• slate@sh.itjust.works
    link
    fedilink
    arrow-up
    7
    arrow-down
    2
    ·
    1 day ago

    I like that none of my local devices are externally addressable unless an outgoing connection has been established. You can (and should) achieve the same thing with ipv6, but then it’s essentially just maintaining a NAT table without the translation piece. I think that makes sense in both protocols.

    • r00ty@kbin.life
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      With IPv6 for most use cases there’s actually more security. With privacy extensions (pretty sure it’s enabled on windows by default), when you make connections from your device, it uses a “private” IP. That is a randomly chosen address inside your network’s prefix, that changes regularly.

      These addresses don’t accept incoming connections. You have a main address that doesn’t really change that you accept connections on. Firewall that for ports you want to allow and then hackers need to port scan 2^64 or 2^80 address space to find your real IPs in your prefix. If they capture your IP from a connection to a web server etc, they won’t have luck scanning you.

      Again as per my post above, the biggest risk right now is bad default configurations on many home routers.

    • Eager Eagle@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      exactly, I also like this peace of mind for my home network and see no benefit in using ipv6 there. Similarly for any VPC I deploy to an IaaS.

      • unquietwiki@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 hours ago

        I’m actually trying a hybrid approach with some VPCs: use firewalled IPv6 ports for remote management, direct to the VMs; while siphoning off the IPv4 traffic to a basic Linux host with Netfilter rules acting as a NAT router. I keep the benefits of using IPv6, without eating up a bunch of external IPv4 addresses, that I would also have to account for on filtering.

    • Laser@feddit.org
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      I like that none of my local devices are externally addressable unless an outgoing connection has been established.

      This can also be achieved using (other) firewall rules.

      but then it’s essentially just maintaining a NAT table without the translation piece.

      So… a firewall?

      NAT isn’t a security feature and shouldn’t be relied on for managing access to hosts.

      It also breaks the assumption of IP that connections between hosts are end-to-end, which requires sophisticated solutions so that everything works (more or less).

      I too employ NAT to make services accessible over IPv4. But only because it doesn’t work otherwise. Not because it “makes sense”. I don’t use it at all for IPv6.