[v6ops] Re: question about RFC9096 - lifetime for PDs delegated by forced roll ISPs

Daryll Swer <contact@daryllswer.com> Tue, 09 September 2025 14:25 UTC

Return-Path: <contact@daryllswer.com>
X-Original-To: v6ops@mail2.ietf.org
Delivered-To: v6ops@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 1C36A5FCB8B0 for <v6ops@mail2.ietf.org>; Tue, 9 Sep 2025 07:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=daryllswer.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tyYxOkaVG7mR for <v6ops@mail2.ietf.org>; Tue, 9 Sep 2025 07:25:52 -0700 (PDT)
Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 210605FCB8A9 for <v6ops@ietf.org>; Tue, 9 Sep 2025 07:25:51 -0700 (PDT)
Received: by mail-qt1-x833.google.com with SMTP id d75a77b69052e-4b5fbd77f40so44300281cf.2 for <v6ops@ietf.org>; Tue, 09 Sep 2025 07:25:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daryllswer.com; s=google; t=1757427945; x=1758032745; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=zitZQusb6TC/8Bu3aHmD5wXT28LDOmJmfJ68W1BX6jk=; b=jZwN5fJ/LuNKJfVjpiO1yzC7K0nHBSX7mOMObKzuw9KxO4tFgBnw/U4n2eY/X04m8m ENxc3+1gVjlAt2Ya+H7Z4YeUT3jgtHa+bw+FOUyvAECxpygyPskUSDoigFPpAt7F7UB7 lG+nOwXpS2R70Iy/Hn3eELoUQ/VFrjjwUlolOSs2v0xfWwx6szSdrXYOMyCljmX8bhPO 1siAJ0S0IIXkJsYOn9xUpbENMDG+IL9b8rXMxB/qi0hMrY8Hrf0+MzrnP9k11cfikhQk eCxxwTaXul0LMoxs09XpwDDSa2Lnf8yMTraZogFUiVVHXSKz4V/s8kq6T7mEK6zXhUsX Ucgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1757427945; x=1758032745; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=zitZQusb6TC/8Bu3aHmD5wXT28LDOmJmfJ68W1BX6jk=; b=NyQrlWaq4fWHbX77QnNx4zX6CGWPJmvRxgTz/YI4CnzXhAQaAErfsre/3k+wdQW/0N cxmKz9LaqSrQ5baw/cn/sTdxpkpYVmg46dnZ0VoOpDLVc/XL78Xypq8/PAMj3jcYQ9pw iDvOmnQ05jhxrRhiEMErVDorLJTgGF9muSXVH6NhZkdHEe+aq+aygqJzKtVMIoPVXl78 Td/1pVwqV1pM9NBawbbA73J4m4v8NSIuRzLV0LNKSJafHzMcXRc3AQS4jZ5R0lVHQrkB 6kWwGgInXCJbtUpAKmWTqr2KLbCFE4oFpJlo4Bbg9XPMKD3oN88zfai9s5WtF5AIbR5b gVjQ==
X-Forwarded-Encrypted: i=1; AJvYcCUtjH0bdgKIdul3luKtRc/GGx6zMBa3ME7ikb01nr0qK1ZMFkhHDyl6laASSoGY7J5XjzdV5A==@ietf.org
X-Gm-Message-State: AOJu0Yz4yvSeySnuqTz2UMUrvnV4yVQS3tUG5m2EQw0B51Zi+CYNdBq3 kTSEhTogXQpxJmqWzIBDINAYVak4muPf6vkgkYhvTE5kXT5Fnm0KxAXsJN65mxVVCqQdDfBOiSK air57CE8=
X-Gm-Gg: ASbGncs4O0Yh/LPJdUKfT6q4EliD4oXhmneSHAZ87jMuQcU4NnIgQXNKsYPmffZfztb hlOmb51RDiS1cxi6A3iA3WFSiBIuPfv6A5OIxSX/Xr/YxwQlPtirh1O5ejZNom4sGsANmVwuasX dbWokDxpxeKUXHDKNT/MwOJ6lQOeQ6/5iZ73x/IC5wE+E4FGerZ/wOzg+xJnXZzfZgLxOEINTz0 V7BdaWwhVbrpSxkgrsMbzUGGtAhwPeUz3oOlRaC+iffYBJgEhDySZvt5bG/8oCif3E6vwdI10BO oHJecafLz9uElmXi1qmSuKY84Xwb4RDGksqQsC/FzPzHB64ZnWfvGYNk22jXCoODqxruCN89Wlb O59xyAZdZGD4xRp8wXiWcTngQxRW5GzeIdAqfuSIdLqJe1g6o5UA/cIP/fH50mCVuvBk+6+UGgQ ==
X-Google-Smtp-Source: AGHT+IHTdr2Qrf7+AAk/LHyUyO6GAxIKhZFaOFSNDDnlr6Fxu8KsiAWR4ZDbq2Fr2DhCzn+hSXhWTw==
X-Received: by 2002:a05:622a:4e:b0:4b4:3dbf:985f with SMTP id d75a77b69052e-4b5f8468e2bmr113459281cf.65.1757427944323; Tue, 09 Sep 2025 07:25:44 -0700 (PDT)
Received: from mail-qv1-f41.google.com (mail-qv1-f41.google.com. [209.85.219.41]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-72856902136sm110021686d6.58.2025.09.09.07.25.43 for <v6ops@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 09 Sep 2025 07:25:44 -0700 (PDT)
Received: by mail-qv1-f41.google.com with SMTP id 6a1803df08f44-72374d6a6caso61015956d6.0 for <v6ops@ietf.org>; Tue, 09 Sep 2025 07:25:43 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCXx1e/DQw338Y8rRMIZ4yGtzqlO0GIMpwQMss967xFqh0kUueimMRCNKk/LEhjnpYnc9bsZ4g==@ietf.org
X-Received: by 2002:a05:6214:c2f:b0:70d:a712:617e with SMTP id 6a1803df08f44-739451c7edcmr132065896d6.66.1757427942518; Tue, 09 Sep 2025 07:25:42 -0700 (PDT)
MIME-Version: 1.0
References: <10636.1756224821@obiwan.sandelman.ca> <2d22d7ff-a336-4a40-b87e-244791f6cd62@gont.com.ar> <3025.1756937071@obiwan.sandelman.ca> <decc5bbf-f520-4af9-8fd0-d05a4a0d4e23@si6networks.com> <e5d8a1a0-cb7d-4b5d-a887-d1523d0e1d95@app.fastmail.com> <CACyFTPGsN_DWNF-p7yD=PHQQ9b9MYTHP4fuRdAR7MB4eHYW1hA@mail.gmail.com> <7BE2C0F9-DE36-406D-A14E-20462A2E2B2E@fugue.com> <9985.1756996265@obiwan.sandelman.ca> <CACyFTPHKQWYA5Q3QpSRzTU75g4NjsyEOirdMX-b7mu8C3F4UfA@mail.gmail.com> <02980ED3-C411-47A8-9865-C95D7035D252@fugue.com> <CACyFTPGE7dVRaJ2+byB=oUVD6Du-Lh8SnMKT99o8qsVqqN+LnQ@mail.gmail.com> <E5F60F96-635F-4D15-98DC-74B2695BE785@consulintel.es> <CACyFTPGBH0bD4qZGDYppJy_vAm50vXM_2AFy1z2=VXwuLG-vBg@mail.gmail.com> <7004E25B-35B3-4BA3-BC3D-F305B516E1EB@tiesel.net>
In-Reply-To: <7004E25B-35B3-4BA3-BC3D-F305B516E1EB@tiesel.net>
From: Daryll Swer <contact@daryllswer.com>
Date: Tue, 09 Sep 2025 19:55:05 +0530
X-Gmail-Original-Message-ID: <CACyFTPHchHtDDEwz0=k9r_eDOBYy9GO+m=B8RJqcxJeVpATmwg@mail.gmail.com>
X-Gm-Features: AS18NWBzxIKzvb8ldhg91zSlIeyaP9EHFYwQd_pRPjJ8E3kyV3LwIfLldsfnaw0
Message-ID: <CACyFTPHchHtDDEwz0=k9r_eDOBYy9GO+m=B8RJqcxJeVpATmwg@mail.gmail.com>
To: Philipp Tiesel <philipp@tiesel.net>
Content-Type: multipart/alternative; boundary="0000000000003b7a0b063e5f1416"
Message-ID-Hash: K5SMBWGLX4QRAVDSYHI7P5PKD755PEQB
X-Message-ID-Hash: K5SMBWGLX4QRAVDSYHI7P5PKD755PEQB
X-MailFrom: contact@daryllswer.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-v6ops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: v6ops@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [v6ops] Re: question about RFC9096 - lifetime for PDs delegated by forced roll ISPs
List-Id: v6ops discussion list <v6ops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/OUtybVZAuS8njDqf_TaXpHqqq58>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Owner: <mailto:v6ops-owner@ietf.org>
List-Post: <mailto:v6ops@ietf.org>
List-Subscribe: <mailto:v6ops-join@ietf.org>
List-Unsubscribe: <mailto:v6ops-leave@ietf.org>

Hi


> Its’ an RFC, even for standards track RFCs, there is no RFC police that
> enforces anything. I guess BCP would be fine and match the spirit of
> RIPE-690.
>
I'd argue the spirit of RIPE-690 didn't turn out very well (hence this
discussion), if consensus could be reached for standards track RFC, I think
that would be ideal.
690 has been cited as authoritative source for years, yet here we are with
NAT66, dynamic /64s that changes every 6 hours and so on and so forth.

As I do this at work, I might be able to just copy&paste our requirements
> into a draft ;-)
> Currently, there is still a lot in flux and IPv6 is still not as mature as
> I wish for most CSPs.
> Basic requirements I currently fight for:
> - /56 or shorter per VPC
> - /64 for virtual networks
> - /96 or longer per VM (/64 would be nice, but only works out with regards
> to address space usage if you have no VPCs)
>

“VPC” has always confused me personally, as it appears the implementation
can vary from provider-software to provider-software (AWS VPC seems to be
not identical with Cloudstack VPC in my limited understanding). My question
is, within a given VPC, do we really need a /56, or would a /64 per VPC
suffice, i.e. the VM instances would get a /128 out of it. I assume, the VM
/128 (VPC) would be used for private comms, and for regular Internet bound
traffic then a regular non-VPC /64 routed-to-each-VM would suffice, or
possibly a /60 instead (giving sufficient /64s for more complex use cases
with K8s/encap/decaps/namespaces etc).

What's “virtual networks” mean in your example? I'd think a VPC is virtual,
so is the network/subnet routed to a VM for use with containers etc.

- NO NAT (yes, there are CSPs that currently force usage of NAT66)
> - Address preservation across load balancers event in cases where an L4/L7
> LB converts across address families.

I'm by no means an expert with K8s, but I'm curious of the possible
solutions for NAT-less IPv6 with K8-based load balancing and address
preservation (anycast/BGP/ECMP/DSR).
If this aspect of CSPs could be standardised, I think it would help the
IPv6 deployments greatly.

The bottom-line (that I think most will agree with) is for both ISP and CSP
access network segments to be “good enough” that the end-user does not
require NAT66/NPTv6/NDP-Proxy hacks etc.

I've been thinking of what exactly classifies as “Stable PD” in SP world
and I think the answer should be something not locked to numbers but rather
with a statement, maybe something like this:
“The amount of time required for a prefix to be considered stable, is the
amount of time that the prefix has no justifications for change i.e. unless
drastic network changes and/or upgrades occurred such as M&As, physical
re-locations/re-route and/or major outages; until such or similar
conditions are met, the prefix must be stable for the end-user.”

This deletes “static” from the IPv6 PD vocabulary completely, which a lot
of “business” people really hate, while still, in theory, ensuring the
customer has minimal to zero issues. Again, I think using Starlink as a
planet-scale reference to base this off from, is a good approach — Their
IPv6 has never disappointed, even though it's not “static”, it's perfectly
stable.

*--*
Best Regards
Daryll Swer
Website: daryllswer.com
<https://l.shortlink.es/l/20784195556206c074967ff8d949217639e4fb58?u=2153471>


On Tue, 9 Sept 2025 at 18:59, Philipp Tiesel <philipp@tiesel.net> wrote:

> Hi,
>
> On 5. Sep 2025, at 10:41, Daryll Swer <contact=
> 40daryllswer.com@dmarc.ietf.org> wrote:
>
> Jordi
>
> May be we want to turn RIPE690 into a BCP and add current experience,
>> according to this discussion?
>>
> Good idea. But perhaps something more “enforcing-effect” than just a BCP,
> though (look how BCP-38 turned out).
>
>
> Its’ an RFC, even for standards track RFCs, there is no RFC police that
> enforces anything. I guess BCP would be fine and match the spirit of
> RIPE-690.
>
> But I would propose RIPE-690 revision/review first, it's time we include
> CSP (Cloud Service Provider) networking into it, this means NAT-less IPv6
> for K8s/K3s/VPS/Managed Web hosting etc, i.e. purely native-IPv6-only. I
> believe there were other members on this list who expressed in interest in
> writing something up for CSP networking + NAT-less IPv6.
>
>
> As I do this at work, I might be able to just copy&paste our requirements
> into a draft ;-)
> Currently, there is still a lot in flux and IPv6 is still not as mature as
> I wish for most CSPs.
> Basic requirements I currently fight for:
> - /56 or shorter per VPC
> - /64 for virtual networks
> - /96 or longer per VM (/64 would be nice, but only works out with regards
> to address space usage if you have no VPCs)
> - NO NAT (yes, there are CSPs that currently force usage of NAT66)
> - Address preservation across load balancers event in cases where an L4/L7
> LB converts across address families.
>
>
> And even for traditional residential SP networking, that “/56” suggestion
> may not bode well, for future home networks, as the number of IoT devices
> will scale exponentially, if we were to encourage ia_pd for all endpoints,
> everywhere, in a decade or two, with all the IoT stuff, we'd probably see
> more than 256 devices on a home LAN — this is with respect to RFC9663 not
> just for large domains but also home-network where ideally everything gets
> a prefix. Others can share their thoughts too.
>
> *--*
> Best Regards
> Daryll Swer
> Website: daryllswer.com
> <https://l.shortlink.es/l/84a123fa90d5c141653c6fd4a5ebdd8ae157b09a?u=2153471>
>
>
> On Fri, 5 Sept 2025 at 13:54, jordi.palet@consulintel.es <jordi.palet=
> 40consulintel.es@dmarc.ietf.org> wrote:
>
>> May be we want to turn RIPE690 into a BCP and add current experience,
>> according to this discussion?
>>
>> I’m happy to start that.
>>
>> Regards,
>> Jordi
>>
>> @jordipalet
>>
>>
>> El 5 sept 2025, a las 10:14, Daryll Swer <contact=
>> 40daryllswer.com@dmarc.ietf.org> escribió:
>>
>> I'll reply in a single email, saw many parts:
>>
>> Do we know of a case where this happens? I don't remember that from the
>>> earlier discussion. It sounds like we think it does happen, but this is
>>> faster than I've heard of before.
>>>
>> I've come across end-user reports over the years of some (not saying it's
>> common, but it's out there) ISPs having PD change every 60 minutes. I used
>> “15 mins” for dramatic effect (the tone didn't pass very well over text),
>> but yes, 60 mins, I've heard of such reports — I receive DMs/Emails from
>> end-users who come across my IPv6 blogs, so it's insightful, as we don't
>> typically see such reports in the public forums/social media (as far as I
>> know).
>>
>> I get that this document says that. My question is, why is the host not
>>> choosing the most recently advertised GUA?
>>>
>> Well, it does choose new, for “new” connection flows, for example, your
>> web browser “reloads” a tab, new socket, new src, new flow. But that's not
>> the case with a lot of end-user everyday applications — The many times I
>> emulated dynamic PD (since I have my own /32 to play with along with
>> physical IP transit to my home lab) and ran on-the-wire PCAPs, I see my
>> end-user apps like WhatsApp, Instagram etc all Happy Eyeballs to IPv4 very
>> fast (which is good), and they stay there for quite some random amount of
>> time, whenever my host (iPhone, Android, Windows, whatever OS, all the
>> above) receives the RA flood for zero lifetime and NEW RA with new prefix.
>>
>> In fact, with Apple FaceTime, what's strange is even for inter-VLAN P2P
>> call where both VLANs have a /64, these /64 are simulated to be dynamic, it
>> defaults to IPv4 with Apple's STUN (over my Hairpin NAT configuration of
>> course which allowed native intra-NAT traffic, this means *no TURN*).
>>
>> *In contrast*, when my prefix is stable/static (in my testing, I set
>> valid/pref timers to infinite, some NOSes allow this) and repeated the
>> above tests (again PCAPs) and indeed the majority of *the traffic
>> starts-with, stays-on, remains-with IPv6 GUAs *for both Global Internet
>> traffic and Inter/Intra-VLAN traffic. For Intra-VLAN traffic, it depends on
>> the end-user software, Apple FaceTime IIRC supported link-local with mDNS
>> and talks directly that way (good job Apple, I have always been a fan of
>> how you implement your network code on mobile devices at least), I also
>> noticed the iPhones sent STUN packets to each other intra-LAN, which I
>> assumed is meant to help track network state to keep a call stable, but
>> again, never seen GUA-based traffic when the ISP PD changes often and/or
>> unstable.
>>
>> Conclusion:
>> Unstable IPv6 prefix from ISP messes up end-user app software, Happy
>> Eyeballs kicks in (working as designed), traffic moves to IPv4 and stays
>> there for X (not-so-short) amount of time.
>> If the goal is “We want the public to be completely oblivious to IPv4 vs
>> IPv6 AFI”, then in my opinion, stable ISP prefix is the only way to achieve
>> this goal. Make IPv6 so good, that nobody can go back to IPv4.
>>
>> Those are temporary addresses. There are only (ha!) six prefixes there.
>>> Granted this is not great. An easy way to deal with this would be to say
>>> that if we get subsequent RAs from the router advertising new on-link
>>> prefixes and not advertising the old on-link prefix, that means the old
>>> on-link prefix is no longer valid and we should stop using it. What you are
>>> showing here is an indication that RAs were in fact successfully received.
>>>
>> Look closely, “secured” addresses are in there, which of course becomes
>> “temporary” because the ISP changes my prefix every random hours (5-6-7
>> etc), six prefixes indeed, uptime was around 14 hours on my local router.
>>
>> Indeed, this was my macOS device with a MikroTik CE on my end, RAs worked
>> correctly here for both “new” and “old”. But what worked for me, doesn't
>> work for everyone and every CPE in the market.
>>
>> RFC7084 recommends it. 7084bis will require it. RFC9818 describes how to
>>> sub-delegate the ULA.
>>>
>> Thanks, I'll review these.
>>
>> What are you talking about? Why do they need to know any of this? Why
>>> aren't they using mDNS to discover services on the network?
>>>
>> Again, you're conflating professional network engineers with the average
>> everyday Joe. The average everyday Joe prefers something like
>> “mylaptop.lan, A record: 192.168.10.5, on the local stub resolver at that”,
>> these are people who don't even know what .home.arpa is for.
>>
>> mDNS of course works for mDNS applications like casting etc, but not
>> every end-user “wants/needs” is mDNS-compatible or mDNS-based, one of these
>> that I came across from end-users is Android/iPhone apps that lets you
>> (v4/v6) access the phone gallery temporarily over IP:Port directly for
>> easy-transfer into non-walled-garden OS simply by using a web browser like
>> this one: https://simpletransfer.app/
>> <https://l.shortlink.es/l/ccf911ab479134c12c1846ac798061bdceb3edb6?u=2153471>
>>
>> I've done many roll-outs for residential ISP use-cases and there are all
>> kinds of support tickets coming in from end-users (please remember, these
>> are people's grandparents, senior folks who many never even learnt IP
>> networking beyond 192.168.0.0/24
>> <https://l.shortlink.es/l/740ea72b330efe5ec087cd010574b947eecf4e5e?u=2153471>
>>  if at all), these don't really make into the public forums/social
>> media. The above example isn't uncommon. I in fact, would prefer if more
>> NOC engineers who deal with this daily at far greater scale than myself,
>> were involved in these IETF mailing lists, the more operational insights
>> and data, the better for all of us here, less theory-only-on-paper, more
>> practical-backed data.
>>
>> Sorry, that doesn't answer my question. If we are just griping about
>>> IPv6, and not being specific about what's broken, that's not a good use of
>>> WG time.
>>>
>> I think so far in this email thread/chain, many of us have shared “what's
>> broken” — i.e. dynamic prefixes from ISP level as the base foundation of
>> the problem statement.
>>
>> So what I glean from this is that your IPv6 prefix changes more
>>> frequently than your IPv4 address. Otherwise, you would not see different
>>> behavior for IPv4—when your public IP address changes, there's nothing NAT
>>> can do to prevent the connection breaking.
>>>
>>> So why is that?
>>
>> In most ISP deployments, the CPE gets a static /32 address from the
>> 100.64.0.0/10
>> <https://l.shortlink.es/l/028d572b50ee331e48e1ca02538adb9419a4d027?u=2153471>
>>  range, it's statically assigned over RADIUS and in conjunction with
>> deterministic CGNAT, a permanent (nothing is forever permanent, but
>> “static” enough to be permanent) public IP:Port range is defined, meaning
>> that the mapping once defined doesn't change very often.
>>
>> So, something like this:
>> DFZ-facing PE<>Core<>CGNAT<>BNG<>P nodes<>PE<>OLT<>ONT/CPE<>End-user human
>>
>> ONT/CPE - 100.64.0.10
>> CGNAT config - 100.64.0.10 mapped for 1.1.1.1 public IP, port range
>> 3000-5000.
>>
>> What happens if mid-way connectivity breaks?
>> The DHCPv4 lease time is usually 24 hours + the RADIUS ensures it never
>> changes even if you reboot your CPE.
>>
>> Let's assume the MPLS transport between the OLT and the BNG breaks for
>> say 10 seconds (common in real-life residential world, it's not the same
>> thing as DIA/IPT/MEF carrier services segment). The CPE had a connection
>> flow on 100.64.0.10:9000
>> <https://l.shortlink.es/l/14cacef25425c39dddf093b8ee14a5e0f935edf6?u=2153471>
>>  (Src IP:Port), with dst 8.8.8.8:443
>> <https://l.shortlink.es/l/128063adfe1be80523e89062924cf841216563bc?u=2153471>.
>> The CGNAT box happened to map this session to 1.1.1.1:3001
>> <https://l.shortlink.es/l/5da224e72cbf885a2fea2960375ec3731f368d6f?u=2153471>,
>> say connection state TCP-established (or UDP-Stream=yes, a feature on
>> stateful tracking). All of a sudden connectivity is broken, well what
>> happens:
>> 1. The conn_track table entry on the CGNAT box is still there for this
>> session
>> 2. The conn_track table entry on the CPE is also still there for this
>> session
>> 3. Connectivity restored in 10 seconds
>> 4. Connection flow resumes — no changes occurred to public IP:Port source
>> IP (or “private” for that matter on the LAN).
>>
>> Of course this can vary based on applications (retry/kill the session
>> etc), but that's not the point. The point is IPv4/CGNAT is actually very
>> “statically” architected at ISP level, especially intended to ease law
>> enforcement requests (static mappings all over ensuring easier
>> tracking/tracing). This isn't the case with IPv6 PD, it literally changes
>> source IP every time.
>>
>> *--*
>> Best Regards
>> Daryll Swer
>> Website: daryllswer.com
>> <https://l.shortlink.es/l/4362e66a969d8aa30fddf6ed552b57740ba910fe?u=2153471>
>>
>>
>> On Fri, 5 Sept 2025 at 02:40, Edward Lemon <mellon@fugue.com> wrote:
>>
>>> On Sep 4, 2025, at 16:47, Daryll Swer <contact@daryllswer.com> wrote:
>>> > When the home LAN/endpoint uses the deprecated prefix as egress source
>>> address for Internet-bound traffic, it will anyway hit the uRPF filters on
>>> the BNG, and even if the ISP failed to deploy uRPF (Hint: The majority),
>>> then you are correct, it just blackholes on the return path and there goes
>>> my SSH session to my jump host while doing mission-critical work, welp,
>>> IPv4 looks more attractive.
>>>
>>> So what I glean from this is that your IPv6 prefix changes more
>>> frequently than your IPv4 address. Otherwise, you would not see different
>>> behavior for IPv4—when your public IP address changes, there's nothing NAT
>>> can do to prevent the connection breaking.
>>>
>>> So why is that?
>>>
>>> AVE!
>    Philipp S. Tiesel
>
> --
> Philipp S. Tiesel
> https://philipp.tiesel.net/
> <https://l.shortlink.es/l/cc8106ec8db2251e4a0b8f851e0c278f45a43106?u=2153471>
>
>