Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    FNEWS_PUBLISH    |    I think its just the Fidonews ezine only    |    1,536 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,117 of 1,536    |
|    FidoNews Robot to All    |
|    FidoNews 42:01 [02/08]: General Articles    |
|    06 Jan 25 00:07:16    |
      MSGID: 2:2/2.0 1048873c       REPLY: 2:2/2.0 1048873a       CHRS: CP850 2       =================================================================        GENERAL ARTICLES       =================================================================               IPv6 only experiment        By Michiel van der Vlist, 2:280/5555              In my last week's (or last year's if you want) article *1) I mentioned       Alex Haydock's IPv6 only project. *2) This inspired me to have a look       at how Fidonet systems would behave in such an environment. My conclu-       sion was that the "problem" of literal IPv4 addresses in the nodelist       can be worked around by using binkp.net. At the end of that part I       wrote: "Did I test this? Yes of course! See next week's article..."              So here it is: a report of what I tested and how.              I choose to not build an entire IPv6 only environment like Alex       Haydock did but to use the minumum required for the test I had in       mind. Just a single system with IPv6 only access: The laptop running       my point system. That laptop (a Dell Latitude D620, running WIN7) has       WiFi on board and an RJ45 connector for UTP cable. It has a manual       switch to enable/disble the WiFi. So the first step was to switch off       the WiFi and connect the laptop to the LAN with a cable. This allowed       me to easely switch between the original setup and the IPv6 only       setup. Just plug/unplug the cable and unset/set the WiFi switch.              The second step was to disable IPv4 in the LAN cable interface.              After doing that I found out I no longer had access to the Internet.       It turned out the DNS servers of my provider (Caiway Fiber) do not       work well in an IPv6 only environment. Malus point for Caiway! The DNS       servers of my other provider (Ziggo) do not have that problem. No big       deal because for the test I had in mind, I have to use other DNS       servers anyway. I need DNS64 and NAT64 to be able to access IPv4 only       systems. Contrary to Alex Haydock I do not have a provider that offers       these services so I have to look elsewhere. Instead of building a       NAT64 gateway myself just for this experiment, I decided to make use       of a third party. The free service of Kasper Dupont was not hard to       find. *3) All I had to do was to configure the wired LAN interface to       use he following DNS servers:               2a00:1098:2c::1        2a01:4f8:c2c:123f::1        2a01:4f9:c010:3f02::1              These are DNS64 servers. For accessing IPv4 only systems they refer to       his NAT64 gateway. That is all that is needed to create an IPv6 only       environment with DNS64/NAT64 support.              For details on the working of DNS64/NAT64: Google is your friend! *4)              After configuring the above DNS servers binkd could connect to IPv6       nodes and most IPv4 nodes in the nodelist. IPv6 nodes are connected       as usual and IPv4 only nodes are connected via the NAT64 gateway.       So to the other side they will appear to come from the IPv4 WAN       address of the gateway. 95.216.219.126 in this case. It will back       resolve to nat64.dyndns.dk. So if you have an IPv4 only binkp node       and you see that in your logs with an incoming connection from       2:280/5555.1 that was me testing.              For nodes listed with a literal IPv4 address a work around is still       needed. DSN64/NAT64 does not work with literal IPv4 addresses. The       work around - as mentioned in my previous article *1) - is to use       binkp.net. After manually configuring * for the literal adresses in       binkd.cfg these nodes were connected without further problems.              So running a Fidonet node in an IPv6 only environment is no problem.              There are a few snags though. For one, it is not possible to connect       to nodes that advertise IPv6 connectivity but do not actually support       it. I could not connect to 240/8010. Binkd times out and that's it.       There is no fall back to IPv4 in this configuration. Of course there       isn't! This is IPv6 only remember!? So if we want to prepaire for an       IPv6 only Internet, we'd better get used to that. But for those who       are not quite ready for that there is a work around, but it is a bit       more complicated. Configure [2a00:1098:2c::5:93.236.155.101] as the       literal IPv6 address for binkd to connect. Here we bypass the DNS64       and directly connect to the NAT64 gateway. 2a00:1098:2c::5: is the       prefix used by the NAT64 gateway and 93.236.155.10 is the IPv4 address       of the node in question. Writing the last 32 bits of an IPv6 address       as an IPv4 quad is a legitimate way of writing an IPv6 address though       not all applications may understand it. Apparently the WIn32 version       of binkd does. Your milage may vary.              This method could also be used to connect to IPv4 only nodes with a       literal IPv4 address though it may not be practial.              Authors of scripts that generate a configuration file for binkd from       the nodelist may consider to add either method as an option.              It goes without saying that incoming IPv6 is no problem in this confi-       guration. It works as before.              Incoming IPv4... Well, there isn't. Not in this IPv6 only configura-       tion. In my, now 7+ year old DS-Lite emulation experiments *4-8), I       demonstrated that running an IPv6 node without incoming IPv4 is do-       able. And for those who can not or do not want to renounce incoming       IPv4 yet, there is Feste-ip.net. *7) But maybe we should just forego       incoming IPv4 for a while to entice the IPv4 only sysops of Fidonet to       adopt IPv6. :-)              As a side note: I wonder how long Kasper Dupont will continue this       service. It is free and open to all without any registration or other       authorisation. I feel a bit uncomfortable about that, it looks like a       recipe for abuse. But he has been running it for over five years now,       so it may not be a serious problem. So it feels OK for a short and       simple test.              Another problem with public NAT64 gateways is similar to the problem       with the 6to4 tunnels that some of us are still using: services using       geolocation to grant access may get confused because all traffic seems       to come from the gateway, not from the originator. Not a problem for       Fidonet I'd say, but for other use it may be.              For those and some other reasons I would prefer a NAT64 gateway run       by my provider if I ever start to use this permanently. I have two       providers at the moment and neither of them provides such a service.       I may make that a goal for the coming year. Or next year...                     References:              1) FN 41:53 Dec 2024 IPv6 in 2024       2) https://blog.infected.systems/posts/2024-12-01-no-nat-november/       3) https://nat64.net/       4) https://en.wikipedia.org/wiki/IPv6_transition_mechanism       5) FN 34:31 Jul 2017 DS-Lite emulation experiment v2.0       6) FN 34:37 Sep 2017 DS-Lite emulation experiment 2.0, the results       7) FN 34:33 Aug 2017 DS-Lite: a solution       8) FN 34:38 Sep 2017 DS-Lite Emulation experiment v2.1                            -----------------------------------------------------------------              --- Azure/NewsPrep 3.0        * Origin: Home of the Fidonews (2:2/2.0)       SEEN-BY: 2/2 10/0 1 103/705 105/81 124/5016 128/187 154/30 203/0 2       SEEN-BY: 203/124 412 218/0 1 700 221/0 226/30 227/114 229/110 114       SEEN-BY: 229/426 428 470 700 705 230/0 240/1120 5832 280/464 5003       SEEN-BY: 280/5555 291/111 292/8125 301/1 320/219 341/66 234 423/81       SEEN-BY: 423/120 467/888 712/848 902/26 5020/400       PATH: 2/2 203/0 280/464 103/705 218/700 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca