New Blog! There is lots of RFC1918 space out there, yet most people use the same 10 /24 subnets I ended up having my OOB LAN collide with someones home network a few weeks ago, and decided to find a new subnet to use that won't collide backed up with actual usage data! https://blog.benjojo.co.uk/post/picking-unused-rfc1918-ip-space
Picking uncontested private IP subnets with usage data
erincandescent@akko...
replied 05 Jun 2025 11:01 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo I've sometimes wondered if the best way to avoid this problem is to squat one of the documentation networks. Or the benchmarking one
benjojo
replied 05 Jun 2025 11:02 +0000
in reply to: https://akko.erincandescent.net/objects/3f3d3740-e048-42af-a292-04b43349d208
@erincandescent until someone later on tries to run a test inside your network using the doc prefix as a "safe test" :P
lanodan@queer.hackti..
replied 05 Jun 2025 11:07 +0000
in reply to: https://akko.erincandescent.net/objects/f1a9350c-e60e-4137-8b37-e9a923d75f81
grawity@social.treeh..
replied 05 Jun 2025 11:14 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/285qtnWCf397P7wNVh
@benjojo @erincandescent my "I'm only half joking" suggestion is 240.0.0.0/4, hardly anyone is going to run tests on that it'll probably work with Linux-based BMCs? has the advantage that Windows hosts politely refuse to send packets there, but has the disadvantage that Cisco routers also refuse to send packets there
nblr@chaos.social
replied 05 Jun 2025 11:29 +0000
in reply to: https://akko.erincandescent.net/objects/3f3d3740-e048-42af-a292-04b43349d208
@erincandescent @benjojo
Something out of 100.64.0.0/10 would be a somewhat reasonable choice. (avoid 100.100.0.0/16 though as it's the obvious choice)
erincandescent@akko...
replied 05 Jun 2025 12:01 +0000
in reply to: https://chaos.social/users/nblr/statuses/114630521631624083
neverpanic@chaos.soc..
replied 05 Jun 2025 13:16 +0000
in reply to: https://chaos.social/users/nblr/statuses/114630521631624083
timezone@chaos.socia..
replied 05 Jun 2025 17:25 +0000
in reply to: https://chaos.social/users/neverpanic/statuses/114630943664103849
@neverpanic @nblr @erincandescent @benjojo yes, it does. this can cause weird problems if you're on a network where the dhcp server hands out addresses in that range. i ran into this a few times and then decided to renumber my vpn to a subnet outside 100.64.0.0/16.
kouett@soc.kouett.ne..
replied 05 Jun 2025 11:10 +0000
in reply to: https://akko.erincandescent.net/objects/3f3d3740-e048-42af-a292-04b43349d208
kouett@soc.kouett.ne..
replied 05 Jun 2025 11:11 +0000
in reply to: https://soc.kouett.net.eu.org/objects/7b0a7fd4-2cb9-4f1b-bd86-20bafa4e1b16
kunsi@chaos.social
replied 05 Jun 2025 12:07 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo In case you didn't stumble over it already and want to add it to the list, Mikrotik uses 192.168.88.0/24 as default prefix.
benjojo
replied 05 Jun 2025 12:10 +0000
in reply to: https://chaos.social/users/kunsi/statuses/114630670564362525
kunsi@chaos.social
replied 05 Jun 2025 12:13 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/7Fx41ttB3bBmqG4jfd
becomethewaifu@tech...
replied 05 Jun 2025 13:57 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo The best way to permanently solve this problem is to use an IPv6 subnet for OOB, and simply allocate a contiguous slice of it for "private" NAT64 to any legacy-only devices (vs using the well-known nat64 prefix, which could collide with a local gateway)
benjojo
replied 05 Jun 2025 14:26 +0000
in reply to: https://tech.lgbt/users/becomethewaifu/statuses/114631103782431265
@becomethewaifu You don't need to explain IPv6 back to me :) My OOB LAN still needs v4 because not everything (like my ATS) supports v6 prefixes
nmaggioni@mastodon.n..
replied 05 Jun 2025 14:43 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo Clever approach to an issue that's more common than most people think, thanks for publishing the data! Have you considered the bias of users of obscure subnets not making themselves as easily noticeable from the outside than users of common ones, though? That's to say: wouldn't somebody that actively chose to place their network on a subnet that's among the more deserted ones also be less likely to publicly expose a WD Cloud-like device instead of, for example, using a dedicated VPN to access their LAN-only NAS and thus not showing up in your scans?
benjojo
replied 05 Jun 2025 14:49 +0000
in reply to: https://mastodon.nmaggioni.xyz/users/nmaggioni/statuses/114631287359501108
@nmaggioni Yes I did consider that, but generally speaking those users don't statistically matter. The amount of weird people is very low vs the bulk of default-everythying users
nmaggioni@mastodon.n..
replied 05 Jun 2025 15:42 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/SRWdMXpLN1HP77vj54
Oskar456@mastodon.so..
replied 05 Jun 2025 20:39 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
benjojo
replied 05 Jun 2025 22:24 +0000
in reply to: https://mastodon.social/users/Oskar456/statuses/114632687377435779
@Oskar456 Still not everything is IPv6 compatible (for example, my ATS) On top of that there is weird client behavior if you bring up a split horizon VPN with v6 connectivity when there is no v6 default route. I've been bitten by this a load of times, I am not keen on hitting these quirks in emergencies. v4 works, it's just NAT, I choose boring/life
sfoskett@techfieldda..
replied 05 Jun 2025 11:00 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo great writeup, and a fun topic! Looks like my 192.168 subnet is pretty rare.
And my 10 subnet is unused!
albonycal@fosstodon...
replied 05 Jun 2025 11:09 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
nblr@chaos.social
replied 05 Jun 2025 11:25 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo Oh, I've recently encountered a setup where use of the lesser known 172.32.… range was made.
vogelchr@chaos.socia..
replied 05 Jun 2025 12:41 +0000
in reply to: https://chaos.social/users/nblr/statuses/114630508217579163
jernej__s@infosec.ex..
replied 05 Jun 2025 15:17 +0000
in reply to: https://chaos.social/users/nblr/statuses/114630508217579163
fionafokus@mystical...
replied 05 Jun 2025 11:35 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo tired: using a little used RFC1918 prefix to avoid collisions wired: using the most widely used RFC1918 prefix for OPSEC reasons (WebRTC/STUN leak your local IPs)
tknarr@mstdn.social
replied 05 Jun 2025 12:11 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo For the third octet in 192.168.0.0/16, 0 and 1 are the common consumer router defaults and 100 is commonly used by cable modems. I roll d256 and if I get one of those three I re-roll. 10.0.0.0/8 tends to be used by corporate systems and rarely by consumer gear so I roll d256 each for the second and third octets and re-roll on 0. It's served me well for decades since CIDR became the norm.
hmoffatt@mastodon.au
replied 05 Jun 2025 12:14 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
KHoos@infosec.exchan..
replied 05 Jun 2025 12:23 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo by chance I am reading this on a work laptop with a non-rfc1918 IPv4 address. The upsides of an established university network.
lw@mastodon.bsd.cafe
replied 05 Jun 2025 12:56 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
interesting data, but i fixed this by using 198.18.0.0/15 (benchmarking prefix, RFC2544) for my private legacy IP networks: - it should never be used by CPE because it's not meant for that i suppose this might still break if two people had the same idea, but then fix is to move to IPv6 :-)
- but it can also never be used on the Internet
danni_storm@hachyder..
replied 05 Jun 2025 13:22 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo I personally love my 10.69.0.0/16 space I use for my internal network and 10.0.69.0/24 I use for my VPN. Obviously I'm very mature. 😅
ocdtrekkie@mastodon...
replied 05 Jun 2025 13:29 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo That fact WD managed to broadcast something that tells you my internal network space is... not my favorite thing! Thanks for sharing!
lunareclipse@snug.mo..
replied 05 Jun 2025 13:41 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4
@benjojo my solution for this has been to get a randomized /48 ULA prefix on my network and do IPv6-only connections over a VPN, statistically guaranteed to never have a subnet conflict
later I also moved my IPv4 subnet somewhere into the 172.16.0.0/12 space, nice to see that I picked a rare one for that!
nicoduck@chaos.socia..
replied 05 Jun 2025 15:13 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/LN3sCV568SWHZGnQd4