this post was submitted on 21 Jul 2023
16 points (100.0% liked)
IPv6
333 readers
1 users here now
IPv6 Discussions
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Could this be less secure, especially for devices you don't want to be publicly accessible? Or are you just supposed to make sure to have good firewall settings?
Most modern routers will act as a statefull firewall for IPv6.
What that means in you need traffic generated from the LAN in order for the traffic to be permitted back from the internet. You can not start a session with something in a home.
To give an example, I have a server with an address of 2001:db8:10::1 and you are coming from 2001:db8:20::1 I will allow it because my firewall is set up for it. But a home firewall will not allow a new connection from my web server to your home device.
I'm not sure i understand. If the traffic needs to be generated from the lan, does that mean that when i'm away from home the server needs to regularly try to ping my device so that my device can send it traffic?
Much like how you need to setup port forwarding for your servers back in the IPv4 days, you need to setup firewall rules for IPv6 servers.
"If a packet is arriving in server IP:Port, simply accept it"
That would be one way, but your phone would drop the unsolicited traffic.
This is why people recommend using a VPN when away from your home for anything self hosted. Your VPN connection will bring you into the trusted LAN so you can talk unsolicited.
Firewalls in sensible routers will drop new incoming IPv6 packets by default anways, unless you initiated the connection first.
So in effect it's just like NAT (people on the Internet can't see you without an initial connection), but without the internal IP:Port → external IP:Port translation and all the disadvantages associated with it.
But some router manufacturers treat IPv6 as a second-class citizen, which could be a problem.
Not a network expert, but I have the same question.
I would like to limit access to my internal network to only trusted devices, so something like a VPN is needed anyway.
And I don't want to expose my internal setup through DNS either.
Still though, IPv6 is better. But I don't feel easy doing what this guy is doing.