home tags events about login
one honk maybe more

benjojo posted 05 Jun 2025 10:38 +0000

New Blog!

There is lots of RFC1918 space out there, yet most people use the same 10 /24 subnets

I ended up having my OOB LAN collide with someones home network a few weeks ago, and decided to find a new subnet to use that won't collide backed up with actual usage data!


Picking uncontested private IP subnets with usage data

https://blog.benjojo.co.uk/post/picking-unused-rfc1918-ip-space

A radio communications mast, and text that says Picking uncontested private IP subnets with usage data

nmaggioni@mastodon.n.. replied 05 Jun 2025 14:43 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4

@benjojo Clever approach to an issue that's more common than most people think, thanks for publishing the data!

Have you considered the bias of users of obscure subnets not making themselves as easily noticeable from the outside than users of common ones, though? That's to say: wouldn't somebody that actively chose to place their network on a subnet that's among the more deserted ones also be less likely to publicly expose a WD Cloud-like device instead of, for example, using a dedicated VPN to access their LAN-only NAS and thus not showing up in your scans?

benjojo replied 05 Jun 2025 22:24 +0000
in reply to: https://mastodon.social/users/Oskar456/statuses/114632687377435779

@Oskar456 Still not everything is IPv6 compatible (for example, my ATS)

On top of that there is weird client behavior if you bring up a split horizon VPN with v6 connectivity when there is no v6 default route. I've been bitten by this a load of times, I am not keen on hitting these quirks in emergencies. v4 works, it's just NAT, I choose boring/life

tknarr@mstdn.social replied 05 Jun 2025 12:11 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4

@benjojo For the third octet in 192.168.0.0/16, 0 and 1 are the common consumer router defaults and 100 is commonly used by cable modems. I roll d256 and if I get one of those three I re-roll. 10.0.0.0/8 tends to be used by corporate systems and rarely by consumer gear so I roll d256 each for the second and third octets and re-roll on 0. It's served me well for decades since CIDR became the norm.

lw@mastodon.bsd.cafe replied 05 Jun 2025 12:56 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4

@benjojo

interesting data, but i fixed this by using 198.18.0.0/15 (benchmarking prefix, RFC2544) for my private legacy IP networks:

- it should never be used by CPE because it's not meant for that
- but it can also never be used on the Internet

i suppose this might still break if two people had the same idea, but then fix is to move to IPv6 :-)