On Wed, Apr 27, 2016 at 01:16:28PM -0700, Aaron Hopkins wrote:
> On Wed, 27 Apr 2016, Baptiste Jonglez wrote:
> 
> >While doing statistics on the participants of a public DHT, I was
> >surprised to see some IP addresses that are not present in the DFZ:
> 
> I believe those are used by T-mobile's 464XLAT (RFC 6877) implementation.
> 
> Recent Android on T-mobile is IPv6-only and has no ability to connect to
> raw IPv4 addresses.  T-mobile's DNS servers are only asked by these devices
> to translate hostnames to IPv6 addresses.  If they can't find an IPv6
> address, they will look up the IPv4 address for a hostname, and pack it into
> the bottom 32 bits of an IPv6 address that routes to a IPv6-to-IPv4 NAT
> device.

Thanks, I had forgotten that DNS64 is possible without using the
well-known prefix.  The encoded IPv4 addresses seem to belong to other
peers of the DHT.

So, if this is basically DNS64/NAT64, these IP addresses should not be
seen as source or destination address outside of T-Mobile's network, and
are not attached to the interface of any device.

I can see two possible explanations:

1/ packets with src or dest IP in 2607:7700::/32 somehow escaped
   T-Mobile's network, without being translated back to IPv4.  They caused
   other DHT nodes to believe they have incoming peers in 2607:7700::/32.

2/ there is an interesting bug in the DHT software when run behind 464XLAT
   (btw, the DHT is dual-stack and supports IPv6 just fine)

I still wonder how this can happen, because the DHT does not use DNS at all...

Baptiste

Attachment: signature.asc
Description: PGP signature

Reply via email to