On Sun, Apr 27, 2014 at 04:29:18PM +0200, Jeroen Massar wrote:
> 
> This seems completely unrelated to mtr or let alone Debian...
> 
> If your tunnel is "broken", then report that to SixXS, there is a nice
> ticket system at https://www.sixxs.net/tickets/. Do provide actual
> details instead of making factless statements in the Debian bug system.
> 
> I am one of the users of the chzrh02 PoP and is working like a charm.
> And the rare of chance that it does not, it typically gets reported by
> multiple users and also resolved very quickly. Init7 definitely does care.
> 
> If you thus have issues, it definitely is something you have to look into.

I personally have a good understanding of IPV4 and how I've secured my
network against attacks from outside. I know what I'm doing. This
means that I make decisions about what to protect against and what I
won't protect against.

I have decided that I will have "fence security": I protect the
outside, I do not put any effort into protecting my machines from an
attacker who is able to access my network. (either by physically
plugging in or by getting control over a machine on my network).

Now this fancy IPV6 comes along. I've been pusing my hosting provider
for an IPV6 address so that I can gain some experience. I'm not
getting it. My provider at work doesn't give me IPV6 access. My
provider at home doesn't. I could tunnel apparently, but although we
hear that IPV4 addresses are running out any moment now time and time
again, nobody around me seems to be hurrying....

The little I know about IPV6 is that there won't be a need to
"masquerade" like we do now. Well, that masquerading is part of my
security strategy. It is for a lot of people. Their machines are not
on a globally routable IP address range, and their border router just
like mine will masquerade for outgoing addresses and automatically
prevent incoming connections, unless explicitly enabled (port
forwarding).

I know that my machines, when running a recent distribution, obtain an
IPV6 address. If my home router suddenly started giving my home
machines routable IPV6 addresses that would break my "fence". You'd
suddenly be able to connect to my home machine's http port, which for
example has my paragliding logbook database available to anybody who
can connect. No password no nothing. Just the fence.

I don't have control over the modem. The modem might be upgradeable by
the provider. Or the modem may already be IPV6 enabled, but for now it
doesn't get a routable IPV6 address from the provider. When they change
that, all of a sudden the IPV6 addresses on my network may become
routable.

So... best thing to do is to make sure my machine will never talk
IPV6. How about I compile a kernel without IPV6? Or maybe just boot
with ipv6disable=1?

        Roger. 

-- 
** r.e.wo...@bitwizard.nl ** http://www.BitWizard.nl/ ** +31-15-2600998 **
**    Delftechpark 26 2628 XH  Delft, The Netherlands. KVK: 27239233    **
*-- BitWizard writes Linux device drivers for any device you may have! --*
The plan was simple, like my brother-in-law Phil. But unlike
Phil, this plan just might work.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to