IPv6 prefix from T-Mobile USA used but not announced in BGP (2607:7700::/32)
Baptiste Jonglez
baptiste at bitsofnetworks.org
Wed Apr 27 21:09:15 UTC 2016
On Wed, Apr 27, 2016 at 01:16:28PM -0700, Aaron Hopkins wrote:
> On Wed, 27 Apr 2016, Baptiste Jonglez wrote:
>
> >While doing statistics on the participants of a public DHT, I was
> >surprised to see some IP addresses that are not present in the DFZ:
>
> I believe those are used by T-mobile's 464XLAT (RFC 6877) implementation.
>
> Recent Android on T-mobile is IPv6-only and has no ability to connect to
> raw IPv4 addresses. T-mobile's DNS servers are only asked by these devices
> to translate hostnames to IPv6 addresses. If they can't find an IPv6
> address, they will look up the IPv4 address for a hostname, and pack it into
> the bottom 32 bits of an IPv6 address that routes to a IPv6-to-IPv4 NAT
> device.
Thanks, I had forgotten that DNS64 is possible without using the
well-known prefix. The encoded IPv4 addresses seem to belong to other
peers of the DHT.
So, if this is basically DNS64/NAT64, these IP addresses should not be
seen as source or destination address outside of T-Mobile's network, and
are not attached to the interface of any device.
I can see two possible explanations:
1/ packets with src or dest IP in 2607:7700::/32 somehow escaped
T-Mobile's network, without being translated back to IPv4. They caused
other DHT nodes to believe they have incoming peers in 2607:7700::/32.
2/ there is an interesting bug in the DHT software when run behind 464XLAT
(btw, the DHT is dual-stack and supports IPv6 just fine)
I still wonder how this can happen, because the DHT does not use DNS at all...
Baptiste
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20160427/3708c075/attachment.sig>
More information about the NANOG
mailing list