!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

908 Members
Declaratively manage your switching, routing, wireless, tunneling and more.267 Servers

Load older messages


SenderMessageTime
7 Feb 2026
@albertlarsan68:albertlarsan.frAlbert LarsanTbh I have my devices secured the same as for IPv4, ie services do not listen on 0.0.0.0 or :: if I want to keep them LAN-local or limited to localhost (also have firewalls, but they have holes for all the same ports)19:11:07
@albertlarsan68:albertlarsan.frAlbert LarsanMy (ISP-provided) home router has a (quite strict) IPv6 firewall enabled by default, which I disabled because it was annoying19:12:24
@matthewcroughan:defenestrate.itmatthewcroughan @fosdemso every device on your LAN is still reachable?19:13:56
@albertlarsan68:albertlarsan.frAlbert LarsanYeah, but good luck finding them in the 2⁶⁴ sea of IPs they could have19:14:55
@albertlarsan68:albertlarsan.frAlbert LarsanAnd I have a personal router behind the ISP router that does ping rate-limiting19:15:44
@albertlarsan68:albertlarsan.frAlbert LarsanBefore the (W)LAN is reached19:15:59
@k900:0upti.meK900Hmm you know what actually19:16:33
@k900:0upti.meK900 networking.firewall.filterForward is a thing 19:16:39
@k900:0upti.meK900And does basically just enough and just stupid enough for me to enable it19:16:47
@albertlarsan68:albertlarsan.frAlbert LarsanI think it would break my dn42 stuff though19:17:19
@k900:0upti.meK900Hmm actually this kinda sucks now19:19:59
@k900:0upti.meK900I guess I need miniupnpd19:20:32
@k900:0upti.meK900OK so22:04:10
@k900:0upti.meK900I fell down a fucking hole again22:04:13
@k900:0upti.meK900Our miniupnpd can't do IPv6 pinholing22:04:31
@k900:0upti.meK900This enables it in just the package; https://github.com/NixOS/nixpkgs/pull/48810422:04:40
@k900:0upti.meK900Which is basically a no-op because it can't make anything worse22:04:47
@k900:0upti.meK900 However, right now our firewall basically does ct status dnat accept 22:05:44
@k900:0upti.meK900Which works for v4 because there is NAT22:05:49
@k900:0upti.meK900 But not for v6, because pinholing is not NAT 22:05:55
@k900:0upti.meK900And the miniupnpd chain is never actually hit22:06:04
@k900:0upti.meK900So uhhh22:06:13
@k900:0upti.meK900Thoughts22:06:14
@raitobezarius:matrix.orgraitobezariusnot deeply familiar with pinholing but doesn't it have any conntrack correspondance?22:15:06
@k900:0upti.meK900Nope22:16:34
@k900:0upti.meK900It's basically just adding a rule for "ip daddr ... tcp dport ... accept"22:17:06
@k900:0upti.meK900You do it on the global IPv622:17:35
@k900:0upti.meK900So the default is to not forward anything into the LAN but a client can ask nicely22:17:47
@raitobezarius:matrix.orgraitobezariusso if this thing dynamically add a ip daddr X tcp dport Y accept, aren't you just missing ip6_forwarding=1 ?22:19:29
@k900:0upti.meK900The problem is that it's adding it to its own chain22:19:51

Show newer messages


Back to Room ListRoom Version: 6