'IPv6 Just Turned 30 and Still Hasn't Taken Over the World, But Don't Call It a Failure' (theregister.com) 233
Three decades after RFC 1883 promised to future-proof the internet by expanding the available pool of IP addresses from around 4.3 billion to over 340 undecillion, IPv6 has yet to achieve the dominance its creators envisioned. Data from Google, APNIC and Cloudflare analyzed by The Register shows less than half of all internet users rely on IPv6 today.
"IPv6 was an extremely conservative protocol that changed as little as possible," APNIC chief scientist Geoff Huston told The Register. "It was a classic case of mis-design by committee." The protocol's lack of backward compatibility with IPv4 meant users had to choose one or run both in parallel. Network address translation, which allows thousands of devices to share a single public IPv4 address, gave operators an easier path forward. Huston adds: "These days the Domain Name Service (DNS) is the service selector, not the IP address," Huston told The Register. "The entire security framework of today's Internet is name based and the world of authentication and channel encryption is based on service names, not IP addresses."
"So folk use IPv6 these days based on cost: If the cost of obtaining more IPv4 addresses to fuel bigger NATs is too high, then they deploy IPv6. Not because it's better, but if they are confident that they can work around IPv6's weaknesses then in a largely name based world there is no real issue in using one addressing protocol or another as the transport underlay." But calling IPv6 a failure misses the point. "IPv4's continued viability is largely because IPv6 absorbed that growth pressure elsewhere -- particularly in mobile, broadband, and cloud environments," said John Curran, president and CEO of the American Registry for Internet Numbers. "In that sense, IPv6 succeeded where it was needed most." Huawei has sought 2.56 decillion IPv6 addresses and Starlink appears to have acquired 150 sextillion.
"IPv6 was an extremely conservative protocol that changed as little as possible," APNIC chief scientist Geoff Huston told The Register. "It was a classic case of mis-design by committee." The protocol's lack of backward compatibility with IPv4 meant users had to choose one or run both in parallel. Network address translation, which allows thousands of devices to share a single public IPv4 address, gave operators an easier path forward. Huston adds: "These days the Domain Name Service (DNS) is the service selector, not the IP address," Huston told The Register. "The entire security framework of today's Internet is name based and the world of authentication and channel encryption is based on service names, not IP addresses."
"So folk use IPv6 these days based on cost: If the cost of obtaining more IPv4 addresses to fuel bigger NATs is too high, then they deploy IPv6. Not because it's better, but if they are confident that they can work around IPv6's weaknesses then in a largely name based world there is no real issue in using one addressing protocol or another as the transport underlay." But calling IPv6 a failure misses the point. "IPv4's continued viability is largely because IPv6 absorbed that growth pressure elsewhere -- particularly in mobile, broadband, and cloud environments," said John Curran, president and CEO of the American Registry for Internet Numbers. "In that sense, IPv6 succeeded where it was needed most." Huawei has sought 2.56 decillion IPv6 addresses and Starlink appears to have acquired 150 sextillion.
"Not Invented Here" Syndrome (Score:5, Interesting)
How may different compatibility deployments are there for IPv6?
6in4? 6to4? 6RD? NAT64, 6over4? Teredo?
Think any of those are fake names? Try again!
And that's just ONE piece of IPv6. Practically everything in the "spec" has at least 2 variants minimum, and its just a royal clusterfuck. When it is described as "protocol by comity", this is exactly the result, and its been a total pain in the ass to have anything reliable at scale.
You may be on one of the lucky ISPs that has a sane deployment and want to reply with "Well, it works for me!" - that's awesome, and I wholeheartedly mean it. That IS really awesome! But for the rest of us dealing w/ multiple ISPs in multiple regions, its a fucking shitshow to get anything reliable going consistently.
One IPS I deal with about 18 months ago entirely dropped IPv6 "support" - and now we can pull a single /128 address with no routing table at all. So we have an address that is entirely fucking useless, instead of having a normal block allocation which it was previously. Another ISP I deal with still uses PPPoE, and then uses 6RD over that, so the MTU is trash because both reduce the MTU size.
IPv6 is a fucking mess, and it pisses me off every day!
Re: (Score:2)
Literally none of them duplicate functionality, they all do different things or work in different ways. That's not "NIH syndrome" in fact most of them were "invented" in the same place.
and its been a total pain in the ass to have anything reliable at scale.
Horseshit. IPv6 works just fine at scale. Heck it works just fine with no end user intervention on small scale just as it does for major providers. Yeah there's a lot to the standard, and most of it you can simply ignore and have a perfectly functioning setup. I literally don't know what part of this you think is a shitshow,
Re: (Score:2)
And just like daily auto traffic, you have to watch out for the other guy, who didn't signal and is talking on his phone.
The problem is: There is no standard way, just a bunch of them, because of the many mutant implementations.
This isn't horseshit, this is the reality of what network engineers have to deal with, not to mention the civilians who are just trying to learn enough to get by. Then they discover that the address space covers most atoms in the known universe, perhaps more.
Inside various operating
IPv6 techniques more standardized, IPv4 less so (Score:2)
Re: (Score:2)
I understand the standards fully.
It's the implementations and supporting components, from old router, recalcitrant ISPs, end point walled gardens across the planet, and much other gear that may, or not, do one thing (perhaps correctly) and many bad things more commonly.
Citing standards is fine, it's the implementations that are diffuse, incorrectly installed, with ignorance and even malice towards IPv6 for sins it didn't commit-- just the results when connections don't work, or DNS is incorrectly implemente
Re: (Score:2)
I agree that the original assignments of IPv4 addresses were carelessly distributed. To be fair, it was done by just one man - Jon Postel, and to be fair to him, it was only supposed to be used by organizations and companies dealing w/ the US government. It was never designed to be used by the world's entire population. Once it was released to do that, things started breaking down, and you started needing NAT and other kludges
The mistake, if any, was letting IPv4 get released for the purposes of the in
Re: (Score:2)
And, despite virtues, what happens?
Why did AT&T get such a massive Class A block?
Even ham radio got the full 44.
Then, even more virtuously, IPv6 was invented with no mandates to be interactively compliant, no testing rigor, NADA.
It's indefensible. The IETF isn't a deity. It takes more to make a massive change after the fact, and look at the statistics, the implementations, the emphasis you cite in education. This is failure, on a broad and stupid scale. I wish it weren't so. But these are facts.
Astonish
Re: (Score:2)
6in4? 6to4? 6RD? NAT64, 6over4? Teredo?
These are all completely different things...
You may be on one of the lucky ISPs that has a sane deployment and want to reply with "Well, it works for me!" - that's awesome, and I wholeheartedly mean it. That IS really awesome! But for the rest of us dealing w/ multiple ISPs in multiple regions, its a fucking shitshow to get anything reliable going consistently.
Based on stats published by google, apnic, akamai and cloudflare it does indeed work just fine for almost half the world now meaning hundreds of millions of users, and there are many countries where users with working v6 make up a sizeable majority.
The problem is not v6, the problem is lousy ISPs, and a lousy ISP is just as likely to provide a lousy legacy service too.
In fact, legacy IP is one of the main reasons why lousy ISPs exist and are not driven out of busi
Re: "Not Invented Here" Syndrome (Score:2)
Yeah, developing countries big issue preventing them advancing is lack of IP6 connectivity LOL!
Oh man, come back down to earth space marine.
Re: (Score:2)
You don't need to be well informed to see the GP is right on that point. We've run *MULTIPLE* slashdot stories about the IPv4 address space being exhausted and corruption causing developing nations to give up their already limited pool.
Actually fuck developing countries, many rich westerners are stuck behind CG-NAT. If the OP is a space marine, what's that make you, a deep sea fish?
Re: "Not Invented Here" Syndrome (Score:2)
Sure, all those poor people with barely a pot to piss in or food to feed their kids living hand to mouth in countries run by corrupt psychopathic dictators are just thining, "If only we had access to the IP6 address space everything would be ok".
FFS , get out your basement and go visit the real world.
Re: (Score:2)
Outdated talking-points (Score:2)
Re: (Score:2)
It really does seem like a mess of half arsed protocols and spotty support, for basically no gain for the average user. It doesn't solve the problems people have with IPv4, but it does introduce lots of new ones.
There is an unintended side effect of IPV4 (Score:5, Insightful)
If everyone used IPV6, and every device was independently routable, we wouldn't need to connect to a server to use a device remotely.
IPV4 and NAT made server connection the only workable option and allowed evil companies to brick devices by shutting down the server or charge outrageous subscription prices to use a device that the user paid for
Re: (Score:2)
Re: (Score:2)
If everyone used IPV6, and every device was independently routable, we wouldn't need to connect to a server to use a device remotely.
You can VPN into your home network. Though, I guess, allowing the device to be accessed by anyone from anywhere (I mean, you may want to access it from a hotel, so you don't know what your IP would be ahead of time) may be fun too.
PV4 and NAT made server connection the only workable option and allowed evil companies to brick devices by shutting down the server or charge outrageous subscription prices to use a device that the user paid for
Right, because otherwise the companies would give up their control, right. They can already do that, just provide a Web UI to the device directly, I can forward a port or use a VPN.
Re: (Score:2)
Is that a good idea though? Being routeable from the internet means having to be secure from all the attacks that come from the internet.
For most people, if they really need that functionality, a VPN or reverse proxy like Cloud flare Zero Trust is a better option.
I know, it sucks that we have to rely on those things instead of all being free to put our stuff directly on the internet from our home broadband, but look at what happened with email servers. Torrents of spam, hacked servers becoming parts of botn
Re:What the absolute fuck are you talking about? (Score:4, Informative)
Legacy IP does not scale without NAT. Virtually all mobile providers and an increasing number of fixed line providers are forced to NAT their customers.
There are literally thousands of ISPs around the world who simply don't have enough legacy address space to provide one to each customer, let alone one to each device that a customer might have. It may be technically possible to operate legacy IP without NAT, but it is neither scalable nor affordable to do so.
So instead you have NAT. If you're lucky you control the NAT and share it with your own devices, but for millions of people around the world they have no control as the NAT is performed by the ISP. If these users want to make anything available remotely via legacy IP then they have to rely on a third party service to do so.
Re: (Score:2)
Needing to subscribe to a relay service (Score:2)
nothing about IPv4 or NAT requires the servers of "evil companies" to access hosts remotely.
When an entire neighborhood shares an IPv4 address through ISP-controlled carrier-grade NAT, how does a device on subscriber premises receive an incoming TCP connection? How would the NAT appliance even know for which subscriber's device the connection is intended?
Consider a subscriber whose home LAN is behind the ISP's carrier-grade NAT, and the subscriber wants to connect to a home NAS or remote desktop from outside the home LAN. Other people have recommended that such a subscriber additionally subscribe
Re: (Score:2)
How many IPs do you get from your ISP for v4 and for v6? Now imagine you have a webcam to monitor your dogs and a smart thermostat, which both use a web interface. Add a few other smart things to the mix if you want to. In the best case you now need to configure each of them a non-default port and add a lot of different forward rules to your router, to get them online with IPv4. With IPv6, you just need to add to your router "Allow Device (name, MAC) access on 443". No need to configure another port, becaus
Re: (Score:2)
The ISP may be shit for not implementing IPv6, but it's not for a lack of competence w/ IPv4. Like he said, when you have ISPs implementing carrier-grade NAT, then they can have up to 18 million addresses, and even that can get used up, given that you have addresses going to home routers that have to be further subneted, even if /29. That is the arithmetic limit on the number of IPv4 addresses, and no ISP, no matter how brilliant, can do a thing about it
Had they gone to IPv6, they'd have gotten, say, a
Re: (Score:3)
Your statements are both ridiculous and patently false.
Sigh. You not understanding the OP doesn't make them false. In fact one of the earliest examples of this was Skype, which used a central server to facilitate making a connection through NAT. Every fucking device requiring a cloud server to operate is the direct result of our obsession with making devices connected to the internet unrouteable. It's *THE* reason every consumer device requires a connection to a server somewhere, and this was the case long before anyone tried to monetise the cloud.
People gave up on the Internet... (Score:5, Interesting)
It's actually quite another issue. If you listen to people claiming that "NAT killed IPv6", that is a different point. IP is all about end to end connectivity. There are no special "server privileges" you need on IP-networks. It is like the telephone network. Everybody can do anything. You don't need special stuff to run your own "information hotline", you just get a connection and there you go.
If a person claims that "NAT is sufficient" it essentially means that they have given up on that. They are contempt with an Internet which does distinguish between those who have a public IP-Address, and those tho are behind NAT. It's a world dominated by large "hyperscalers".
IPv6 offers another Internet. It offers one, where everyone can simply run their own "webserver" from their bedroom. Everybody has their own IPv6 addresses. There is full end-to-end connectivity, if you open your firewall. There is no need to ask someone for permission to run your own IPv6 "server". It is a network that is free to anybody.
If you look into the world, you'll find logs of CGNAT, where your ISP is already doing NAT... often at great expense and often multiple times, particularly in poor countries where not even your ISP may have a public IPv4 address. In those areas IPv4 is, essentially, a closed system you cannot participate in. It's like an "Online Service" like AOL or Compuserve. In those places the only way to get actual Internet is via IPv6.
BTW we are already at roughly half the Internet traffic being IPv6, I've recently been at a colocation facility where they only provided IPv4 at special request... and that essentially just works.
Re: People gave up on the Internet... (Score:2)
Re: (Score:2)
Well maybe the Internet is not exactly what you want then.
Re: (Score:2)
I don't want people all over the world connecting to my bedroom. If I wanna host a website I pay an extra $8/mo for VPS
Then don't run a web server in your bedroom. And maybe have a firewall that blocks inbound connections by default (which is a side effect of NAT, but absolutely does not require NAT).
But many of us would like to run servers from home.
Re: (Score:2)
Precisely! I don't get the negative vibes of The Register in claiming that it hasn't "taken over the world". For something to be a failure, its adaption should have been languishing in single figures, or at 30% tops. Not when it's at the cusp of crossing the 50% mark
Also, talking about IPv6 being 30 years old is misleading. Yeah, RFC1883 may have been approved then, but since then, there have been boatloads of RFCs, some deprecating previously defined RFCs, such as IPv4-compatible addresses (::d.d.d.d
Not everything is name based (Score:3)
"These days the Domain Name Service (DNS) is the service selector, not the IP address," Huston told The Register. "The entire security framework of today's Internet is name based and the world of authentication and channel encryption is based on service names, not IP addresses."
We are so used to the constraints put on us by IPv4 that we don't even consider what opportunities open up when every single device on the planet has its own globally routed IP address. It's like an abusive relationship. Not all service resolution works on name based principles, nor is it necessarily the best way in all cases (for example in P2P scenarios). Overlay networks, NAT and private addressing are often not really desirable nor strictly necessary, and this fact should affect how we reason about a future internet.
Re:Not everything is name based (Score:4, Insightful)
We are so used to the constraints put on us by IPv4 that we don't even consider what opportunities open up when every single device on the planet has its own globally routed IP address.
Yes, all those opportunities for insecure IoT devices to be compromised.
Re: (Score:2)
We are so used to the constraints put on us by IPv4 that we don't even consider what opportunities open up when every single device on the planet has its own globally routed IP address.
Yes, all those opportunities for insecure IoT devices to be compromised.
So have your router run a firewall that denies inbound connections be default, the same way NAT does. This is a side effect of NAT, but can be done better and more easily by a simple firewall.
Re: (Score:2)
Re: (Score:2)
Is it worth it (Score:3)
The general idea of global internet is that "everyone can connect to everyone". No server needed.
Concept of this being a good idea died around XP era. When many ISPs still offered public facing IPv4 address. Plug in a PC, try installing windows XP, and it got owned in about 30 seconds after install finishes.
NAT stopped this zero user interaction worm spreading nonsense. Today, I'd note that one of the big reasons IPv6 is generally not recommended for residential use is exactly this. NAT brings a very powerful layer of security by effectively firewalling off access from outside. While it's no longer XP era, and modern windows is significantly more secure, most people are still so inept at basic IT maintenance, that it's probably best to not let their machines be easily publicly accessible.
It's good to have IPv6 when you actually know what it's good for and how to set up properly sanitized networking. But for most people, it's much more of a liability than a boon.
Re: (Score:3)
Is it a good thing that everyone who needs to connect to a home NAS or remote desktop from outside the home LAN be required to subscribe to a relay like Pinggy, Tailscale, or Hamachi, on top of what the user already pays the ISP per year for an Internet connection?
Re: (Score:2)
If you don't know how to set up something as basic as a proper port forwarding scheme within your local network, you probably shouldn't have public facing devices.
Re: Is it worth it (Score:2)
You haven't heard of CG-NAT, have you ?
Re: (Score:2)
Is it a good thing that everyone who needs to connect to a home NAS or remote desktop from outside the home LAN be required to subscribe to a relay like Pinggy, Tailscale, or Hamachi, on top of what the user already pays the ISP per year for an Internet connection?
Or have the skill to set up a reverse-ssh tunnel. You still may need to pay a service for a backup method in case the tunnel breaks and doesn't auto-recover if you don't have someone "at home" who can manually recover it for you.
But as to your question, "is it a good thing" that it's not easy to make something in your home visible from the outside network without having to go to some extra effort or cost? Yeah, I think it is. A small amount of "friction" means 95+% of people won't bother, which means the
Reverse SSH breaks if both sides are behind NAT (Score:3)
Or have the skill to set up a reverse-ssh tunnel
A reverse-SSH tunnel requires one of two things: either your local computer is on a network that can accept inbound connections, or there's a relay ($) in the middle accepting connections from both the client and the server.
"is it a good thing" that it's not easy to make something in your home visible from the outside network without having to go to some extra effort or cost? Yeah, I think it is.
I believe there's a substantial qualitative difference between "extra effort" and "cost", especially when the latter is a recurring cost payable to the rent-seekers that run relays.
Re:Is it worth it (Score:4, Insightful)
NAT is not a security mechanism, it's a kludge to get around a lack of address space. You can operate a firewall without NAT and it works better this way because it's less complex and has less to go wrong.
Plus devices these days are mobile - sure you have your own firewall at home, but take your laptop to a hotel and theres no longer anything between your laptop and the other guests.
Malware is still an epidemic, there are still millions of infected machines and new strains of malware coming out all the time. NAT gives users a false sense of security and causes them to be more careless when opening a phishing email or opening a suspicious link.
Using v6 is better for everyone, otherwise we're stuck in a dystopian world where only a few large companies can host content and everyone else is just a consumer paying the extra cost of CGNAT equipment. This is a return to the controlled networks of aol and compuserve.
Re: (Score:2)
Except that it is. And its proliferation is what ended the worm epidemic among windows machines connected to the internet. I got to observe this first hand back in 2000s, as that was when I had to administer a residential network for a university campus building. We went from massive worm problem to almost no worm problem overnight when connections were put behind a NAT. Remaining worm problem 100% came from people who wanted a public facing IP without NAT (you could request it and get it).
So you may want t
Re: Is it worth it (Score:2)
If someone was handing out public IPs without any firewall, maybe they should have taken a look at that.
Using NAT requires you to whitelist things you want to open. With public IPs, you should be able to do the same. If the firewall vendor or administrator don't understand that, and jave everything whitelisted by default, it's on them. But this is not a NAT vs firewall issue.
Re: Is it worth it (Score:2)
It's no more a security mechanism than a simple stateful firewall. And from an administrative standpoint, especially for a university, it's easier and gives you some cover. If someone reports that one of your students was doing something improper, good luck figuring out who the culprit was. With unique addresses you know exactly who it was.
Re: (Score:2)
We went from massive worm problem to almost no worm problem overnight when connections were put behind a NAT.
And you could have achieved exactly the same thing at lower compute cost with a stateful firewall. NAT didn't save you from worms, the stateful firewall that NAT requires in order to work did. But you can have the firewall without the NAT, and the result is simpler, more efficient, easier to manage and more flexible.
Re: (Score:2)
Re: (Score:3)
You could just have easily retained the public IPs, while putting a firewall in front of them. NAT was just added complexity providing no benefit other than reducing the number of legacy addresses required.
By hiding vulnerable machines behind a firewall you've not actually solved the problem, as those machines will become instantly infected if someone introduces a single infected machine behind the firewall.
In these days of mobile devices and wifi it is actually FAR more common for this to happen - totally
Re: (Score:2)
> NAT is not a security mechanism, it's a kludge to get around a lack of address space. You can operate a firewall without NAT and it works better this way because it's less complex and has less to go wrong.
No, it is not. But it works very well as one...
I mean sure, to do NAT I need a router, which has a working firewall (right?) , but don't bother me with those details! NAT is the main security mechanism, and leave those pesky firewall rules empty. I could learn something, and we don't want that...
Re: (Score:2)
We are stuck at 49% (Score:2)
Re: (Score:2)
Yeah, at 49%, how is it exactly a failure? A failure would be an inability to go into double figures, or maybe enter the 30% mark
If anything, the IPv6 community is now exploring IPv6-only and IPv6-mostly options for networks that have chosen to adapt IPv6, partly to reduce the number of attack vectors by abandoning the IPv4 backbone
Re: (Score:2)
Stuck at 49%? This graph tells otherwise: it has been growing steadily, somewhat linearly, since 2015. We just happen to be at the point where it is 49%
https://www.google.com/intl/en... [google.com]
Hopefully this year, we'll cross the 50% mark. Also hopefully, more networks will start going IPv6-only or IPv6-mostly, thereby accelerating adaption
Don't call it a failure... (Score:2)
Rocking my subnets, putting v4 in tears
Making the packets rain down like a monsoon
Listen to the router go BOOM!
Explosions, overpowering the limit
128-bit towering throughput in it
Reach the summit, watch the NAT tables plummet
I'm gonna take the stack by storm and I’m just gettin' warm!
Re: (Score:2)
In Europe (Score:2)
Every device has an IPv6 address these days, in addition to an IPv4 address. Many providers even allow you to use IPv6 exclusively but of course you can't really because sometimes the other end only supports IPv4.
Time to move ahead w/ IPv6 only/mostly (Score:2)
On June 6th 2012, we had World IPv6 day, when IPv6 was turned on for a day globally by all major networks, before being turned off. The following year, that same day, IPv6 was turned on permanently, and that was when adaption started.
With IPv6 adaption now at 49%, this year we should do the converse. On June 6th, we should shut off IPv4 services at all major networks for a day, and see how much of the internet is shut down. Depending on the results, next year or the year after, we should permanently sh
IPxl should've had a chance... (Score:3)
It wou;d have been backwards-compatible and given us the expanded address space desired.
http://bill.herrin.us/network/... [herrin.us]
It doesn't lack backward compatiblity (Score:2)
You can fully encapsulate IPv4 in IPv6. There is a reserved range for that. There are also several techniques to relay between v4 and v6. People thought about that, it's just that for a long time nobody cared to do the full switch.
Re: NAT killed IPv6 (Score:2)
Re: (Score:2, Insightful)
usually default that IPv6 ingress is blocked from external traffic.
But it is default and 100% guaranteed without configuration when NAT4 is engaged. Literally anyone can do it without screwing it up.
You have to go out of your way to screw up a NAT4 "firewall".
You have to go out of your way to enable an IPv6 firewall.
Re: (Score:3)
There's nothing stopping you doing NAT6 either.
In fact, I do, but that's because my ISP is incompetent and IPV6 doesn't work properly (lots of other things don't work properly either, including DNS where I have to talk to a (remote) DNS server on a non-standard port to do DNSSEC[1]).
The nice thing about IPV6-IPV6 NAT if you're using it as a poor mans firewall is that you can do 1:1 address mapping, which also makes debugging issues easier and forwarding things you do want to allow trivial too, no more only
Re: (Score:2, Interesting)
Wrong.
A NAT gateway without explicit deny rules will allow traffic inbound if there is a route - ie from adjacent hosts. Reserved legacy address space is NOT non routable, it's just filtered from global BGP tables. There's nothing stopping your ISP routing it internally, or an adjacent customer adding a route to it via your public address. Many ISPs place the wan ports of their customer's routers into a large shared subnet so this attack is very feasible.
A consumer IPv6 firewall will block inbound by defaul
Re: (Score:2)
A NAT gateway without explicit deny rules will allow traffic inbound if there is a route - ie from adjacent hosts.
So what you are saying is that a NAT setup without a firewall is possibly vulnerable to a highly targeted attack from a near neighbor, assuming that the ISP will route the normally non-routable addresses to a specific target endpoint?
Meanwhile, IPv6 without a firewall is open to the world.
Did you ever read the phrase "Security is a process"? Your argument appears to be that, because there is a small chance of a tiny attack surface, NAT is no more secure than an open IPv6 network?
Re: (Score:2)
Re: NAT killed IPv6 (Score:4, Informative)
So what you are saying is that a NAT setup without a firewall is possibly vulnerable to a highly targeted attack from a near neighbor, assuming that the ISP will route the normally non-routable addresses to a specific target endpoint?
The ISP doesn't need to do anything. On a lot of connections the WAN address of customers routers is in a shared subnet, so all another customer needs to do is add a route to your RFC1918 address space via the WAN address of your router.
For instance here the fibre connection is using DHCP and assigns a legacy IP 100.96.174.243/18 (yes CGNAT). Other customers in the same region are also within that subnet, and i can see the WAN addresses of their routers as well as get ARP responses from them.
If i manually add a route on my gateway to 192.168.1.0/24 via 100.96.174.242, i can start scanning 192.168.1.0/24 which is the default LAN address range for the default router provided by this ISP. These default supplied routers absolutely do allow this traffic because i've tested it myself.
Some firewalls have explicit options for this - eg "Block Bogons" in pfsense.
I can do the same with v6 of course, the WAN interfaces of the other customers are also in the same /64 as my router, but there's no need to manually add a route since a public route already exists. But v6 traffic will be treated exactly the same wether it comes from an adjacent user or from the other side of the planet.
So the basic point is that NAT adds complexity and creates corner cases like this, you need to be aware of this possibility and test if it applies to the topology of your specific ISP and then mitigate against it - but most users won't and will just falsely assume that NAT protects them.
With v6 it's more straight forward - you either allow external traffic or you don't, and you can verify this yourself very easily using publicly available tools rather than having to rely on a cooperative neighbor.
Of course none of this considers that the threat landscape has changed. Modern consumer devices don't have complex listening services exposed by default like WinXP did, and modern devices do not sit in one place always behind the same firewall - we live in a mobile world where people use portable devices and frequently connect them to arbitrary wifi or cellular data networks. Modern devices are prepared for the scenario that they will be connected to a public network with no separate firewall between the device and potentially hostile/infected users.
Current threats are not based on attackers making inbound connections to your device, they are based around exploiting outbound connections that you've made from your device - and a default NAT or default unrestricted outbound firewall does absolutely nothing to counter this threat vector.
Re: (Score:2)
You have to go out of your way to enable an IPv6 firewall.
I have literally never experienced this, and I've had a lot of different routers form a lot of ISPs over the past decade with IPv6 support. Edge security is plug and play for the consumer. It's no worse than NAT and just like NAT, enabled by default.
Re: (Score:2)
Re: (Score:2)
NAT even with "allow all" gives some protection. While it does not protect from more specific cases (such as my neighbor adding a static route to 10.0.0.0/24 through my WAN IP) it protect from most incoming connections from anyone outside my VLAN in the ISPs network.
With NAT, I have to add a rule to forward a port to some internal device. If I don't do that, it won't be possible to connect to it (outside the specific cases mentioned above). Without NAT, all it takes is forgetting the "drop all" rule on the
Re: (Score:2)
How exactly? If you "allow all", NAT will simply translate the final destination address where the packet is headed, and then forward it to that node. Without the firewall rules being written properly and enabled, there is nothing stopping it
As far as firewalls go, there is no difference b/w IPv4 and IPv6
Re: (Score:2)
So, how will you or some hacker be able to access 10.0.0.2 on my LAN from outside without me adding a specific rule to forward some port to it?
If a packet comes to my external IP and there is no NAT rule matching it (and no service runs on that port on the router) the router will just discard or reject it, because it does not know where to forward that packet.
Re: (Score:2)
Agreed, although egress filtering can be tricky if you're using SLAAC with privacy addresses and you want some clients to have external connectivity and not others unless you can partition them onto separate /64.
I use mac based tagging via an iptables firewall rather than have multiple SSID on the wlan.
But egress filtering is getting harder and harder anyway, everybody and his dog talks to something at amazon aws on port 443. So far, I've been able to use SNI inspection and there's been nothing using ESNI t
Re: (Score:2)
Doing egress filtering this way is a convenience mechanism not a security one. A compromised system can trivially change its IP address or MAC address. Having separate SSIDs is the way if you want different policies applying to different devices, and that's why it's recommended to provide a /56 v6 block. You could potentially use 802.1x identities too.
What you're running up against with android is a case of the devices being secured against you the user. These devices don't trust the user to make good decis
Re: (Score:2)
NAT is not a firewall. A firewall just happens to be where the NAT happens. But one could, theoretically misconfigure an IPv4 firewall that's beside a NAT to ALLOW ALL traffic going either direction, and that mythical protection that NAT supposedly offers will be proven to not exist
IPv6 firewalls can be configured just as easily as IPv4 ones. Also, don't ding us about the long addresses: one can always copy & paste those. It's not like we're using vi to edit our firewalls
Re: (Score:2)
Let's say I configure NAT to allow all traffic, but do not add any port forwarding rules, just the single outgoing masquerade rule.
How would you, from another country, would be able to exploit that to connect to 10.0.0.2 on my network?
It's not like we're using vi to edit our firewalls
You are correct, I use nano. I also remember the IPs of my devices, though, I guess, if I had to use IPv6, I could assign fd80::0:1, fd80::0:2 and so on instead of 10.0.0.1, 10.0.0.2. Numpad does not have letters and : though, so it would be a bit harder to type those IPs.
Re: (Score:2)
To enable NAT you need to have an ACCEPT rule in the FORWARD table (or a wide open default ACCEPT). Because it is forwarding traffic. MASQUERADE goes into POSTROUTING.
Re: (Score:2)
Yes, -P ACCEPT and then the masquerade rule.
How does that allow anyone from other countries to connect to 10.0.0.2 on my network?
I am not saying this is perfect and I would rather ad a rule that allows outgoing connections and drops incoming, but even without those rules, just the fact that my LAN is on a RFC1918 subnet would make it pretty difficult to access anything inside.
The only way to do it probably is:
1. be a subscriber of my ISP
2. be on the same VLAN as me
3. the ISP to not have IP filtering on swit
Re: (Score:2)
Re: (Score:2)
It's not that difficult to forget it when writing the rules.
On a default Debian installation, iptables are set to allow everything. So, I enable ip.forward and immediately my router starts forwarding everything without me explicitly setting iptables -P FORWARD DROP or adding a drop rule.
With NAT (does not matter, v4 or v6). I enable ip.forward, nothing works. I then add the masquerade rule, now outgoing connections work and incoming ones are dropped (excluding the case mentioned in my previous post), even w
Re: (Score:2)
Re:NAT killed IPv6 (Score:4, Interesting)
Says someone who has never used IPv6 and doesn't understand how it works at all.
Firewalls work exactly the same way with both legacy IP and v6. The difference is that very few can actually afford to operate a firewall with legacy IP.
So instead you have NAT+firewall, which are two distinct functions adding complexity - now you have to keep track of two sets of addresses and correlate the logs, as well as keeping track of individual port mappings on the same address but to different devices. More complexity means more can go wrong and mistakes can be made more easily.
Plus most users leave outbound unrestricted, so your toaster would have unrestricted connectivity with a typical legacy NAT setup anyway.
Re: (Score:2)
It's the same argument every single time IPv6 is mentioned. "I prefer NAT because it gives me security". People just don't understand the difference between a stateful firewall and a NAT.
I stopped trying to explain this. You'd think that the slashdot crowd would understand some basic networking concepts, but nope.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
A "dead" protocol that grows... (Score:2)
Re: (Score:2)
The firewall is literally the same. You drop incoming packets that do not belong to an existing connection.
Re: (Score:2)
NAT didn't kill IPv6. Corrupt government officials killed IPv6. Our governments collude with large ISP's to keep the gravy flowing with the obsolete IPv4. There is LOTS of money to be made for maintaining the artificially scarce IPv4 addresses.
Supply & demand laws still apply (Score:2)
It's not always a conspiracy yarn: there is such a thing as supply and demand. There are only some 3.6 billion routable IPv4 addresses out there, and given the world's population of 8 billion, that's less than 1 address for 2 people. For IPv6, there is 7.2x10^16 /64 blocksfor every RIR just in the defined spaces within 2000::/4 for each RIR (2400 for APNIC, 2600 for ARIN, 2800 for LACNIC...), which makes it hard to burn (Note that this is a conservative calculation that I did, since I didn't consider 2500
Re: (Score:2)
IPv4 firewalls better.
Thanks for telling the world you don't have a clue about networking. IPv4 and IPv6 firewalls identically. They are literally not treated differently in the slightest. If you don't want your toaster to have end to end connectivity then make sure it doesn't using the tools you have at hand, don't fuck over every device in the world because you're too stupid to log into your router.
Re: (Score:2)
How exactly has IP6 been a nightmare? What makes is so difficult for you?
People keep saying IP6 is difficult, but once you ask them, they typically say something like addresses are longer and harder to remember (which they often aren't) or mention exotic and never used features like "IP-Address mobility" which nobody implements.
Re: (Score:2)
The whole discussion feels weird.
Whole of Africa (1.5B pop) and Asia/India (4.8B pop) since the beginning were IPv6. There were never enough IPv4 addresses for them to begin with.
And here we have another tempest in a teacup whether IPv6 was/is success or not.
Re: (Score:2)
Re: (Score:2)
How exactly has IP6 been a nightmare? What makes is so difficult for you?
What makes IPv6 difficult for a lot of people, such as myself, is that we're in no position to test on it. Last I checked, US fiber ISP Frontier Communications still refused to deploy IPv6 in my city, and the alternative was Comcast.
Re: (Score:2)
Re: (Score:2)
How exactly has IP6 been a nightmare? What makes is so difficult for you?
I have an existing NAT setup, using a Linux box as a router/firewall and some devices that I want to ensure are secure in that NAT LAN.
Please explain how I can simply run IPv6 on my LAN. I could put the secure devices immediately behind the primary router (on the same network as my Linux router), but then, I must trust the primary router's firewall.
Yes, in a zero trust network, IPv6 Implementation should be easy, but that's not the situation for many networks.
Re: Time for a new standard (Score:2)
Are you working under the assumption that RFC1918 addresses are more secure? If so, just have all your internal interfaces assigned a ULA address, and your route advertisements will cause SLAAC will be ULA. Then just use NAT6 for the same "unroutable" effect.
Re: (Score:2)
NAT is not a security feature. There are multiple ways of exploiting the NAT logic inside your router to get inside. For example your router likely has logic to handle protocols that need connections into your network. It'll have to guess if you are using such a protocol, and there will be ways to trick it. NAT is not meant to filter incoming connections, it's just a side-effect under many circumstances. Keep in mind, NAT is not there to disconnect things. It's there to provide some sort of connection over
Re: (Score:2)
Re: new generation (Score:3)
Re: (Score:2)