home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   IPV6      The convoluted hot-mess that is IPV6      4,612 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 4,142 of 4,612   
   Victor Sudakov to Michiel van der Vlist   
   Connection Tests   
   11 Apr 23 09:47:00   
   
   REPLY: 2:280/5555 6434155d   
   MSGID: 2:5005/49 6434ca25   
   CHRS: CP866 2   
   TZUTC: 0700   
   TID: hpt/fbsd 1.9.0-cur 2019-12-05   
   Dear Michiel,   
      
   10 Apr 23 15:46, you wrote to me:   
      
    MV>>> Please eleborate...   
      
    VS>> The Transmission torrent client, and the syncthing file   
    VS>> synchronization utility can use the UPnP protocol to request a   
    VS>> firewall to pass *IPv4* incoming traffic (and create a port   
    VS>> porwarding for IPv4 NAT). They cannot however (at least to my   
    VS>> knowledge) use UPnP or any other protocol to request a router to   
    VS>> open a hole for incoming traffic in an *IPv6* firewall.   
      
    MV> I see. Or so I think. You ask for   
      
   It is not even that I *ask for* it. I've read here, some messages ago, that   
   some home router declared "IPv6 punch-holing support." Infortunately I could   
   not find more information either about the model of the router or its features.   
      
      
    MV> for some kind of "IPv6 equivalent" for   
    MV> UPnP. But why would you want that? UpNP is a questionable idea anyway.   
    MV> For IPv4 it creates an entry in de NAT table and as a side effect   
    MV> creates a hole in the firewall.   
      
    MV> But why would you need that for IPv6?   
      
    MV> For IPv6 there (normally) is no NAT, so no need to create an entry in   
    MV> a NAT table.   
      
   The "IPv6 equivalent" for UPnP is not for creating entries in a NAT table   
   (which is absent in IPv6). It is for creating rules in an IPv6 firewall   
   allowing incoming traffic to an application running on an IPv6-enabled host. A   
   firewall (IPv4 or IPv6) is usually configured to block incoming traffic which   
   is not part of an established outgoing connection.   
      
    MV> In IPv6 avery device has a Unique Global Address, so one   
    MV> can simply create pinholes in advance as needed for the address in   
    MV> question.   
      
   Only when you know the IPv6 address and port beforehand. Usually an IPv6   
   address on the home LAN is dynamic (SLAAC), and the port in peer-to-peer   
   applications, VoIP applications etc is often dynamic too.   
      
   The situation is different of course when you are hosting an IPv6 web-server   
   or something like that. It would have a fixed IPv6 address and port anyway, so   
   there is no need for punch-holing the firewall.   
      
   Victor Sudakov, VAS4-RIPE, VAS47-RIPN   
   --- GoldED+/BSD 1.1.5-b20170303-b20170303   
    * Origin: Ulthar (2:5005/49)   
   SEEN-BY: 1/123 10/0 1 15/0 50/109 90/1 103/705 104/117 105/81 106/201   
   SEEN-BY: 123/131 124/5016 153/757 7715 154/10 203/0 214/22 218/0 1   
   SEEN-BY: 218/215 700 860 221/0 1 6 226/30 227/114 229/110 111 112   
   SEEN-BY: 229/113 206 307 317 400 424 426 428 452 470 550 664 700 240/1120   
   SEEN-BY: 240/5832 266/512 280/464 5003 5006 5555 282/1038 292/854   
   SEEN-BY: 292/8125 301/1 310/31 317/3 320/219 322/757 335/364 341/66   
   SEEN-BY: 341/234 342/200 396/45 423/120 460/58 256 1124 5858 463/68   
   SEEN-BY: 467/888 633/280 712/848 770/1 4500/1 5000/111 5001/100 5005/49   
   SEEN-BY: 5005/53 5015/46 5020/545 715 830 846 1042 4441 5030/49 5053/51   
   SEEN-BY: 5054/8 30 5058/104 5064/56 5075/128 5080/102 5083/1 444   
   PATH: 5005/49 5020/1042 221/6 460/58 280/464 103/705 218/700 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca