From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id 1CFE43B29D; Thu, 26 Mar 2020 16:29:19 -0400 (EDT) Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id DC50738981; Thu, 26 Mar 2020 16:27:52 -0400 (EDT) Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 25471D03; Thu, 26 Mar 2020 16:29:18 -0400 (EDT) From: Michael Richardson To: Mark Andrews cc: "David P. Reed" , Rich Brown , "cerowrt-devel\@lists.bufferbloat.net" , "bloat\@lists.bufferbloat.net" In-Reply-To: <8B226A2B-3816-4C4C-BD28-5660544FA4A5@isc.org> References: <54620DA1-1B6B-456E-990E-3C99B6779887@gmx.de> <6C32AF17-015D-4771-8051-17BF1938C22C@gmail.com> <1584912664.72374374@apps.rackspace.com> <1585088915.30981517@apps.rackspace.com> <8B226A2B-3816-4C4C-BD28-5660544FA4A5@isc.org> X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 25.1.1 X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m Subject: Re: [Cerowrt-devel] [Bloat] OT: Netflix vs 6in4 from HE.net X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Mar 2020 20:29:19 -0000 --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mark Andrews wrote: > Netflix could just redirect requests from HE.NET address ranges to IP= v4 > only servers and that would solve the issue for all HE.NET customers. > This isn=E2=80=99t the case of attempting to circumvent GEOIP rules. = They can > detect that the connection is coming from a HE.NET address range, they > can easily install a redirect. Yeah. That's a good idea. Maybe even just 404 (maybe faster than host unreachable) even when you connect from an range they don't like, and make sure their client does Happ= y Eyeballs. Users and/or he.net could find a way to (optionally!) blackhole route netfl= ix IPv6, but that may be very hard to maintain that list. =2D- Michael Richardson , Sandelman Software Works -=3D IPv6 IoT consulting =3D- --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAl59EJ0ACgkQgItw+93Q 3WW6xwf/d4p4yDdoWBOAEGvGzPnT6X1amNkh2W+TfuHZAJLtQ0GNFR/RN+XVfmAL 8+OYMEaLsA2jvYsLjx/ZG6PF7Te2f7RS10gkv1CHQ8ABbqF0HXbb3PbMl3xHA1MJ dRy9+WhIxNh4KK4m4G3F4ccEH5ZNYxB3shK2Bs8c0kHGeIKHJR1oxF+wX12/DSVH lbSwHddEKYsuhOPMOM3uNY+g1Gbp+VLB7rQaHWoK7yN+3K/Z7H7SyyK2ztm+B6BN h3v4WqblLBFChL2J6nrQneraTMHU8ofQOSWs0Eaa0pOk8rzU4j3GfR7p+GEBz8iG afoJdr2GJNLWORUmprgSHS/O2jIEeg== =WDs5 -----END PGP SIGNATURE----- --=-=-=--