nanog mailing list archives
IPv6 and forensic requests
From: Max Tulyev <maxtul () netassist ua>
Date: Sun, 10 Feb 2019 15:23:47 +0200
Hi All, we are implementing IPv6 only infrastructure. For IPv4 access, we using tayga for 6to4 translation and then CGN for NAT.There is a number of ways for Linux based NAT to store information for future forensic requests (i.e. "who was it cracking that website?").
But what about 6to4 translators, as tayga? I believe there should be well-known patches or solutions. The aim is to have what /64 (not even /128) was translated to what IPv4 at the requested time.
Is there any?
Current thread:
- IPv6 and forensic requests Max Tulyev (Feb 10)
- Re: IPv6 and forensic requests JORDI PALET MARTINEZ via NANOG (Feb 10)
- Re: IPv6 and forensic requests Max Tulyev (Feb 10)
- Re: IPv6 and forensic requests Ca By (Feb 10)
- Re: IPv6 and forensic requests JORDI PALET MARTINEZ via NANOG (Feb 10)
- Re: IPv6 and forensic requests Max Tulyev (Feb 10)
- Re: IPv6 and forensic requests JORDI PALET MARTINEZ via NANOG (Feb 10)
- Re: IPv6 and forensic requests Max Tulyev (Feb 10)
- Re: IPv6 and forensic requests JORDI PALET MARTINEZ via NANOG (Feb 10)