!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

920 Members
Declaratively manage your switching, routing, wireless, tunneling and more.271 Servers

Load older messages


SenderMessageTime
5 Feb 2026
@tezlm:celery.eu.orgtezlm set a profile picture.23:03:04
6 Feb 2026
@midischwarz12:libg.somidischwarz12 left the room.03:01:57
7 Feb 2026
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zone K900: Do you have a nice nftables ruleset for ipv6 at home? 19:00:09
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI haven't really done the due diligence when it comes to blocking unsolicited v6 inbound19:00:26
@k900:0upti.meK900No19:01:24
@k900:0upti.meK900I have honestly not bothered19:01:35
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneSo you're doing the same as me and just not caring?19:01:42
@k900:0upti.meK900Basically19:01:48
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI found this post, it's pretty true https://ipv6.net/blog/ipv6-home-network-firewall-risks/19:01:50
@albertlarsan68:albertlarsan.frAlbert LarsanTbh I have my devices secured the same as for IPv4, ie services do not listen on 0.0.0.0 or :: if I want to keep them LAN-local or limited to localhost (also have firewalls, but they have holes for all the same ports)19:11:07
@albertlarsan68:albertlarsan.frAlbert LarsanMy (ISP-provided) home router has a (quite strict) IPv6 firewall enabled by default, which I disabled because it was annoying19:12:24
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneso every device on your LAN is still reachable?19:13:56
@albertlarsan68:albertlarsan.frAlbert LarsanYeah, but good luck finding them in the 2⁶⁴ sea of IPs they could have19:14:55
@albertlarsan68:albertlarsan.frAlbert LarsanAnd I have a personal router behind the ISP router that does ping rate-limiting19:15:44
@albertlarsan68:albertlarsan.frAlbert LarsanBefore the (W)LAN is reached19:15:59
@k900:0upti.meK900Hmm you know what actually19:16:33
@k900:0upti.meK900 networking.firewall.filterForward is a thing 19:16:39
@k900:0upti.meK900And does basically just enough and just stupid enough for me to enable it19:16:47
@albertlarsan68:albertlarsan.frAlbert LarsanI think it would break my dn42 stuff though19:17:19
@k900:0upti.meK900Hmm actually this kinda sucks now19:19:59
@k900:0upti.meK900I guess I need miniupnpd19:20:32
@k900:0upti.meK900OK so22:04:10
@k900:0upti.meK900I fell down a fucking hole again22:04:13
@k900:0upti.meK900Our miniupnpd can't do IPv6 pinholing22:04:31
@k900:0upti.meK900This enables it in just the package; https://github.com/NixOS/nixpkgs/pull/48810422:04:40
@k900:0upti.meK900Which is basically a no-op because it can't make anything worse22:04:47
@k900:0upti.meK900 However, right now our firewall basically does ct status dnat accept 22:05:44
@k900:0upti.meK900Which works for v4 because there is NAT22:05:49
@k900:0upti.meK900 But not for v6, because pinholing is not NAT 22:05:55
@k900:0upti.meK900And the miniupnpd chain is never actually hit22:06:04

Show newer messages


Back to Room ListRoom Version: 6