
 
SRECon-Europe-2017: Networks for SREs
SRECon-Europe-2017: Networks for SREsSRECon-Europe-2017: Networks for SREs
SRECon-Europe-2017: Networks for SREs
Michael Kehoe
 
Basics concepts of internet.ppt
Basics concepts of internet.pptBasics concepts of internet.ppt
Basics concepts of internet.ppt
SahilNegi60
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
university of education,Lahore
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
Muhammad Tahir Mehmood
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
Computing Cage
 
how_internet_works.ppt
how_internet_works.ppthow_internet_works.ppt
how_internet_works.ppt
singhssukhdev65
 
Performance Evaluation of XMPP on the Web
Performance Evaluation of XMPP on the WebPerformance Evaluation of XMPP on the Web
Performance Evaluation of XMPP on the Web
Markku Laine
 
Is IPv6 Really Faster?
Is IPv6 Really Faster?Is IPv6 Really Faster?
Is IPv6 Really Faster?
APNIC
 
Routing for an Anycast CDN
Routing for an Anycast CDNRouting for an Anycast CDN
Routing for an Anycast CDN
Tom Paseka
 
9 ipv6-routing
9 ipv6-routing9 ipv6-routing
9 ipv6-routing
Olivier Bonaventure
 
Html5 web sockets - Brad Drysdale - London Web 2011-10-20
Html5 web sockets - Brad Drysdale - London Web 2011-10-20Html5 web sockets - Brad Drysdale - London Web 2011-10-20
Html5 web sockets - Brad Drysdale - London Web 2011-10-20
Nathan O'Hanlon
 
Network-Internet
Network-InternetNetwork-Internet
Network-Internet
JunaidRamzan4
 

Similar to Lessons fro IPv6 day, 2011 (20)

Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
 
The End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident RespondersThe End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident Responders
 
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloudLAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
 
IPv6 experience from a large enterprise - Networkshop44
IPv6 experience from a large enterprise - Networkshop44IPv6 experience from a large enterprise - Networkshop44
IPv6 experience from a large enterprise - Networkshop44
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
SRECon-Europe-2017: Networks for SREs
SRECon-Europe-2017: Networks for SREsSRECon-Europe-2017: Networks for SREs
SRECon-Europe-2017: Networks for SREs
 
Basics concepts of internet.ppt
Basics concepts of internet.pptBasics concepts of internet.ppt
Basics concepts of internet.ppt
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
 
how_internet_works.ppt
how_internet_works.ppthow_internet_works.ppt
how_internet_works.ppt
 
Performance Evaluation of XMPP on the Web
Performance Evaluation of XMPP on the WebPerformance Evaluation of XMPP on the Web
Performance Evaluation of XMPP on the Web
 
Is IPv6 Really Faster?
Is IPv6 Really Faster?Is IPv6 Really Faster?
Is IPv6 Really Faster?
 
Routing for an Anycast CDN
Routing for an Anycast CDNRouting for an Anycast CDN
Routing for an Anycast CDN
 
9 ipv6-routing
9 ipv6-routing9 ipv6-routing
9 ipv6-routing
 
Html5 web sockets - Brad Drysdale - London Web 2011-10-20
Html5 web sockets - Brad Drysdale - London Web 2011-10-20Html5 web sockets - Brad Drysdale - London Web 2011-10-20
Html5 web sockets - Brad Drysdale - London Web 2011-10-20
 
Network-Internet
Network-InternetNetwork-Internet
Network-Internet
 

Recently uploaded

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Lessons fro IPv6 day, 2011

  • 1. Lessons from IPv6 day, 2011 Jon Warbrick University of Cambridge Computing Service jw35@cam.ac.uk / @jw35
  • 5. Objective “ On 8 June, 2011, top websites and Internet service providers around the world joined together for a successful global-scale trial of the new Internet Protocol, IPv6. By providing a coordinated 24-hour “test flight”, the event helped demonstrate that major websites around the world are well-positioned for the move to a global IPv6-enabled Internet, enabling its continued exponential growth. ” http://www.worldipv6day.org/
  • 6. Participants ...and at least 1,000 more
  • 8. Auto-configuration • You may have an address without knowing it! • The router you got it from may not work • If it’s not registered, it’s not in cam.ac.uk or ox.ac.uk • Auto-config not suitable for servers
  • 9. v4 service != v6 service • Separate name address mapping • Application layer - e.g.Virtual hosting • May not respond
  • 10. Packet filters and firewalls
  • 13. Log Analysis “2001:630:212:8::d:a0” does not match /d{1,3}.d{1,3}.d{1,3}.d{1,3}/
  • 15. Fragmentation and ICMP6 The magic number is 1280
  • 17. So, the plan... • E-mail (*.hermes.cam.ac.uk, mx.cam.ac.uk) • Web servers (www.cam.ac.uk, [web-]search.cam.ac.uk, Raven (authentication)) • The Streaming Media Service • The DNS servers • Training booking
  • 18. So, the plan... • E-mail (*.hermes.cam.ac.uk, mx.cam.ac.uk) • Web servers (www.cam.ac.uk, [web-]search.cam.ac.uk, Raven (authentication)) • The Streaming Media Service • The DNS servers • Training booking
  • 19. On the day... Internal access to external resources
  • 20. On the day... Access to internal resources
  • 21. IPv6 proportions www.cam 1.5% requests 0.55% logins Hermes Webmail 0.46% requests Hermes IMAP 0.15% logins Hermes POP 0.04% logins Hermes SMTP 0.25% messages PP Switch 3.1% messages mx.cam 1.0% messages
  • 22. www.cam: top 10 countries 2619 UCS STAFF 1373 China 1290 Brazil 835 JANET 630 UNIVERSITY 420 United Kingdom 293 United States 171 Greece 123 France 110 Czech Republic 8,351 requests total, from 230 clients, 28 countries
  • 23. The trouble with tunnels • www.cam: 50 clients, 630 requests over 6to4 • 36 clients from within the University • 20% of smtp.hermes messages
  • 24. 131.111.10.33 6to4 IPv4 2002:836f:a21:: 192:88:99.1 IPv6 IPv6 packets inside IPv4 Router for 2002::/16
  • 25. Tunnel issues • 6to4 hosts can advertise themselves as routers • 6to4 only works for machines with public addresses • Teredo supports privately addressed machines using 2001:0::/32 • Both mean that machines on your network can have addresses not on your network!
  • 26. The bottom line: • IPv6 day was an almost complete non-event
  • 27. The bottom line: • IPv6 day was an almost complete non-event • And so a success
  • 28. The bottom line: • IPv6 day was an almost complete non-event • And so a success • And so, almost exactly a year later ...
  • 30.
  • 31.
  • 32. That’s it If you have been, thanks for listening

Editor's Notes

  1. This talk covers some of the things we leant as a result of participating in World IPv6 Day on 8th June 2011. It’s presented from a server administrator’s point of view and, while it mentions assorted network-level issues, it doesn’t go into particular detail. In particular it’s not a guide to setting up an IPv6-capable network, nor a primer on what IPv6 is.\n
  2. We are probably all used to IPv4. Been around for ages. Critically uses 32 bits to represent addresses, normally written as four dot-separated octets, each expressed in decimal. Trouble is, the world is running out of IPv4 addresses (all the ‘spare’ has now been allocated for use, though there are still lots of addresses not actually being used). IPv4 is only surviving thanks to extensive use of RFC1918 ‘private’ addresses, though their properties mean that ever increasingly complicated workarounds are needed to support their continued use.\n
  3. IPv6, on the other hand, uses 128 bits to represent addresses (and note that doesn’t mean that the address space is only four times bigger...), normally written in hexadecimal as multiple 16-bit blocks separated by ‘:’ and with rules allowing runs of zeroes to be omitted. \n\nThe two protocols have quite a few other differences, some of which we’ll come on to, but the longer addresses are the ones you see first. But note lesson number 1: trying to use IPv6 as if it was just ‘IPv4 with longer addresses’ is doomed to failure.\n\n
  4. So, what was IPv6 day all about?\n
  5. Here’s what the Internet Society (who suggested and promoted the idea) had to say on the subject.\n
  6. Here are some of the big players who started it off by promising to take part. Most of these already made their services available over IPv6, though not by default. In the end, at least 1,000 other providers, including the University of Cambridge, also joined in.\n\n
  7. We gave this some thought in advance, and identified a number of things that we’d need to worry about...\n
  8. IPv4 (at least in Cambridge where DHCP - especially dynamic DHCP - has always been considered a bit iffy) needs manual configuration: address, netmask, router, etc. \n\nv6, on the other hand, will by default try to configure itself. Connect any modern OS to many IPv6-capable networks and the machine will acquire a globally-routable address. Common schemes are EUI-64 and ‘privacy addresses’ (RFC 4941).\n\nThis difference can lead to some surprises.\n
  9. The DNS handles name<->IPv4 mapping separately to name<->IPv6 mapping So there’s no guarantee that you’ll hit the same server, never mind the same service, over v6 as over v4. Setting things up like this may lead to madness, but can sometimes be useful. \n\nIPv6 config may be needed at an application level - for example Apache needs to know what IP addresses it’s doing name-based virtual hosting on and so will need to know about v6 addresses as well as v4 ones.\n\nIf an advertised v6 address isn’t responding (perhaps because the v6 interface is down) but the corresponding v4 interface is responding then clients will tend to try v6 and only fall back to v4 after a timeout. The symptoms can look VERY like server or network overload!\n
  10. Packet filters and firewalls will need new configuration for v6 - default will probably be to block everything or allow everything, neither of which will probably be what you want.\n
  11. It’s tempting to consider a machine with a RFC 1918 private IPv4 address behind a NAT service to be more secure that a publicly addressed one, because it can’t be poked directly from the outside. Private v6 addresses do exist (‘Unique Local Addresses’ (ULAs)), but they are not widely deployed because they are typically a solution to an address shortage and we are not short of v6 addresses. \n\nSo, stick a v4 privately-addressed machine on a subnet that also supports v6 and it will probably be out there exposed on the public Internet with a global address. This may come as a surprise. \n
  12. It’s common to setup inter-host communications (e.g. web server to database) to use the localhost interface and to limit connections to this to prevent external meddling. But if you enable v6 on such a machine then internal connection may happen via the v6 local interface on ::1 and not the v4 one on 127.0.0.1. If your rules don’t take this into account you may find that you can’t talk to yourself.\n
  13. Rather a lot of log analysis software may be assuming that IP addresses in logs will look like 131.111.10.33, and may be ‘surprised’ to find ones that look like 2001:630:212:8080::80:0. How they react will vary, but ignoring such entries (perhaps silently), or stoping dead on the first one are both possibilities.\n
  14. ...and once we got into actually doing the necessary configuration we found some others:\n
  15. If an IPv6 router finds it has a packet that’s too big to send over a particular link it drops the packet and sends a ‘Packet too big’ ICMP6 message to the packet’s origin, which is expected to resend it smaller. If anyone foolishly blocks those ICMP6 messages then this won’t work, and you’ll find that you can successfully send small packets but not full size ones. In a web context, this can mean that clients can open connections and successfully send requests, but can’t receive responses (which are typically much bigger). IPv6 requires that all links carry at least 1280 byte packets (c.f. 1500 byte packets typically used on Ethernet) and there is some evidence that the big providers are artificially limiting themselves to 1280 bytes, presumably to avoid this problem.\n\n[IPv4 also has fragmentation, but it handled on a per-link basis, rather than end-to-end. It too can cause problems, but these are now largely understood and normally avoided, and in any case not often seen by clients]\n\nAuto-configuration (mentioned above) also relies on ICMP6 so if you block that you may loose all your addresses too!\n
  16. Even though it’s been around for a while, IPv6 is still changing quite rapidly, and even ‘current’ software may not be keeping up. For example all but the most recent point release of the version of MacOS current on IPv6 Day had a bug that was likely to affect some users. SuSE Linux Enterprise 10 (old, but still in support) has some failings in its v6 support that caused us problems.\n
  17. The core of the CUDN already supports IPv6, as does JANET, but only a few University edge networks have enabled it (UCS, Astronomy, Computer Lab, SRCF, ...). \n\nThe plan was to enable IPv6 on all these services for Pv6 day...\n
  18. ...but inevitably some fell by the wayside. We did manage the rest.\n
  19. No known problems experienced by any University clients accessing v6-enabled services.\n
  20. A small but significant number of people accessed our v6 enabled services, apparently successfully. \n
  21. OK, not exactly big numbers. Services mainly offered to internal clients likely to be low because of the small number of internal clients with IPv6 connectivity. For services also accessed from outside (www.cam, mx.cam) ~1% of accesses were over v6.\n
  22. China/Brazil probably high because the developing world has disproportionately fewer IPv4 addresses then US/Europe, etc., because by the time they wanted them the shortage was already becoming apparent and allocation rules were tightened. Such countries are likely to already be deploying v6 to cope with this.\n
  23. Because of the disconnect between IPv4 and IPv6, various people have created systems what will, automatically or with manual configuration, allow v4 and v6 hosts to communicate or allow a pair of v6 hosts that don’t have v6 connectivity between them to communicate. ‘6to4’ is one such, and a common bug is that machines will sometimes chose an IPv6 connection via one of these ‘transitional technologies’ in favor of a ‘real’ IPv4 connection. For example lots of clients in the University contacted www.cam and smtp.hermes over 6to4 even though all those clients will have had viable IPv4 routes to the same servers. \n\nThis causes some problems.\n
  24. 6to4 is really clever, and here’s a diagram of how it works. You might want to look at the Wikipedia description for more detail: http://en.wikipedia.org/wiki/6to4 \n\nThe critical points are that a 6to4 host ends up with an entirely usable IPv6 address in the 6to4 range 2002::/16, and if it wishes can offer to route other address in that range on behalf of other clients on the same subnet (thus bringing IPv6 support to a network that wouldn’t otherwise have it). But all this depends on connections that are probably crossing the institution boundary and which are probably being offered on a ‘best efforts’ basis at best.\n
  25. So now you have machines on your network that are using IPv6 addresses from a range that you don’t expect. Any access control by IP address is likely to be messed up by this. Worse, since 6to4 machines can advertise themselves as IPv6 routers to other machines, the existence of a machine doing this can easily affect other machines on the same subnet.\n\nWe saw this effect on IPv6 Day. Part way through the day a department mail server suddenly started using a 6to4 connection being offered by a workstation on the same network. Unfortunately it was forwarding mail to the central mail switch which refused to accept it because it wasn’t (apparently) coming from a machine in the University. Fortunately this was easily fixed, and didn’t result in a loss of mail, but does suggest that a significant barrier to wider Pv6 deployment may turn out to be these very ‘transitional’ technologies that were designed to make it easier.\n
  26. \n
  27. \n
  28. \n
  29. IPv6 launch day. Much like in 2011, lots of big players turned on IPv6 on their services. Unlike in 2011, they didn’t turn it off.\n
  30. Here’s ww.google.com advertising a v6 address. At least back in work on my v6-enabled desktop, this is how I now connect to Google.\n\n
  31. My plan is to enable dual-stack V4/v6 on new services from day one, and probably to add v6 on exiting services as and when they get replaced or significantly changed.\n
  32. \n