IPv6 and forensic requests
Max Tulyev
maxtul at netassist.ua
Sun Feb 10 13:23:47 UTC 2019
Hi All,
we are implementing IPv6 only infrastructure.
For IPv4 access, we using tayga for 6to4 translation and then CGN for NAT.
There is a number of ways for Linux based NAT to store information for
future forensic requests (i.e. "who was it cracking that website?").
But what about 6to4 translators, as tayga? I believe there should be
well-known patches or solutions. The aim is to have what /64 (not even
/128) was translated to what IPv4 at the requested time.
Is there any?
More information about the NANOG
mailing list