Matt Harris|Infrastructure Lead 816-256-5446|Direct Looking for help? Helpdesk|Email Support We build customized end-to-end technology solutions powered by NetFire Cloud. On Sun, Jan 30, 2022 at 7:07 PM Töma Gavrichenkov <xima...@gmail.com> wrote:
> Peace, > > On Thu, Jan 27, 2022, 4:38 PM Smahena Amakran <smahenamak...@gmail.com> > wrote: > >> For my studies, I am researching IPv6 adoption. >> > > For your consideration, there's one thing that's always overlooked. > > E.g. I've been talking once to a big employee of a large content provider, > and that person told me they don't enable IPv6 because doing otherwise > produces tons of comment spam. > > The thing is, we have this spam problem. This is not really the > "information security issue" you've mentioned, this is just a glimpse of a > real issue. > > IPv6 is now cheap as chips. It's very dirty therefore. All kinds of bots, > spammers, password brute force programs live in there, and it's > significantly harder to correlate and ditch these with the sparse IPv6 > address space. > > ISPs don't typically focus on these kinds of things but ISPs, speaking of > large ones, are also typically champions in IPv6 deployment. It's usually > content providers who don't do their stuff. And, as sad as it gets, it's > not getting away any time soon since it's there for a reason. > Have you tried treating a /64 in IPv6 in the same way that you'd treat a /32 in IPv4 (and thusly, a /32 in IPv6 in the same way you'd treat larger IPv4 blocks targeting bad provider space, etc?) rather than fighting every /128? This seems to be a pretty common practice that has worked for others in dealing with abuse issues on IPv6. - mdh