• feoh@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I keep hearing this, and I KNOW it’s true at the enterprise level, but I’ve been running my home LAN IPv6 native for the last - 6+ years? Ever since I learned Comcat would vend it to you from their stock router.

    Works great. No problems. Didn’t used to be that way, but these days most (more?) of the stack bugs have been shaken out.

    • smb@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      ipv6 in companies… ipv6 is not hard, but for internal networking no company (really) “needs” more than rfc1918 address space. thus any decision in that direction is always “less” needed than any bonus for (da)magement personnel is crucial for the whole companies survival…

      for companies services to be reachable from outside/ipv6 mostly “only” the loadbalancers/revproxies etc need to be ipv6 ready but … this i.e. also produces logs that possibly break decades old regexes that no one understands any more (as the good engineers left due to too many boni payed to damagement personnel) while other access/deny rules that could break or worse let through where they should block (remember that 192.168. could the local part of ipv6 IF sone genious used a matching mech that treats the dot “.” as a wildcard as overpayed damagement personnel made them rush too fast), could be hidden “somewhere”. altogether technical debt is a huge blocker for everything, especially company growth, and if no customer “demands” ipv6, then it stays on the damagement personnels list as “fulfilling the whishes of engineers to keep them happy” instead of on the always deleted “cleaning up technical debt caused by damagement personnel” list.

      setting up firewalls for ipv6 is quite easy and if you go the finegrained “whitelisted or drop/block” approach from the beginning it might take a bit for ipv6 specials to be known to you, but the much bigger thing is IMHO the then current state of firewall rules. and who knows every existing rule? what rules should be removed already and must not be ported to ipv6? usually firewalls and their rules are a big mess due to … again too many boni payed to damagement personnel, hindering the company from the needed steps forward…

      ipv6 adoption is slow for reasons that are driving huge cars that in turn speed up other problems ;-|

      • Skull giver@popplesburger.hilciferous.nl
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        I know several companies that, because of bad network planning, have ended up using public address ranges as internal IP addresses. IPv6 would’ve solved this easily, but I don’t think the relevant network admins ever bothered to learn network configuration beyond 1990. But hey, who needs that arbitrary /8 anyway, right? Not like anyone’s going to host DNS on 1.0.0.0/8!

        • smb@lemmy.ml
          link
          fedilink
          arrow-up
          0
          ·
          5 months ago

          i once had to look at a firefall appliance cluster, (discovered, it could not do any failover in its current state but somehow the decider was ok with that) but when looking at its logs, i discovered an rsh and rcp access from an ip address that belonged to a military organisation from a different continent. i had to make it a security incident. later the vendor said that this was only the cluster internal routing (over the dedicated crosslink), used for synchronisation (the thing that did not work) and was only used by a separate routing table only for clustersync and that could never be used for real traffic. but why not simply use an ip that you “own” by yourself and PTR it with a hint about what this ip is used for? instead of customers scratching their head why military still uses rcp and rsh. i guess because no company reads firewall logs anyway XD

          someone elses ip? yes! becuase they’ll never find out !!1!

          i really appreciate that ipv6 has things like a dedicated documentation address range and that fc00:/7 is nicely short.

    • Vlyn@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      My ISP doesn’t support IPv6, now what?

      It’s really bullshit.

    • eclipse@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      It also means you no longer need the kludge that is NAT. Full E2E connectivity is really nice – though I’ve found some network admins dislike this idea because they’re so used to thinking about it differently or (mistakenly) think it adds to their security.

        • frezik@midwest.social
          link
          fedilink
          arrow-up
          0
          ·
          5 months ago

          It wasn’t designed for a security purpose in the first place. So turn the question around: why does NAT make a network more secure at all?

          The answer is that it doesn’t. Firewalls work fine without NAT. Better, in fact, because NAT itself is a complication firewalls have to deal with, and complications are the enemy of security. The benefits of obfuscating hosts behind the firewall is speculative and doesn’t outweigh other benefits of end to end addressing.

          • AceBonobo@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            5 months ago

            The main benefit of a NAT is that by default it prevents all external access to the hosts inside the network. Any port you have open is not accessible unless explicitly forwarded.

            This has a lot of security benefits. Regardless, everything you said is sounds true to me.

            • Skull giver@popplesburger.hilciferous.nl
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              Not really, though. It was never designed as a security boundary. You can “open” a UDP port by sending UDP packets to another host, and then that host can send UDP packets to you, for instance. Usually the IP addresses of the two hosts are exchanged through a third party, and that’s how STUN/TURN works in essence. Without this, you’d need to port forward every UDP connection manually, both incoming and outgoing.

              NAT only protects you when you have hosts that only communicate along preset routes, but then a normal firewall will also work fine. It’s not like having a public IP means any traffic will actually go through, every modern consumer router has a standard deny all firewall. At best, it sort of hides what devices are sending the traffic.

              Meanwhile, NAT has flaws breaking traffic (causing NAT slipstreaming risks, like I linked elsewhere). It also has companies like Nintendo instruct you to forward every single port to their device if you have connectivity issues. If that forward is not towards a MAC address, and your PC gets the IP your Nintendo Switch used to have, you’ve just disabled your firewall to play Animal Crossing.

              If you want to, you can do NAT on IPv6. Every operating system supports it, even if it’s a stupid idea.

              • AceBonobo@lemmy.world
                link
                fedilink
                arrow-up
                0
                ·
                edit-2
                5 months ago

                I still have to initiate the outgoing UDP. Are you talking about the specific case where any software running on my host can initiate it without me requesting?

                Edit: apparently NAT is full of security bugs

                • Skull giver@popplesburger.hilciferous.nl
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  5 months ago

                  In the instance of UDP handshakes yes, you need local software to initiate the connection on one of your devices somewhere (I highly doubt that your home router verifies the origin of those packets, so a hacked printer or IoT crap can open ports to your desktop no problem). Other problems are harder to solve.

                  NAT is great at what it does, but it does not guarantee security. It blocks straightforward attacks, but brings in tons of edge cases and complexity that sophisticated attacks can abuse. At the same time, the same security can be achieved using IPv6 and a firewall without all the complexity.

                  It’s a neat workaround that means you don’t need to mess with subnetting and routing tables when you do stuff like run virtual machines and when your ISP doesn’t offer IPv6. It was designed so larger businesses with 10 machines could access the internet without spending a lot of money on a /30, not to replace firewalls, and it still works well for what it’s designed to do.

            • frezik@midwest.social
              link
              fedilink
              arrow-up
              0
              ·
              edit-2
              5 months ago

              You can get exactly the same benefit by blocking non-established/non-related connections on your firewall. NAT does nothing to help security.

              Edit: BTW–every time I see this response of “NAT can prevent external access”, I severely question the poster’s networking knowledge. Like to the level where I wonder how you manage to config a home router correctly. Or maybe it’s the way home routers present the interface that leads people to believe the two functions are intertwined when they aren’t.

  • Norgur@fedia.io
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I also know that I cannot tell the difference between two IPv6 addresses because they all merge into an indiscernible blur inside my head

  • smileyhead@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    5 months ago

    I pay yearly more for IPv4 address space for virtual machines on my dedicated server than for that dedicated server itself _(ツ)_/.

    Let that thing die.

    Monthly summary:

    54.40€ - 30 IPv4 addresses
    0.00€ - 18 quintillion IPv6 addresses
    38.39€ - whole server for dozens of services