²Ô¾®¿Õ·¬ºÅѸÀ×Á´½Ó

    1. <form id=VHjPPVrdo><nobr id=VHjPPVrdo></nobr></form>
      <address id=VHjPPVrdo><nobr id=VHjPPVrdo><nobr id=VHjPPVrdo></nobr></nobr></address>

      *** Voting for the MeFiCoFo Board has begun! ***
      Oct. Site Rebuild Update | 10/5 Board Update | Sept. Site Update

      NO, REALLY, WE MEAN IT
      June 1, 2012 11:58 AM   Subscribe

      THIS TIME IT IS FOR REAL

      The Internet Society wants to remind you that THE FUTURE IS FOREVER. On or by June 6th, some major Internet sites and services will have permanently enabled their services over IPv6, including Google, YouTube, Facebook, Yahoo, Microsoft Bing, Netflix, and many others, thus helping complete a changeover started as far back as 1998.
      posted by Blazecock Pileon (78 comments total) 9 users marked this as a favorite
       
      IPv6 + June (6th month of the year) + 6th day of the month --> 666

      Wake up sheeple!
      posted by ZenMasterThis at 12:05 PM on June 1, 2012 [38 favorites]


      thus helping complete a changeover started as far back as 1998.

      It isn't complete if they're serving IPv4.
      posted by eriko at 12:05 PM on June 1, 2012


      They're never going to stop supporting ipv4, I don't think.
      posted by empath at 12:07 PM on June 1, 2012


      Will there be any observable changes for internet users after the switchover?
      posted by iamkimiam at 12:08 PM on June 1, 2012


      Just in time for Linux on the desktop.
      posted by tommasz at 12:08 PM on June 1, 2012 [21 favorites]


      I like the Internet and I wish it well in its future endeavors but phrases like THE FUTURE IS FOREVER creep me out.
      posted by Trurl at 12:10 PM on June 1, 2012 [2 favorites]


      Will there be any observable changes for internet users after the switchover?

      The internet will be perpetually CAPS LOCKED, FOREVER.
      posted by Blazecock Pileon at 12:11 PM on June 1, 2012 [7 favorites]


      Good, because I finally broke down and bought a new router today. Hooray I am ready.

      Of course the POS Trendnet gigabit router I have at work doesn't include IPV6 at all. And it's only 2 years old.
      posted by caution live frogs at 12:13 PM on June 1, 2012 [1 favorite]


      Oh man I am SO PUMPED about this!!! I can't wait to see what Netscape looks like now!
      posted by Marisa Stole the Precious Thing at 12:13 PM on June 1, 2012 [3 favorites]


      Recent related MeTa.
      posted by Chrysostom at 12:15 PM on June 1, 2012


      Will there be any observable changes for internet users after the switchover?

      Depends on how often you deal with ip addresses directly.

      The biggest change, from my point of view as a network engineer, is that you'll no longer need to NAT or use private ips in your home network. There are good and bad aspects to that, since a lot of people rely on NAT for network security.
      posted by empath at 12:17 PM on June 1, 2012 [2 favorites]


      Will there be any observable changes for internet users after the switchover?

      Yes. There will be wide variety of unexpected problems that will cause all of those services to destabilize for a few weeks. One or more of them will go back to IPv4 until they sort those issues out.

      Weather report calls for random annoyances followed by a 50% chance of corporate embarrassment.
      posted by Tell Me No Lies at 12:20 PM on June 1, 2012 [4 favorites]


      The biggest change, from my point of view as a network engineer, is that you'll no longer need to NAT or use private ips in your home network. There are good and bad aspects to that, since a lot of people rely on NAT for network security.

      I expect a class action suit against the first ISP to unilaterally turn off NAT for home users.
      posted by Tell Me No Lies at 12:20 PM on June 1, 2012


      And yes, it is really, really going to happen, because we are out of ip addresses. The ISP I worked for stopped getting new ones months ago, and we didn't have a whole lot left to give out before that. We finished configuring ipv6 on all of our core routers and switches just two or three months ago.

      We hadn't started handing out ipv6 addresses yet, though.

      I think the real problem is going to be training a million tech support people who barely know how to do a trace route how to use ipv6. That is going to be an absolute fucking nightmare. (and will guarantee employment for CCNA's for the next few years)
      posted by empath at 12:24 PM on June 1, 2012 [2 favorites]


      I expect a class action suit against the first ISP to unilaterally turn off NAT for home users.

      How do you imagine that they would even do that, and why do you think ISP's are responsible for their home user's NATs?
      posted by empath at 12:26 PM on June 1, 2012 [8 favorites]


      OBEY IPV6
      posted by dirigibleman at 12:31 PM on June 1, 2012


      Should I pull my money out of the bank and stockpile TP just to be safe?
      posted by sourwookie at 12:33 PM on June 1, 2012 [1 favorite]


      Let's be reasonable. Buy gold with the money, and bury it in your basement.
      posted by Marisa Stole the Precious Thing at 12:43 PM on June 1, 2012 [3 favorites]


      Should I pull my money out of the bank and stockpile TP just to be safe?

      Did you mean:

      Should I pull my money out of the bank and stockpile IPs just to be safe?
      posted by pmcp at 12:45 PM on June 1, 2012


      Cos I'm not sure it works like that.
      posted by pmcp at 12:46 PM on June 1, 2012


      There should be serious work being done, and it's like... nothing.

      So you're saying we should be CAPITALIZING on this?
      posted by Blazecock Pileon at 12:51 PM on June 1, 2012 [4 favorites]


      So, toddler's terms, how does this work for those of us who run a home network with NAT? Right now, I suspect, I'd just buy an IPv6/IPv4 hybrid thing, and run IP6 on the ISP side with an IPv4 private network. A NAT with IP6 translation.

      In the future, when all my devices go IPv6, how much dickery will I need to do? How will it be costed out? I've got near a dozen devices (computers, cell phones, media stramers, NAS, printers, etc...) some with permanent local network addresses, some not hanging off of my router. Will I need to get addresses individually for each from my ISP? Is that going to be automagic? Will I have to pay for extra connections?
      posted by bonehead at 12:53 PM on June 1, 2012


      How do you imagine that they would even do that, and why do you think ISP's are responsible for their home user's NATs?

      As far as I know the vast majority of home user do not run their own NAT. It's either being done at the ISP or its being done at the cable/dsl modem managed by the ISP at their home.

      I don't know about you, I pay extra each month to have a public IP address at home.
      posted by Tell Me No Lies at 12:53 PM on June 1, 2012


      Note to self: find out what the hell IPv6 might be and whether there is any conceivable chance it's something I should care about.

      At some point.

      Maybe right after I've finished this excellent Ardbeg.
      posted by Decani at 12:54 PM on June 1, 2012 [1 favorite]


      I DON'T UNDERSTAND WHAT'S HAPPENING AT ALL
      posted by Catchfire at 12:55 PM on June 1, 2012 [9 favorites]


      WILL THIS FIX EUROPE
      posted by TwelveTwo at 12:56 PM on June 1, 2012 [6 favorites]


      As far as I know the vast majority of home user do not run their own NAT. It's either being done at the ISP or its being done at the cable/dsl modem managed by the ISP at their home.

      The vast majority of home users have a router which does NAT for them. In some cases those routers are built-in to the ISP's modem or might be provided by the ISP itself, but there's plenty of people with their own router. If you think home NAT can somehow be done "at the ISP" then I don't know what you think NAT is.

      I don't know about you, I pay extra each month to have a public IP address at home.

      What does this have to do with NAT?

      posted by kmz at 1:00 PM on June 1, 2012


      As far as I know the vast majority of home user do not run their own NAT. It's either being done at the ISP or its being done at the cable/dsl modem managed by the ISP at their home.

      Some ISPs sometimes provide modems which also include router functionality, and have NAT on by default. The ISPs are in no way responsible for managing it, though. They give you a manual, for it, and you are on your own. Try getting an ISP to set up some NAT forwarding rules for you some time.

      And as far as doing NAT at the ISP level? Never. Maybe cell providers do it for mobile phones, or metro wireless companies, but it never, ever happens for DSL or cable providers.
      posted by empath at 1:01 PM on June 1, 2012 [1 favorite]


      Lucky I've still got my bunker stocked with stun guns and beef jerky from Y2K.
      posted by roger ackroyd at 1:04 PM on June 1, 2012 [1 favorite]


      Now that Duke Nukem Forever and Chinese Democracy are out, this is the logical next step.
      posted by inigo2 at 1:04 PM on June 1, 2012 [10 favorites]


      I don't know about you, I pay extra each month to have a public IP address at home.


      You sure it's not just a static address that you're paying for? I'm always assigned publicly routable addresses at home, but they change on me occasionally.
      posted by Nonsteroidal Anti-Inflammatory Drug at 1:09 PM on June 1, 2012 [2 favorites]


      Is there a Aztechnology Zen Brain Feng Shui center that can help me remove these hundreds of ipv4 addresses from my memory and remodel my memory habits to make these new ipv6 addressess easier to remember?
      posted by chambers at 1:18 PM on June 1, 2012


      Now that Duke Nukem Forever and Chinese Democracy are out, this is the logical next step.

      Diablo III was the logical next step. This is the next one after that.
      posted by The Bellman at 1:23 PM on June 1, 2012


      So, is there some non-geek, plain-english site where a regular home-user can go to research what, if anything, he might need to do to not get trumped-up by IPv6?

      For instance, my home network consists of a fairly old Moto Surfboard cable modem, feeding into an Airport Extreme, which in-turn broadcasts a wireless network to three Macs of varying age and OS versions. It's also hard-wired to an iMac and a printer (which it shares on the network). Of course, the Airport is the firewall.
      posted by Thorzdad at 1:28 PM on June 1, 2012


      You aren't going to have to do anything at all if you have a modern operating system and a router with up-to-date firmware.
      posted by empath at 1:29 PM on June 1, 2012


      And as far as doing NAT at the ISP level? Never. Maybe cell providers do it for mobile phones, or metro wireless companies, but it never, ever happens for DSL or cable providers.

      I know cell providers can do it, but I could have sworn at one point I was running a DSL modem in bridge mode and receiving DHCP 10.0.0.0 addresses over the WAN link.
      I don't know about you, I pay extra each month to have a public IP address at home.
      What does this have to do with NAT?


      It informs my suspicion that the ISP is handing out private addresses by default.

      You sure it's not just a static address that you're paying for? I'm always assigned publicly routable addresses at home, but they change on me occasionally.

      That's a good point, I set it up long enough ago that I don't remember the details.
      posted by Tell Me No Lies at 1:32 PM on June 1, 2012


      I don't know about you, I pay extra each month to have a public IP address at home.

      I don't think you quite understand how a router works. And pretty much everybody with an internet account has a public IP. You pay to get a static one.
      posted by yerfatma at 1:33 PM on June 1, 2012


      What about all the code out there that only groks IPv4?
      posted by Jestocost at 2:04 PM on June 1, 2012


      So, toddler's terms, how does this work for those of us who run a home network with NAT? Right now, I suspect, I'd just buy an IPv6/IPv4 hybrid thing, and run IP6 on the ISP side with an IPv4 private network. A NAT with IP6 translation.

      While it is technically possible to do this, to get the grunt to do it in a home router is unlikely.

      What is much more likely:

      You get a new router that can do both IPv6 and IPv4. Your ISP gives you one IPV4 address (either static or dynamic from a range) as per now. You also get a block of IPv6 addresses*; your router hands these out to your internal network. Windows, Linux and OSX have all supported IPv6 for years, and all have it turned on by default.

      So as soon as an IPv6 router shows up on your home network, all your devices get their own personal IPv6 address which is the same one inside and out - a Real IP, so to speak. No NAT needed. In fact, you'll get so many, that your devices will generate new random ones periodically using the Privacy Extensions, so external websites don't see the same IPv6 address all the time.

      Your computers will look on the internet when they look up a website address - say, www.google.com via DNS. If they get back an IPv6 address record, they'll connect over IPv6. If IPv6 isn't available, or they don't get an IPv6 DNS record back, they'll connect over IPv4. You won't notice the difference, until one day you look at your bittorrent client and suddenly realise you've got a whole bunch of peers directly connecting to you over IPv6 as without NAT fuckery it's a lot easier to get a direct connection.

      And any router manufacturer will turn on automatic blocking of unrequested traffic inbound on IPv6 using the stateful firewall built in, *just like they do with IPv4*.

      It's not NAT protecting you on a bog-standard router, it's the standard 'allow all traffic out, but only allow replies to that traffic back in' firewall, and that won't change with IPv6.


      * Now, the above is in an ideal world, where ISPs were on top of this years ago as the IPv4 addresses ran out, their techies are all trained up, and the router makers are churning out dual IPv6/IPv4 routers like no tomorrow.

      Unfortunately, none of that is true, and the ISPs are barely waking up to IPv6 at all, even now.

      So here's what's more likely to happen.

      You buy a new router. It doesn't have IPv6. So you take it back, and get an expensive one that does. Your ISP doesn't do IPv6, but has run out of IPv4 addresses so now they do carrier-grade NAT. You don't get a real IPv4 address on your router, but a non-globally-routable one.

      What this means is you're behind another router at the ISP, that has the real IPv4 address, and it's shared amongst a bunch of customers. Which means you don't have the ability to port forward any more, because you don't have a real IP. So that breaks:

      peer-to-peer traffic i.e. bittorrent.
      Xbox peer-to-peer gaming, i.e. most of it.
      PS3 peer-to-peer gaming.
      PC peer-to-peer gaming.
      Skype, and other peer-to-peer video traffic.
      VOIP phones.
      Using your own IPv6-in-IPv4 tunnel.

      Anything else that uses UPNP to open up inbound ports as needed to get round the NAT.

      Oddly enough, most of those are competing with the ISP's own services, such as voice, video calls, free copies of tv shows... So don't expect them to fix it.

      They will however sell you a premium service for twice the price, where you get a real IPv4 address. And businesses can get IPv6 too, but will pay an eye-watering price for it.

      The cell phone carriers have already been deploying carrier-grade i.e. ISP level NAT for some time, including filtering proxies to help lessen the load. I expect that technique to get far more common in the next couple of years on domestic ISPs as there basically no more IPs to allocate. The last blocks are filtering down through the ISPs, and when they're in the hands of end-users, that's it. There are no more.

      I expect the general end-user internet to get substantially more restrictive, rather than accept they have to deploy IPv6 at hefty cost now they've put it off so long. And as long as they can still visit facebook, most users won't care. I could be wrong. I hope I am. But I doubt it.
      posted by ArkhanJG at 2:12 PM on June 1, 2012 [10 favorites]


      A number of big providers, like Google, have tried turning IPv6 on for a day or two at a time for a few years now, to shake out the bugs and see what breaks. TTBOMK, fire has not rained from the sky.

      Will I need to get addresses individually for each from my ISP? Is that going to be automagic?

      The way it's supposed to work is, your ISP assigns each end user a fairly large subnet¡ª 264 addresses¡ª?and your devices autoconfigure themselves with addresses in that subnet using any of a variety of methods. I'm looking forward to ISPs finding a way to screw that up, though.

      Google turning on IPv6 addresses won't affect people who aren't intentionally using IPv6, unless and until their ISPs start sending IPv6 router advertisements down the DSL/cable links. And IPv4-only people won't have trouble until services stop making themselves available over IPv4, which I doubt they will choose to do for a long time.
      posted by hattifattener at 2:13 PM on June 1, 2012


      FWIW, I've got my own home IPv6 address block assigned via sixxs, and have had for a couple of years now. I'm running the AICCU client on my dlink router flashed with openWRT (I think DDWRT also now supports it), so it connects the IPv6 tunnel at boot, routes it over my IPv4 connection, and hands out IPv6 address to my internal network. All my computers get IPv6 and IPv6 private addresses, and my home fileserver has both IPv4 and IPv6 static addresses. Everything else is dynamic.

      It would have been a lot simpler if I had a fixed IPv4 address, then I could have just plugged my sixxs settings into my dlink stock firmware and have it all work automagically, but as my IPv4 external address changes every few hours, I needed the AICCU client.

      If I'd not been bothered about all the computers inside my network, I could have just run AICCU on one windows/osx/linux computer, and have that one get an IPv6 for itself only.

      The only time I really notice I have IPv6 is when connecting into my network from work (where I've also got IPv6 running), as I can connect to each machine directly with its own DNS address, rather than screw about with VPN, port forwarding or any of that rubbish. My home firewall would block it of course, but I've whitelisted certain ports coming from a small subset of the IPv6 addresses at work, i.e. the ones I'm using.

      I expect my ISP to support native IPv6 addresses roughly 5 minutes after hell freezes over.
      posted by ArkhanJG at 2:24 PM on June 1, 2012


      I don't think businesses or customers are going to be charged extra for ipv6 addresses. I think they'll be begging people to take them instead of ipv4 addresses. T1 and fiber customers will get them first because the edge routers already support it. I have a feeling a lot of dsl customers will not even have the option for a while because there are a LOT of ten year old or more dslams out there that don't support ipv6, and I bet a lot of them are end of life and may not even have a firmware upgrade available to add support. DSL isn't really supposed to touch layer 3, but a lot of dslams do ip filtering and so on, so there are probably going to be some compatibility problems.

      I don't know what the infrastructure at cable providers is like, though.
      posted by empath at 2:29 PM on June 1, 2012


      NAT goes away. All devices would receive public-routable v6 addresses.

      please, please, please, oh god, please, can we have our peer-to-peer internet back already!
      posted by Mars Saxman at 2:35 PM on June 1, 2012 [2 favorites]


      odinsdream wrote...
      I worked for a wireless ISP and we did carrier-level NAT. Yes, it was bad.

      Thanks odinsdream, I was beginning to think that *I* was dreaming it :-)

      I don't think you quite understand how a router works.

      It's possible. I did write networking code at cisco for ten years, starting with the communications servers that terminate all those residential devices and eventually moving into the IP routing group. But that was a while ago; Deployment strategies for residential service have undoubtedly moved on from schemes I was helping to create.
      posted by Tell Me No Lies at 3:10 PM on June 1, 2012


      NAT goes away. All devices would receive public-routable v6 addresses.
      please, please, please, oh god, please, can we have our peer-to-peer internet back already!


      Okay, but you probably won't like it. On average it takes 20 minutes for an unpatched Windows box on the internet to be compromised. Shorter than the time it takes to download the patches in other words.
      posted by Tell Me No Lies at 3:18 PM on June 1, 2012


      Okay, but you probably won't like it. On average it takes 20 minutes for an unpatched Windows box on the internet to be compromised. Shorter than the time it takes to download the patches in other words.

      Don't most (at least) major ISPs block those ports already?
      posted by junco at 3:22 PM on June 1, 2012


      0:0:0:0:0:ffff:3216:b10e: The plastic it's ok to like.
      posted by blue_beetle at 3:29 PM on June 1, 2012 [1 favorite]


      Okay, but you probably won't like it. On average it takes 20 minutes for an unpatched Windows box on the internet to be compromised. Shorter than the time it takes to download the patches in other words.

      a) That was true back with Windows XP pre SP2. SP1 introduced an included firewall. SP2 beefed it up, and more importantly, turned in on by default. That was in 2004, i.e. 8 years ago.
      It doesn't apply to Windows vista or 7, which also has a built in firewall turned on by default; it also has substantially less remote root vulnerabilities.

      b) No NAT does not mean no router firewall. It is hard to do NAT without one, as you need something to track the packets, but it is very easy to do a firewall without NAT. All Ipv6 routers I know of also have stateful firewalls included, and are turned on to block unexpected (i.e. non reply) packets by default.

      c) In fact, it'd be pretty tricky to give your 9 year old XP pre SP2 fresh install an IPv6 address in the first place, as it didn't have IPv6 included.

      d) And even with a modern OS, plugging it directly into your modem probably won't work anyway, as the ISP will be expecting you to take responsibility for a block of a few billion IPv6 addresses directly, and won't be handing them out on an individual basis using RADVD or the like, so without some significant manual configuration, you won't be getting an IPv6 address at all. So you'll use an IPv6 router, which will have a firewall.

      I wish the 'oh god, no NAT means we're all DOOMED' meme for IPv6 would just die. IPv6 has some drawbacks, but lack of NAT for most use-cases is definitely not one of them. It will also solve a ton of problems, and anyway - there is nothing else. IPv4 is almost out of address space, and our choices are significant deployment of carrier-grade NAT at the ISP level, or IPv6 in the next couple of years. Or we all just stop buying new smartphones, tablets and computers.

      Those are basically the choices. Hoping the problem will go away isn't an effective one.
      posted by ArkhanJG at 3:51 PM on June 1, 2012 [5 favorites]


      Oh, I forgot

      e) Your computer on IPv6 will have one of 18,446,744,073,709,551,616 IP addresses. That's a /64, the smallest unit recommend assigned to home users (and the smallest practical unit of addresses in IPv6).

      Good luck running a worm that attempts to connect to every single one of those to find that 9 year old XP machine that's just had the IPv6 patch manually added and is going on the internet for the first time without a router firewall but hasn't had a chance to connect to microsoft updates yet.

      And even if you're very very lucky lucky, that gets you 1 computer. Now go scan the next house. Don't worry, they'll have one of 18,446,744,073,709,551,616 addresses too. And since privacy extensions are on by default, the computer will be on a new one every couple of hours.
      posted by ArkhanJG at 3:59 PM on June 1, 2012 [7 favorites]


      Arkhan has it. The chance that an attacker (a) even finds your machine in the infinite sea of addresses, (b) gets through the default firewall in any non-unearthed-from-ancient-caverns version of Windows, and (c) does all this before Windows Update runs automatically is basically 0.

      Windows & Macs are at much much greater risk of trojans/malware than external hacks these days (probably always been true, but protecting against external attack via firewall/etc is much easier than convincing users not to install stupid shit).
      posted by wildcrdj at 4:38 PM on June 1, 2012


      Okay, but you probably won't like it.

      I promise you that I will very much like it, because it means that running servers on my own machines and doing simple things like ssh'ing in to machines at home when I'm at work will once again be practical and not something that requires hours of tinkering with whatever arcane configuration tool the chain of routers lined up between home and the public Internet happens to use.

      The patchedness or compromisability of Windows machines bothers me very little, since I have no Windows boxes to begin with. I understand that Windows people all run software "firewalls" and "virus protectors" anyway, so they should be fine, I suppose.
      posted by Mars Saxman at 4:55 PM on June 1, 2012 [1 favorite]


      I understand that Windows people all run software "firewalls" and "virus protectors" anyway

      Firewalls are not just a Windows thing, they are something any computer/network should have (either in the OS or the router, but leaving everything open is a bad idea on Mac/Linux as well).

      Macs have had plenty of exploitable vulnerabilities, while the number may be less than Windows thats not much comfort if you get exploited.

      Most people have a router with a built in firewall anyway, so this is something you don't have ot think about much.
      posted by wildcrdj at 5:16 PM on June 1, 2012


      wildcrdj, I know what a firewall is, I just don't consider a piece of software running on the same machine it is supposed to be protecting to be worth the name. The only firewall I would trust is one in a router. But I don't actually know anything about Windows software firewalls first-hand, so maybe there is some way to make them work - it just sounds goofy.
      posted by Mars Saxman at 6:52 PM on June 1, 2012


      Whatever happened to IPv5?
      posted by LastOfHisKind at 10:38 PM on June 1, 2012 [1 favorite]


      It doesn't apply to Windows vista or 7, which also has a built in firewall turned on by default; it also has substantially less remote root vulnerabilities.

      Here's the numbers from 2010. While it would be nice to believe that the situation has only gotten better as time has gone on and vulnerabilities have been patched, history has shown it doesn't always go that way.

      And since privacy extensions are on by default, the computer will be on a new one every couple of hours.

      Assuming that privacy extensions will be enabled on the home boxes -- and that they will be honored by hosts -- by default seems a bit of a leap. I believe we're going to see quite a few zero padded mac addresses as endpoints, and needless to say mac addresses are quite predictable.

      Watching my coworkers trying to get their drivers to play nice with the Windows 7 firewall has certainly increased my opinion of it, but I'm not sure I believe it's ready for prime time. Fortunately it sounds like Asia is going to have to go first anyway and we'll see what happens.

      IPv4 is almost out of address space, and our choices are significant deployment of carrier-grade NAT at the ISP level, or IPv6 in the next couple of years.

      Or we punt it for a few more years by reclaiming all of the Class A addresses now that CIDR is ubiquitous. Chop those puppies up responsibly and you can clear another 5 years easy. Brutal and ugly I know, but if large governments find their IPv6 conversions slipping there's all sorts of mischief they can get up to.
      posted by Tell Me No Lies at 10:42 PM on June 1, 2012


      This guy (PDF) (Fernando Gont, an Argentinian network expert, drafter of a few of the RFCs and one of the people hired by the UKCPNI to evaluate the UK's IPv6 preparedness) categorized as a "myth" the idea that larger address space will make finding other hosts much harder in a practical way.

      Delmoi and ArkhanJG made the nifty points in a thread last year that if everyone gets their own /64 block or thereabouts every single process on your system could have its own IP address or even every single HTTP request. It's the IPv4 equivalent of a solid gold toilet or using hundred dollar bills to light your cigar. Our cups runneth over with IP addresses.
      posted by XMLicious at 12:32 AM on June 2, 2012 [1 favorite]


      rkhan has it. The chance that an attacker (a) even finds your machine in the infinite sea of addresses, (b) gets through the default firewall in any non-unearthed-from-ancient-caverns version of Windows, and (c) does all this before Windows Update runs automatically is basically


      Filed away for future claim chowder, somewhere in 640K of RAM...
      posted by alex_skazat at 1:12 AM on June 2, 2012


      Our cups runneth over with IP addresses.

      Addresses yes, networks not so much. Whoever decided to blow 64 bits of the address on host numbers needs to be shot.
      posted by Tell Me No Lies at 1:13 AM on June 2, 2012


      But there's space for 18,446,744,073,709,551,616 /64 blocks, right? That's not enough networks?

      And that's just what's recommended. I read of an ISP that was just giving out /48 blocks to end users. So only 281,474,976,710,656 IP addresses. You would still need a pretty damn big cup for it to not overflow.
      posted by XMLicious at 1:31 AM on June 2, 2012


      Addresses yes, networks not so much. Whoever decided to blow 64 bits of the address on host numbers needs to be shot.

      Eh, not so much. with a 128 bit address space, using half for the routing and half for the client addresss makes it relatively simple to setup. And one thing they didn't do with IPv6 is think small.

      Let's say we give 7 billion people their own personal /64. Hell, let's give them 10 each. That's 70 billion /64s, and every person has 184 quintillion personal addresses. That should do for their personal nanobot cloud.

      So out of 18.446744073 quintillion possible /64 s.... we have 18.446744003 quintillion left. We can afford it, I think.
      posted by ArkhanJG at 3:23 AM on June 2, 2012 [2 favorites]


      It depends where you're coming from. By its nature subnetting wastes a lot of space, and it adds up fast.

      For example, at the moment I'm considering the problem of 200 sites with 4 million subnets each. So eight bits worth of sites and twenty-two bits worth of subnets.

      At 30 bits worth of subnets this scheme is barely going to fit into a /32. Worse, as a responsible engineer I think it would be wise to allocate at least another 12 bits for future proofing. We're going to need a /20 to do this right, which requires special dispensation (literally) from the powers that be.

      Now I'm not saying that you're going to run into this problem. All told there are probably only a few thousand people who will ever find themselves frustrated at how quickly you run out of subnets when you try to do something interesting. Speaking for those people however, whoever decided to waste 64 bits on endpoint addresses needs to be shot.
      posted by Tell Me No Lies at 10:22 AM on June 2, 2012


      18,446,744,073,709,551,616 addresses

      And if you somehow have the bandwidth to scan a gig (billion) of those every second, it'll take you 584 years and 202.538487 days to hit them all.
      posted by Twang at 10:23 AM on June 2, 2012


      Speaking for those people however, whoever decided to waste 64 bits on endpoint addresses needs to be shot.

      I think you probably aren't clear on how big a number 64 bits is. If every single person on earth is given a /64, that still leaves enough addresses for 7 billion more earths full of people. You've barely even touched the range of possible addresses. You'd have enough /64s to give one to every single grain of sand on the planet.
      posted by empath at 10:34 AM on June 2, 2012 [1 favorite]


      And if you somehow have the bandwidth to scan a gig (billion) of those every second, it'll take you 584 years and 202.538487 days to hit them all.

      Assuming they are uniformly distributed. If most addresses are in a known subrange, you can target your scanning there. I think, but I am not positive, that this is the situation that is described in the lecture notes in XMLicious' comment, and why IPv6 is not automatically safer, even with the larger pool of addresses.
      posted by Blazecock Pileon at 11:10 AM on June 2, 2012 [1 favorite]


      Speaking for those people however, whoever decided to waste 64 bits on endpoint addresses needs to be shot.
      I think you probably aren't clear on how big a number 64 bits is.


      I think we look at the prefix on /64s and see two different things. You see 2^64 networks, and I see 64 bits that need to be chopped into useful subcontainers.

      The first useful subcontainer is "what I can get assigned to me", and the largest allocation that is easily available is a /32. So realistically you can only get 2^32 potential networks, or in my terms 32 bits encode all of your layers of subnets.

      Of course over in IPv4 land I have already addressed this issue with a 10.0.0.0/24, which gave me -- let's say -- 20 bits to encode all of my layers of subnets.

      So I've gained twelve bits to organize my networks. I had 20, now I have 32. Whoopee. And particularly irksome when you realize it could have trivially been 64 instead of 32.

      -------------------

      People are very fond of tossing around powers of 2 when it comes to internet addressing, but I often feel they miss the practical aspects of the system. Addresses are routes to get somewhere, not just numbers; Having a hydrogen atom in Bali listed next to a gold atom on the beaches of Regulus 3 isn't going to work -- and by the time you've encoded Universe/Galaxy/Sector/Subsector/Quadrant/Star/Planet/Latitude,Longitude you'll have long since run out of the 64 bits IPv6 gives you.
      posted by Tell Me No Lies at 1:16 PM on June 2, 2012


      For example, at the moment I'm considering the problem of 200 sites with 4 million subnets each. So eight bits worth of sites and twenty-two bits worth of subnets.

      At 30 bits worth of subnets this scheme is barely going to fit into a /32. Worse, as a responsible engineer I think it would be wise to allocate at least another 12 bits for future proofing. We're going to need a /20 to do this right, which requires special dispensation (literally) from the powers that be.


      OK, that's a big network. Considering there's only 32 bits in the entire IPv4 network, and you've only got 24 bits for the largest non-routable address block for private LANs, that's gotta be a lot of address duplication in private VLANs.

      That many subnets in a single site makes sense in a IPv4 world, where address space in /24 or even /16 subnets is so limited - but I'm pretty sure such a site design is sub-optimal in the IPv6 world. Massive consolidation of subnets - in the extreme example, to a single /64 per site for users plus a few /64s for intra-router subnets etc would still give you more than enough addresses for every device trillions of times over, and won't cause the routers to explode by trying to use a /20 for internal addressing - if you could even get it, which seems unlikely!

      Ah, but security? stopping traffic routing between segments of the network? That's not the job of NAT, or the subnet space. It worked in IPv4 doing it that way - and I can see who you'd end up with that design - but having 4 million subnets in one site is a poor way of doing something that's better done with internal firewalling in an IPv6 world. The point of subnetting is a way to tell devices what is and isn't local traffic, not to determine access or not. A physical site is going to be at most a handful of /64s per building depending upon the LAN setup and even that is likely overkill.

      I mean you could start using /126 subnets with say DHCPv6 but it's the wrong way to solve the problem. As is trying to force the current IPv4 design into a IPv6 /32 or worse, a /20!
      posted by ArkhanJG at 1:59 PM on June 2, 2012


      Tell Me No Lies, am I misunderstanding something then - even being in control of the network at the highest level, you are not at liberty to decide to give end-users /32 blocks so that you can have the /64 for organizing that you want?
      posted by XMLicious at 2:18 PM on June 2, 2012


      Tell Me No Lies, am I misunderstanding something then - even being in control of the network at the highest level, you are not at liberty to decide to give end-users /32 blocks so that you can have the /64 for organizing that you want?

      I'm not sure I'm following you... Here's an IPv6 address as I experience it:
      +-------------------------------------------------+
      |         32 bits assigned by registrar           |               
      +-------------------------------------------------+
      |            32 bits I use to subnet              |  
      +-------------------------------------------------+
      |          Upper 32 bits of node address          |  
      +-------------------------------------------------+
      |          Lower 32 bits of node address          |  
      +-------------------------------------------------+
      
      There's no way for me to chew into the node address space if that's what you're asking...
      posted by Tell Me No Lies at 10:10 PM on June 2, 2012


      Yeah, I guess I was misunderstanding in thinking that the subdivision of the address space into subnets could use what you've labeled "node address" there.
      posted by XMLicious at 10:29 PM on June 2, 2012


      Yeah, unfortunately those are off-limits unless you want to start in on some serious ugliness.

      (not that I'm proud. ArkhanJG's DHCPv6 approach would allow you to unofficially chop up the lower 64 bits; If it didn't add too much complexity to the wrong part of our system it's the direction I would have taken things)
      posted by Tell Me No Lies at 10:41 PM on June 2, 2012


      It worked in IPv4 doing it that way - and I can see who you'd end up with that design

      Just to be clear my gloom and doom about the IPv4 to IPv6 transition has nothing to do with the pure IPv6 network layout I'm working on. I've only had this network layout problem a few months now; I've been talking doom and gloom about NAT removal for at least twelve years :-)

      Ah, but security? stopping traffic routing between segments of the network? That's not the job of NAT

      Agreed. NAT got drafted into firewall duty.

      ... or the subnet space.

      That bit confuses me a bit. To me it seems that network layout and firewall are both integral to security.
      posted by Tell Me No Lies at 11:28 PM on June 2, 2012


      ... or the subnet space. OK, to be fair that does need expanding on, and I will. Look, I'll be honest here. I'm not an IPv6 expert. I play one on the internet, and I've been working on IPv6 for the last couple of years to decide how to migrate my own network so I've got a decent working knowledge of it, but I'm not a specialist by any means. Nor do I know your network. Please don't take this next bit personally, it's honestly not meant as a slight - but I don't think you're an IPv6 expert either. Given the scale of the network you're dealing with, you would probably benefit from talking to one as a consultant or whatever.

      Much of what we know, our best practices from decades of IPv4 network design basically gets thrown out of the window when it comes to IPv6. It's trite, but it's pretty much an entirely different way of thinking about things.

      Anyway, so back to subnetting and routing. Fundamentally, all a subnet says to a machine is 'can I send this myself, or do I need to give it to a router to do it for me?'. Nothing more. Forcing machines to talk to the router becomes a convenient place to stick the firewall rules to block or allow traffic between different segments of the network, but it's not a fundamental requirement.

      If I was to hazard a guess on the network layout, it'd go something like this:

      You're using the 10.0.0.0/8 internal address space. That's been divided into a lot of subnets where each individual VLAN gets a /24 or 2^8, so 253 hosts per vlan effectively. Maybe a few with a slightly bigger subnet such as a /20 , but I'll assume a /24 is the standard subdivision. Each subnet maps to a vlan, each subnet has a default router which is probably the layer 3 switch. The layer 3 switches enforce via firewall rules which other subnets each vlan can talk to, which isn't most of them - most subnets are only allowed to route to a subset of other subnets where you have shared servers etc, but not to 'parallel' subnet with other clients in. Individual departments have their own personal servers, again enforced by the layer 3 firewalls so they're not accessible. You then have default gateways for the routers so that non-intranet traffic goes out to beefy routers to handle WAN and internet traffic.

      Now, with 200 sites, you'd need 8 bits to give each site it's own segment and to allow WAN traffic routing; which only leaves you 16 bits in the 10.0.0.0/8 space per site to play with; and 8 bits for client addresses means you only have 8 bits left for subnets, or 250 odd per site. So you end up with massive address duplication between sites; to give each site 4 million subnets, that's 22 bits out of 24 available leaving only 2 bits left for clients per subnet, which is what, 2 clients per subnet plus router plus broadcast, plus no place for intra-site routing (unless you use the 172.16/12 too?) so I'm struggling a bit on how that actually works.


      But let's retrench. Let's say you're allocated a single /48 IPv6 block. That's 256 /56s or 64k /64s. So each site gets a /56, each actual in use vlan/ipv4 subnet gets a /64, assuming you do have more than 2 machines in a given subnet and you've get less than 64k vlans actually in use across the whole network. Use stateless addressing or DHCPv6 per subnet, and then the routing map looks much like you're used to; each vlan gets a /64, and to get out of that subnet it has to talk to the switch router which then firewalls off each segment from each other. Shared devices (i.e. printers) specific to a subnet go inside the /64; shared devices outside a given subnet go in more /64s and so go via the layer 3 switch/firewall. Or you want to go bigger; each physical site gets a /48. That's 64k vlans per site; your whole network fits in a /40.

      But let's assume you're actually using 4 million active vlans per site. Those have got to be stupendous systems as the ones I use top out at 4k vlans!

      So what we do is separate vlans from subnets. we don't keep the 1-1 mapping. Use DHCPv6 and dhcp forwarding on the switches to assign a small subset of a /64 address space to each vlan, or even manual addressing - but each vlan still uses a /64 subnet because otherwise it's gonna go all pete tong.

      The devices think everything in that /64 is local and doesn't need to go to the router. But that's fine. We don't WANT the traffic shared between most vlans. That's why they're in separate vlans in the first place! So the devices will try to send it direct if it wants to, but it'll never get there as they're separated at the VLAN level. For simplicity, put the shared servers in separate /64s, and the clients will know to use the layer 3 switch gateway to get to those - put in firewall rules etc as per normal. Or put shared servers/printers for a given segment in the same vlan, and the clients will get to it on their own without needing to talk to the router at all.

      So we're not using subnetting to restrict traffic between segments; we're using physical separation of the vlans to do it for us. That's what I meant by network security - you only need to use subnets to tell clients when they need to talk to the router to get out of their own area. Physical separation, i.e. layer 2 vlans or physically separate switches, is what separates the network into segments, and always has. Adding layer 3 subnets that match the physical layout makes sense, but it is not necessary to do so.
      posted by ArkhanJG at 2:56 AM on June 3, 2012 [1 favorite]


      Please don't take this next bit personally, it's honestly not meant as a slight - but I don't think you're an IPv6 expert either.

      No slight taken. You've certainly hit that nail on the head :-)

      I read your analysis with interest, although I was dismayed to see DHCPv6 chopping up the /64 host address appear again. You would think 64 bits of network address would get us out of these problems!

      However, I think I may have misled you as to the nature of the problem I'm solving. I'm not doing a migration, it's a greenfield.

      I've been racking my brain for a way to talk about the issues involved without getting shot in the back by my CTO (startup executives are always so touchy) and here's what I've come up with. BTW, if you thought 4 million subnets was a lot, you may want to get out the oxygen mask :-)

      --------------------

      So, you and I are taking over AT&T operations and because we're nice people we're going to turn on tethering for all of our smartphones. Right now we only have 50 million out there but we should probably plan for 500 million total.

      Heady with the large numbers being thrown around about IPv6 we decide we're not doing dynamic anything. Every phone gets a /64 for a tethering network.

      However, given the terrible state of our backbone we are willing to compromise in one area: when the phones travel to different parts of the world we would like to give them addresses local to that area so we can route their IP traffic without having to tunnel it all the way back home. Since we're not feeling dynamic, the easiest way to do this would be to allocate every phone a locally routed /64 network at each of our main locations -- let's say there are 200 of them -- around the world.

      So it appears to me that if we want to pre-allocate everything (wasteful yes, but very desirable from a simplicity standpoint as moving parts are anathema when you've got hundreds of millions of users) we're going to need 200 * 500 million = 100 billion /64 networks.

      On one hand ... this is IPv6. What's 1011 (also known as 237) networks between friends?

      On the other hand, how do we organize all of these networks in a meaningful way? Obviously starting them with 8 bits of location data makes our top level routing decisions a lot easier. But beyond there it all gets a bit fuzzy for me.

      As you say IPv6 requires a different way of thinking. Do you have any ideas for how to approach this in an IPv6-ish fashion? Fortunately my problem will top out around 222 networks, but I suspect a lot of the principles will be the same.
      posted by Tell Me No Lies at 1:55 PM on June 3, 2012 [1 favorite]


      Why on earth would you not do that with dhcp?
      posted by empath at 5:29 PM on June 3, 2012


      I like simplicity. I can autocalculate all of my addresses, my L3 traffic/event logs are trivial to trace because my endpoints never change addresses. My GGSN can handle 1000 connections per/second without worrying about the DHCP server crapping out from the load.

      From a network stability and maintainability standpoint, it seems to me that adding dynamic allocation needs to offer some benefit to outweigh the extra complexity. I'm not sure I see the benefit in this particular situation?
      posted by Tell Me No Lies at 12:08 AM on June 4, 2012


      I am not a network engineer, but sometimes I need to translate their musings into English.
      The feedback I had from our large ISP IPv6 trial is two bugs were picked up in the router code (one Alcatel, one Cisco, one in a core, the other in a distribution edge). One was probably a memory leak as it only occurred after a reasonable time under load (several days) but the other was a straight up defect that caused network errors straight out of the box.
      Our customers running the trial are mainly ISPs in their own right, or government/large enterprise agencies with big IT staff. The message the engineer I was talking to gave was that IPv6 hasn't had enough testing in robust environments to be ready for prime time. He suggested the big (mainly academic/research) sites that are using 6 now aren't pushing the envelope in some of the areas commercial networks do.
      Quite apart from that, there is a whole heap of assurance work to do to make it all get along, for example upgrading reporting and rating platforms. So yeah, we will be able to offer IPv6 by the end of the year, it might have a bunch of rough edges compared to the nicely mature service offering in place for IPv4.
      posted by bystander at 3:56 AM on June 4, 2012


      To be fair I'm totally willing to take over the world of wired networks as well.
      posted by Tell Me No Lies at 6:33 PM on June 4, 2012


      Hmmm... Linode's Fremont servers are having horrendous network problems this morning. Given that they're hosted at Hurricane "Tunnel Broker" Electric I wonder if this is an indirect result of IPv6 day...
      posted by Tell Me No Lies at 12:42 PM on June 7, 2012


      « Older George Zimmerman's Bond Revoked in Trayvon Martin...   |   And a great anger was Nookd in the hearts of the... Newer »


      This thread has been archived and is closed to new comments




      ¡°Why?¡± asked Larry, in his practical way. "Sergeant," admonished the Lieutenant, "you mustn't use such language to your men." "Yes," accorded Shorty; "we'll git some rations from camp by this evenin'. Cap will look out for that. Meanwhile, I'll take out two or three o' the boys on a scout into the country, to see if we can't pick up something to eat." Marvor, however, didn't seem satisfied. "The masters always speak truth," he said. "Is this what you tell me?" MRS. B.: Why are they let, then? My song is short. I am near the dead. So Albert's letter remained unanswered¡ªCaro felt that Reuben was unjust. She had grown very critical of him lately, and a smarting dislike coloured her [Pg 337]judgments. After all, it was he who had driven everybody to whatever it was that had disgraced him. He was to blame for Robert's theft, for Albert's treachery, for Richard's base dependence on the Bardons, for George's death, for Benjamin's disappearance, for Tilly's marriage, for Rose's elopement¡ªit was a heavy load, but Caro put the whole of it on Reuben's shoulders, and added, moreover, the tragedy of her own warped life. He was a tyrant, who sucked his children's blood, and cursed them when they succeeded in breaking free. "Tell my lord," said Calverley, "I will attend him instantly." HoME²Ô¾®¿Õ·¬ºÅѸÀ×Á´½Ó ENTER NUMBET 0017
      yefffk.com.cn
      tongjila.com.cn
      www.erbi4.com.cn
      hojy.com.cn
      dcepvc.com.cn
      suli3.com.cn
      www.sixi5.com.cn
      www.guiyu5.net.cn
      miyin3.com.cn
      www.638576.org.cn
      成人图片四月色月阁 美女小美操逼 综合图区亚洲 苍井空的蓝色天空 草比wang WWW.BBB471.COM WWW.76UUU.COM WWW.2BQVOD.COM WWW.BASHAN.COM WWW.7WENTA.COM WWW.EHU8.COM WWW.XFW333.COM WWW.XF234.COM WWW.XIXILU9.COM WWW.0755MSX.NET WWW.DGFACAI.COM WWW.44DDYY.COM WWW.1122DX.COM WWW.YKB168.COM WWW.FDJWG.COM WWW.83CCCC.COM WWW.7MTP.COM WWW.NXL7.COM WWW.UZPLN.COM WWW.SEA0362.NET WWW.LUYHA.COM WWW.IXIAWAN.COM WWW.HNJXSJ.COM WWW.53PY.COM WWW.HAOYMAO.COM WWW.97PPP.COM 医网性交动态图 龙腾视频网 骚姐av男人天堂444ckcom wwwvv854 popovodcom sss色手机观看 淫荡之妇 - 百度 亚洲人兽交欧美A片 色妹妹wwwsemm22com 人妻激情p 狼国48Q 亚洲成人理论网 欧美男女av影片 家庭乱伦无需任何播放器在线播放 妩媚的尼姑 老妇成人图片大全 舔姐姐的穴 纯洁小处男 pu285ftp 大哥撸鲁鲁修 咪米色网站 丝袜美腿18P 晚上碰上的足交视频 avav9898 狠狠插影院免费观看所视频有电影 熟女良家p 50s人体 幼女av电影资源种子 小说家庭乱伦校园春色 丝袜美女做爱图片 影音先锋强奸影片 裸贷视频在线观 校园春色卡通动漫的 搜索wwwhuangtvcom 色妹影视 戊人网站 大阴茎男人性恋色网 偷拍自怕台湾妹 AV视频插进去 大胆老奶奶妈妈 GoGo全球高清美女人体 曼娜回忆录全文 上海东亚 舔柯蓝的脚 3344d最近十天更新 av在线日韩有码 强奸乱伦性爱淫秽 淫女谁 2233p 123aaaa查询 福利AV网站 世界黄色网址 弟姐撸人人操 婷婷淫色色淫 淫姐姐手机影院 一个释放的蝌蚪窝超碰 成人速播视频 爱爱王国 黄色一级片影视 夫妻主奴五月天 先锋撸撸吧 Xxoo88 与奶奶的激情 我和老女人美妙经历 淫妻色五月 zaiqqc 和姐姐互舔15p 色黄mp4 先锋2018资源 seoquentetved2k 嫩妹妹色妹妹干妹妹 欧美性爱3751www69nnnncom 淫男乱女小说 东方在线Av成人撸一撸 亚洲成人av伦理 四虎影视二级 3p性交 外国人妖口交性交黑人J吧插女人笔视观看 黑道总裁 人人x艹 美女大战大黑吊 神马电影伦理武则天 大鸡八插进的戏 爆操情人 热颜射国产 真实自拍足交 偷拍萝莉洗澡无码视频 哥哥狠狠射狠狠爱 欲体焚情搜狗 妹子啪啪网站 jizzroutn 平井绘里在线观看 肏男女 五月天逍遥社区 网站 私色房综合网成人网 男人和女人caobi 成人共享网站 港台三级片有逼吗 淫龙之王小说 惠美里大战黑人 我为美女姐姐口交 乱论色站 西田麻衣大胆的人体艺术 亚洲 包射网另类酷文在线 就爱白白胖胖大屁股在线播放 欧美淫妻色色色 奥蕾人艺术全套图片 台湾中学生门ed2k 2013国产幼门 WWW_66GGG_COM WWW_899VV_COM 中国老女人草比 qingse9 nvtongtongwaiyintou 哥哥妹妹性爱av电影 欧美和亚洲裸体做爱 肏胖骚屄 美国十此次先锋做爱影视 亚里沙siro 爆操人妻少妇 性交的骚妇 百度音影动漫美女窝骚 WWW_10XXOO_COM 哥两撸裸体图片 香洪武侠电影 胖美奈 我和女儿日屄 上海礼仪小姐 紫微斗数全书 优酷视频联盟 工作压力大怎么办 成人动漫edk 67ijcom WWW15NVNVCOM 东京热逼图 狠狠干自拍 第五色宗 少妇的b毛 t56人体艺术大胆人体模特 大黄狗与美女快播播放 美女露屄禁图 大胆内射少妇 十二种屄 苍井空绿色大战 WWWAFA789COM 淫老婆3p 橹二哥影院影视先锋 日本h动漫继母在线观看 淫乱村庄 强奸少妇采花魔 小泽玛莉亚乱伦电影 婷婷五月红成人网 我爱色洞洞 和老婆日屄图片 哪个网站能看到李宗瑞全集 操小姨的穴 白洁亚洲图片 亚洲色图淫荡内射美女 国外孕妇radio 哪本小说里有个金瓶经的拉完屎扣扣屁眼闻俩下 在线亚洲邪恶图 快播最新波哆野结依 wwwgigi22com 操紧身妹 丁香五月哥 欧美强奸幼童下载wwwgzyunhecom 撸波波rrr777 淫兽传 水淫穴 哥哥干巨乳波霸中文字幕 母子相奸AV视频录像 淫荡的制服丝袜妈妈 有强奸内容的小黄文 哪里艺术片 刘嘉玲人体艺术大胆写真 www婷婷五月天5252bocom 美女护士动态图片 教师制服诱惑a 黄色激情校园小说 怡红院叶子喋 棚户区嫖妓pronhub 肏逼微博 wwppcc777 vns56666com 色哥哥色妹妹内射 ww99anan 清纯秀气的学生妹喝醉 短头发撸碰 苍井空一级片tupian 够爽影院女生 鲁大娘久草 av淘之类的网站 谷露AV日本AV韩国AV 电台有声小说 丽苑春色 小泽玛利亚英语 bl动漫h网 色谷歌短片 免费成人电影 台湾女星综合网 美眉骚导航(荐) 岛国爱情动作片种子 兔牙喵喵在线观看影院 五月婷婷开心之深深爱一本道 动漫福利啪啪 500导航 自拍 综合 dvdes664影音先锋在线观看 水岛津实透明丝袜 rrav999 绝色福利导航视频 200bbb 同学聚会被轮奸在线视频 性感漂亮的保健品推销员上门推销套套和延迟剂时被客户要求当场实验效果操的 羞羞影院每日黄片 小黄视频免费观看在线播放 日本涩青视频 日本写真视频 日本女人大尺度裸体操逼视频 日韩电影网 日本正在播放女教师 在线观看国产自拍 四虎官方影库 男男a片 小武妈妈 人妻免费 视频日本 日本毛片免费视频观看51影院 波多野结衣av医院百度网盘 秋假影院美国影阮日本 1亚欧成人小视频 奇怪美发沙龙店2莉莉影院 av无码毛片 丝袜女王调教的网站有哪些 2499在线观视频免费观看 约炮少妇视频 上床A级片 美尻 无料 w字 主播小电影视频在线观看 自拍性porn 伦理片日本猜人电影 初犬 无码 特级毛片影谍 日日在线操小妹视频 日本无码乱论视频 kinpatu86 在线 欧美色图狠狠插 唐朝AV国产 校花女神肛门自慰视频 免费城人网站 日产午夜影院 97人人操在线视频 俺来也还有什么类似的 caopron网页 HND181 西瓜影音 阿v天堂网2014 秋霞eusses极速播放 柳州莫菁第6集 磁力链 下载丝袜中文字 IPZ-694 ftp 海牙视频成人 韩国出轨漫画无码 rbd561在线观看 色色色 magnet 冲田杏梨爆乳女教师在线 大桃桃(原蜜桃Q妹)最新高清大秀两套6V XXX日本人体艺术三人 城市雄鹰。你个淫娃 久久最新国产动漫在线 A级高清免费一本道 人妻色图 欧美激情艳舞视频 草莓在线看视频自拍 成电人影有亚洲 ribrngaoqingshipin 天天啪c○m 浣肠video在线观看 天堂av无码av欧美av免费看电影 ftxx00 大香蕉水 吉里吉里电影网 日本三级有码视频 房事小视频。 午午西西影院 国内自拍主播 冲田爱佳 经典拳交视频最新在线视频 怡红影晥免费普通用户 青娱乐综合在线观看 藏经阁成人 汤姆影视avtom wwWff153CoM 一本道小视频免费 神马影影院大黄蜂 欧美老人大屁股在线 四级xf 坏木啪 冲田杏梨和黑人bt下载 干莉莉 桃乃木香奈在线高清ck 桑拿888珠海 家庭乱伦视频。 小鸟酱自慰视频在线观看 校园春色 中文字幕 性迷宫0808 迅雷资源来几个 小明看看永久免费视频2 先锋hunta资源 国产偷拍天天干 wwwsezyz4qiangjianluanlun 婷婷五月社区综合 爸爸你的鸡巴太大轻点我好痛 农村妇女买淫视屏 西瓜网赤井美月爆乳女子在校生 97无码R级 日本图书馆暴力强奸在线免费 巨乳爱爱在线播放 ouzouxinjiao 黄色国产视频 成人 自拍 超碰 在线 腿绞论坛 92福利电影300集 人妻x人妻动漫在线 进入 91视频 会计科目汇总表人妻x人妻动漫在线 激情上位的高颜值小少妇 苹果手机能看的A片 一本道av淘宝在线 佐藤美纪 在线全集 深夜成人 国内自拍佛爷在线 国内真实换妻现场实拍自拍 金瓶梅漫画第九话无码 99操人人操 3737电影网手机在线载 91另类视频 微兔云 (指甲油) -(零食) ssni180迅雷中字 超清高碰视频免费观看 成人啪啪小视频网址 美女婶婶当家教在线观看 网红花臂纹身美女大花猫SM微拍视频 帅哥美女搞基在床上搞的视频下载东西 日本视频淫乱 av小视频av小电影 藤原辽子在线 川上优被强奸电影播放 长时间啊嗯哦视频 美女主播凌晨情趣套装开车,各种自·慰加舞技 佳色影院 acg乡村 国产系列欧美系列 本土成人线上免费影片 波罗野结衣四虎精品在线 爆乳幼稚园 国产自拍美女在线观看免插件 黑丝女优电影 色色的动漫视频 男女抽插激情视频 Lu69 无毛伦理 粉嫩少妇9P 欧美女人开苞视频 女同a级片 无码播放 偷拍自拍平板 天天干人人人人干 肏多毛的老女人 夜人人人视频 动漫女仆被揉胸视频 WWW2018AVCOM jizzjizzjizz马苏 巨乳潜入搜查官 藤浦惠在线观看 老鸹免费黄片 美女被操屄视频 美国两性 西瓜影音 毛片ok48 美国毛片基地A级e片 色狼窝图片网 泷泽乃南高清无码片 热热色源20在线观看 加勒比澳门网 经典伦理片abc 激情视频。app 三百元的性交动画 97爱蜜姚网 雷颖菲qq空间 激情床戏拍拍拍 luoli hmanh 男人叉女人视频直播软件 看美女搞基哪个app好 本网站受美坚利合众国 caobike在线视频发布站 女主播电击直肠两小时 狠狠干高清视频在线观看 女学生被强奸的视频软件 欧美喷水番号 欧美自拍视频 武侠古典伦理 m13113美女图片 日本波多野结衣三级无马 美女大桥AV隐退 在线中文字幕亚洲欧美飞机图 xxx,av720p iav国产自拍视频 国内偷拍视频在线 - 百度 国歌产成人网 韩国美女主播录制0821 韩国直播av性 fyeec日本 骚逼播放 偷拍你懂的网站 牡蛎写真视频 初川南个人资源 韩国夏娃 ftp 五十度飞2828 成人区 第五季 视频区 亚洲日韩 中文字幕 动漫 7m视频分类大全电影 动漫黄片10000部免费视频 我骚逼丝袜女网友给上了 日本女人的性生活和下水道囧图黄 肏婶骚屄 欧美美女性爰图 和美女明星做爱舒服吗 乱伦小说小姨 天天舅妈 日本极品淫妇美鲍人体艺术 黄色录像强奸片 逍遥仙境论坛最新地址 人插母动物 黄s页大全 亚洲无码电影网址 幼女乱伦电影 雯雅婷30p caopran在线视频 插b尽兴口交 张佰芝yinbu biantaicaobitupian 台湾18成人电影 勾引同学做爱 动态性交姿势图 日本性交图10p 操逼动态图大全 国产后入90后 quanjialuanlun 裸女条河图片种子 坚挺的鸡吧塞进少妇的骚穴 迅雷亚洲bt www56com 徐老板去农村玩幼女小说故事 大尺度床吻戏大全视频 wwwtp2008com 黑丝大奶av 口述与爸爸做爱 人兽完全插入 欧美大乳12p 77hp 教师 欧美免费黄色网 影音先锋干女人逼 田中瞳无码电影 男人与漂亮的小母 在线观看 朴妮唛骚逼 欧美性感骚屄浪女 a片马干人 藤原绘里香电影 草草逼网址 www46xxxcn 美女草屄图 色老太人体艺网 男人的大阴茎插屄 北京违章车辆查询 魅影小说 滨岛真绪zhongzi 口比一级片 国产a片电影在线播放 小说我给男友刮毛 做爱视屏 茜木铃 开心四色播播网影视先锋 影音先锋欧美性爱人与兽 激情撸色天天草 插小嫚逼电影 人与动物三客优 日本阴部漫画美女邪恶图裸体护士美女露阴部 露屄大图 日韩炮图图片 欧美色图天天爱打炮 咪咕网一路向西国语 一级激情片 我爱看片av怎么打不开 偷拍自拍影先锋芳芳影院 性感黑丝高跟操逼 女性阴部摄影图片 自拍偷拍作爱群交 我把大姨给操了 好色a片 大鸡吧黄片 操逼和屁眼哪个爽 先生肉感授业八木梓 国产电影色图 色吧色吧图片 祖母乱伦片 强悍的老公搞了老婆又搞女儿影音先锋 美女战黑人大鸟五月 我被大鸡吧狂草骚穴 黄狗猪性交妇 我爱少女的逼 伦理苍井空百度影音 三姨妈的肥 国产成人电影有哪些 偷拍自拍劲爆欧美 公司机WWW日本黄色 无遮挡AV片 sRAV美女 WLJEEE163com 大鸡巴操骚12p 我穿着黑丝和哥哥干 jiujiucaojiujiucao 澳门赌场性交黄色免费视频 sifangplanxyz 欧美人兽交asianwwwzooasiancomwwwzootube8com 地狱少女新图 美女和黄鳝xxx doingit电影图片 香港性爱电影盟 av电影瑜伽 撸尔山乱伦AV 天天天天操极品好身材 黑人美女xxoo电影 极品太太 制服诱惑秘书贴吧 阿庆淫传公众号 国产迟丽丽合集 bbw热舞 下流番号 奥门红久久AV jhw04com 香港嫩穴 qingjunlu3最新网 激情做爱动画直播 老师大骚逼 成人激情a片干充气娃娃的视频 咪图屋推女郎 AV黄色电影天堂 aiai666top 空姐丝袜大乱11p 公公大鸡巴太大了视频 亚洲午夜Av电影 兰桂坊女主播 百度酷色酷 龙珠h绿帽 女同磨豆腐偷拍 超碰男人游戏 人妻武侠第1页 中国妹妹一级黄片 电影女同性恋嘴舔 色秀直播间 肏屄女人的叫声录音 干她成人2oP 五月婷婷狼 那里可以看国内女星裸照 狼友最爱操逼图片 野蛮部落的性生活 人体艺术摄影37cc 欧美色片大色站社区 欧美性爱喷 亚洲无码av欧美天堂网男人天堂 黑人黄色网站 小明看看主 人体艺术taosejiu 1024核工厂xp露出激情 WWWDDFULICOM 粉嫩白虎自慰 色色帝国PK视频 美国搔女 视频搜索在线国产 小明算你狠色 七夜郎在线观看 亚洲色图欧美色图自拍偷拍视频一区视频二区 pyp影yuan 我操网 tk天堂网 亚洲欧美射图片65zzzzcom 猪jb 另类AV南瓜下载 外国的人妖网站 腐女幼幼 影音先锋紧博资源 快撸网87 妈妈5我乱论 亚洲色~ 普通话在线超碰视频下载 世界大逼免费视频 先锋女优图片 搜索黄色男的操女人 久久女优播免费的 女明星被P成女优 成人三级图 肉欲儿媳妇 午夜大片厂 光棍电影手机观看小姨子 偷拍自拍乘人小说 丝袜3av网 Qvodp 国产女学生做爱电影 第四色haoav 催眠赵奕欢小说 色猫电影 另类性爱群交 影像先锋 美女自慰云点播 小姨子日B乱伦 伊人成人在线视频区 干表姐的大白屁股 禁室义母 a片丝袜那有a片看a片东京热a片q钬 香港经典av在线电影 嫩紧疼 亚洲av度 91骚资源视频免费观看 夜夜日夜夜拍hhh600com 欧美沙滩人体艺术图片wwwymrtnet 我给公公按摩 吉沢明涉av电影 恋夜秀晨间电影 1122ct 淫妻交换长篇连载 同事夫妇淫乱大浑战小说 kk原创yumi www774n 小伙干美国大乳美女magnet 狗鸡巴插骚穴小说 七草千岁改名微博 满18周岁可看爱爱色 呱呱下载 人妻诱惑乱伦电影 痴汉图书馆5小说 meinvsextv www444kkggcom AV天堂手机迅雷下载 干大姨子和二姨子 丝袜夫人 qingse 肥佬影音 经典乱伦性爱故事 日日毛资源站首页 美国美女裸体快播 午夜性交狂 meiguomeishaonvrentiyishu 妹妹被哥哥干出水 东莞扫黄女子图片 带毛裸照 zipailaobishipin 人体艺术阴部裸体 秘密 强奸酒醉大奶熟女无码全集在线播放 操岳母的大屄 国产少妇的阴毛 影音先锋肥熟老夫妻 女人潮吹视频 骚老师小琪迎新舞会 大奶女友 杨幂不雅视频种子百度贴吧 53kk 俄罗斯骚穴 国模 露逼图 李宗瑞78女友名单 二级片区视频观看 爸爸妈妈的淫荡性爱 成人电影去也 华我想操逼 色站图片看不了 嫖娼色 肛交lp 强奸乱伦肏屄 肥穴h图 岳母 奶子 妈妈是av女星 淫荡性感大波荡妇图片 欧美激情bt专区论坛 晚清四大奇案 日啖荔枝三百颗作者 三国防沉迷 印度新娘大结局 米琪人体艺术 夜夜射婷婷色在线视频 www555focom 台北聚色网 搞穴影音先锋 美吻影院超体 女人小穴很很日 老荡妇高跟丝袜足交 越南大胆室内人体艺术 翔田千里美图 樱由罗种子 美女自摸视频下载 香港美女模特被摸内逼 朴麦妮高清 亚寂寞美女用手指抠逼草莓 波多野结衣无码步兵在线 66女阴人体图片 吉吉影音最新无码专区 丝袜家庭教师种子 黄色网站名jane 52av路com 爱爱谷色导航网 阳具冰棒 3334kco 最大胆的人体摄影网 哥哥去在线乱伦文学 婶婶在果园里把我了 wagasetu 我去操妹 点色小说激 色和哥哥 吴清雅艳照 白丝护士ed2k 乱伦小说综合资源网 soso插插 性交抽插图 90后艳照门图片 高跟鞋97色 美女美鲍人体大胆色图 熟女性交bt 百度美女裸体艺术作品 铃木杏里高潮照片图 洋人曹比图 成人黄色图片电影网 幼幼女性性交 性感护士15p 白色天使电影 下载 带性视频qq 操熟女老师 亚洲人妻岛国线播放 虐待荡妇老婆 中国妈妈d视频 操操操成人图片 大阴户快操我 三级黄图片欣赏 jiusetengmuziluanlun p2002午夜福 肉丝一本道黑丝3p性爱 美丽叔母强奸乱伦 偷拍强奸轮奸美女短裙 日本女人啪啪网址 岛国调教magnet 大奶美女手机图片 变态强奸视频撸 美女与色男15p 巴西三级片大全 苍井空点影 草kkk 激情裸男体 东方AV在线岛国的搬运工下载 青青草日韩有码强奸视频 霞理沙无码AV磁力 哥哥射综合视频网 五月美女色色先锋 468rccm www色红尘com av母子相奸 成人黄色艳遇 亚洲爱爱动漫 干曰本av妇女 大奶美女家教激情性交 操丝袜嫩b 有声神话小说 小泽玛利亚迅雷 波多野结衣thunder 黄网色中色 www访问www www小沈阳网com 开心五月\u0027 五月天 酒色网 秘密花园 淫妹影院 黄黄黄电影 救国p2p 骚女窝影片 处女淫水乱流 少女迷奸视频 性感日本少妇 男人的极品通道 色系军团 恋爱操作团 撸撸看电影 柳州莫菁在线视频u 澳门娱银河成人影视 人人莫人人操 西瓜视频AV 欧美av自拍 偷拍 三级 狼人宝鸟视频下载 妹子漏阴道不打码视频 国产自拍在线不用 女牛学生破处視频 9877h漫 七色沙耶香番号 最新国产自拍 福利视频在线播放 青青草永久在线视频2 日本性虐电影百度云 pppd 481 snis939在线播放 疯狂性爱小视频精彩合集推荐 各种爆操 各种场所 各式美女 各种姿势 各式浪叫 各种美乳 谭晓彤脱黑奶罩视频 青青草伊人 国内外成人免费影视 日本18岁黄片 sese820 无码中文字幕在线播放2 - 百度 成语在线av 奇怪美发沙龙店2莉莉影院 1人妻在线a免费视频 259luxu在线播放 大香蕉综合伊人网在线影院 国模 在线视频 国产 同事 校园 在线 浪荡女同做爱 healthonline899 成人伦理 mp4 白合野 国产 迅雷 2018每日在线女优AV视频 佳AV国产AV自拍日韩AV视频 色系里番播放器 有没有在线看萝莉处女小视频的网站 高清免费视频任你搞伦理片 温泉伦理按摸无码 PRTD-003 时间停止美容院 计女影院 操大白逼baby操作粉红 ak影院手机版 91老司机sm 毛片基地成人体验区 dv1456 亚洲无限看片区图片 abp582 ed2k 57rrrr新域名 XX局长饭局上吃饱喝足叫来小情人当众人面骑坐身上啪啪 欲脱衣摸乳给众人看 超震撼 处女在线免费黄色视频 大香巨乳家政爱爱在线 吹潮野战 处女任务坉片 偷拍视频老夫妻爱爱 yibendaoshipinzhaixian 小川阿佐美再战 内人妻淫技 magnet 高老庄八戒影院 xxxooo日韩 日韩av12不卡超碰 逼的淫液 视频 黎明之前 ftp 成人电影片偷拍自拍 久久热自拍偷在线啪啪无码 2017狼人干一家人人 国产女主播理论在线 日本老黄视频网站 少妇偷拍点播在线 污色屋在线视频播放 狂插不射 08新神偷古惑仔刷钱BUG 俄罗斯强姦 在线播放 1901福利性爱 女人59岁阴部视频 国产小视频福利在线每天更新 教育网人体艺术 大屁股女神叫声可射技术太棒了 在线 极品口暴深喉先锋 操空姐比 坏木啪 手机电影分分钟操 jjzyjj11跳转页 d8视频永久视频精品在线 757午夜视频第28集 杉浦花音免费在线观看 学生自拍 香蕉视频看点app下载黄色片 2安徽庐江教师4P照片 快播人妻小说 国产福二代少妇做爱在线视频 不穿衣服的模特58 特黄韩国一级视频 四虎视频操逼小段 干日本妇妇高清 chineseloverhomemade304 av搜搜福利 apaa-186 magnet 885459com63影院 久久免费视怡红院看 波多野结衣妻ネトリ电影 草比视频福利视频 国人怡红院 超碰免费chaopeng 日本av播放器 48qa,c 超黄色裸体男女床上视频 PPPD-642 骑马乳交插乳抽插 JULIA 最后是厉害的 saob8 成人 inurl:xxx 阴扩 成八动漫AV在线 shawty siri自拍在线 成片免费观看大香蕉 草莓100社区视频 成人福利软件有哪些 直播啪啪啪视频在线 成人高清在线偷拍自拍视频网站 母女午夜快播 巨乳嫩穴影音先锋在线播放 IPZ-692 迅雷 哺乳期天天草夜夜夜啪啪啪视频在线 孩子放假前与熟女的最后一炮 操美女25p freex性日韩免费视频 rbd888磁力链接 欧美美人磁力 VR视频 亚洲无码 自拍偷拍 rdt在线伦理 日本伦理片 希崎杰西卡 被迫服从我的佐佐凌波在线观看 葵つか步兵在线 东方色图, 69堂在线视频 人人 abp356百度云 江媚玲三级大全 开心色导 大色哥网站 韩国短发电影磁力 美女在线福利伦理 亚洲 欧美 自拍在线 限制级福利视频第九影院 美女插鸡免得视频 泷泽萝拉第四部第三部我的邻居在线 色狼窝综合 美国少妇与水电工 火影忍者邪恶agc漫画纲手邪恶道 近亲乱伦视频 金卡戴珊视频门百度云 极虎彯院 日本 母乳 hd 视频 爆米花神马影院伦理片 国产偷拍自拍丝袜制服无码性交 璩美凤光碟完整版高清 teen萝莉 国产小电影kan1122 日日韩无码中文亚洲在线视频六区第6 黄瓜自卫视频激情 红番阔午夜影院 黄色激情视频网视频下载 捆梆绳模羽洁视频 香蕉视频页码 土豆成人影视 东方aⅴ免费观看p 国内主播夫妻啪啪自拍 国内网红主播自拍福利 孩子强奸美女软件 廿夜秀场面业影院 演员的诞生 ftp 迷奸系列番号 守望人妻魂 日本男同调教播放 porn三级 magnet 午夜丁香婷婷 裸卿女主播直播视频在线 ac制服 mp4 WWW_OSION4YOU_COM 90后人体艺术网 狠狠碰影音先锋 美女秘书加班被干 WWW_BBB4444_COM vv49情人网 WWW_XXX234_COM 黄色xxoo动态图 人与动物性交乱伦视频 屄彩图