ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

valdis.kletnieks at vt.edu valdis.kletnieks at vt.edu
Sun Jun 17 17:24:03 UTC 2012


On Sun, 17 Jun 2012 13:10:59 -0400, Arturo Servin said:
> 	Wouldn't BCP38 help?

The mail I'm replying to has as the first Received: line:

Received: from ?IPv6:2800:af:ba30:e8cf:d06f:4881:973a:c68?  ([2800:af:ba30:e8cf:d06f:4881:973a:c68]) by mx.google.com with ESMTPS id  b8sm25918444anm.4.2012.06.17.10.11.04 (version=TLSv1/SSLv3 cipher=OTHER);  Sun, 17 Jun 2012 10:11:06 -0700 (PDT)

Obviously BCP38 doesn't help, as it's an established TCP connection so it can't be
spoofed traffic (gotta ACK  Google's ISN from the SYN-ACK)  - unless Google is silly
enough to *still* not be doing RFC1948 properly.  I mean, Steve Bellovin wrote
that literally last century. ;)

So - who owns 2800:af:ba30:e8cf:4881:973a:c68?  And how does an LEO
find that info quickly if they need to figure out who to hand a warrant to?

*THAT* is the problem that needs solving.

(And who *does* own that IP?   I admit not knowing. ;)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 865 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20120617/222a6697/attachment.sig>


More information about the NANOG mailing list