Re: [v6ops] How can one check the presence of IPv4aaS technologies? -- Re: draft-vf-v6ops-ipv6-deployment

otroan@employees.org Mon, 29 March 2021 13:47 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7F913A1306 for <v6ops@ietfa.amsl.com>; Mon, 29 Mar 2021 06:47:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XyW8bxj6blBe for <v6ops@ietfa.amsl.com>; Mon, 29 Mar 2021 06:47:18 -0700 (PDT)
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D51E3A1304 for <v6ops@ietf.org>; Mon, 29 Mar 2021 06:47:17 -0700 (PDT)
Received: from astfgl.hanazo.no (dhcp193287219.blix.com [193.28.7.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 17AFC4E11AD4; Mon, 29 Mar 2021 13:47:17 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 1BF9F5339784; Mon, 29 Mar 2021 15:47:13 +0200 (CEST)
From: otroan@employees.org
Message-Id: <A92E5E6C-5FF9-499B-A6EE-3811410546F6@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_C1EEAFFB-6A47-420D-AB4A-10714F793257"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\))
Date: Mon, 29 Mar 2021 15:47:12 +0200
In-Reply-To: <4b95e79a-6949-7f0f-1f38-518b8f30f778@hit.bme.hu>
Cc: v6ops@ietf.org
To: Lencse Gábor <lencse@hit.bme.hu>
References: <BL0PR05MB5316425C5650B5D2FE43DE4DAE6C9@BL0PR05MB5316.namprd05.prod.outlook.com> <CAB75xn4ioyzQ5AvUrPKVyuybjZRV__Tv1OMs70Lm-z9bo1Eo6g@mail.gmail.com> <74d6dca7019f44aba09caf47ef703e2f@huawei.com> <CAB75xn7=swhtwqRuV6SoWoMO7jtCcPCc02XiVpAjE=VUx8CyaQ@mail.gmail.com> <6059897e.1c69fb81.ac270.d863SMTPIN_ADDED_BROKEN@mx.google.com> <749643a7-313f-4bd1-8bb8-7dc26d830070@gmail.com> <605aae8f.1c69fb81.8a8ed.04b7SMTPIN_ADDED_BROKEN@mx.google.com> <35c4cf4f-0128-dff6-27a3-4cc868539f7f@gmail.com> <9614BF99-431D-4046-9762-0F111AFBB27D@consulintel.es> <a498117e-4834-41f8-5c90-ad7734d07220@hit.bme.hu> <e770fec1-2189-f683-6c74-36e32541c53d@gmail.com> <abe65114-d9c9-10ee-2c78-449051acbb61@hit.bme.hu> <3c50c72b-b606-a6cf-3095-f08ad48eecf5@gmail.com> <2A0C2B40-2DA4-4941-A09F-5BD31EDA3301@consulintel.es> <2e64b426-3a0a-b5f8-0306-005e9f1023d0@gmail.com> <72754d29-8b57-66fa-2b3a-fc6680c339f2@hit.bme.hu> <69744eb4-2f2e-6876-eba7-c439c5c4db9d@gmail.com> <4b95e79a-6949-7f0f-1f38-518b8f30f778@hit.bme.hu>
X-Mailer: Apple Mail (2.3654.60.0.2.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/aMql6Mz-bC5c0Tf7JcE1ezw6qpQ>
Subject: Re: [v6ops] How can one check the presence of IPv4aaS technologies? -- Re: draft-vf-v6ops-ipv6-deployment
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Mar 2021 13:47:21 -0000

> Of course, all five IPv4aaS technologies try to imitate the situation of carrier grade NAT for IPv4. The question is, whether the user can point out the fact the an IPv4aaS technology is used, and possibly also determine its kind.

While 464XLAT and DS-lite are based on CGNs that's not the intention nor implementation of MAP/LW46.

> Now, again, we may distinguish two cases:
> - If the user can observe the traffic on the outside (WAN) interface of the CPE (e.g. using tcpdump, tshark, etc.), then it is quite easy.
> - If the user cannot do that, then it is really interesting.
> 
> Can anyone recommend a suitable method for the second case?
> 
> Do you know such properties of the user side behavior (e.g. traffic pattern) of any of the 464XLAT, DSLITE, MAP-E, MAP-T or lw4o6 technologies that could indicate their presence?

Assuming you can also observe traffic on a outside host.

You can use various NAT detection techniques.
See if you see common bits between the users IPv6 address and the outside IPv4 address.
See if ports are restricted and try to identify the port allocation algorithm used.
Although the MAP PSID algorithm might also be used by NAT444 CGNs.
You can see if you get IP options or DF flag behaviour to detect translation.

It's going to be a bunch of heauristics thought.
Even the MTU difference between v4 (encapsulated or translated) and v6 could be masked by the ISP.

Cheers,
Ole