Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 4141  |
|  Victor Sudakov to Michiel van der Vlist  |
|  Connection Tests  |
|  11 Apr 23 09:33:44  |
 REPLY: 2:280/5555 6434155d MSGID: 2:5005/49 6434c8a4 CHRS: CP866 2 TZUTC: 0700 TID: hpt/fbsd 1.9.0-cur 2019-12-05 Dear Michiel, 10 Apr 23 15:46, you wrote to me: MV>>> Please eleborate... VS>> The Transmission torrent client, and the syncthing file VS>> synchronization utility can use the UPnP protocol to request a VS>> firewall to pass *IPv4* incoming traffic (and create a port VS>> porwarding for IPv4 NAT). They cannot however (at least to my VS>> knowledge) use UPnP or any other protocol to request a router to VS>> open a hole for incoming traffic in an *IPv6* firewall. MV> I see. Or so I think. You ask for some kind of "IPv6 equivalent" for MV> UPnP. But why would you want that? UpNP is a questionable idea anyway. MV> For IPv4 it creates an entry in de NAT table and as a side effect MV> creates a hole in the firewall. MV> But why would you need that for IPv6? MV> For IPv6 there (normally) is no NAT, so no need to create an entry in MV> a NAT table. The "IPv6 equivalent" for UPnP is not for creating entries in the NAT table (which is absent in IPv6). It is for creating rules in an IPv6 firewall allowing incoming traffic to an application running on an IPv6-enabled host. A firewall (IPv4 or IPv6) is usually configured to block incoming traffic which is not part of an established outgoing connection. MV> In IPv6 avery device has a Unique Global Address, so one MV> can simply create pinholes in advance as needed for the address in MV> question. Only when you know the IPv6 address and port beforehand. Usually an IPv6 address on the home LAN is dynamic (SLAAC), and the port in peer-to-peer applications, VoIP applications etc is often dynamic too. Victor Sudakov, VAS4-RIPE, VAS47-RIPN --- GoldED+/BSD 1.1.5-b20170303-b20170303 * Origin: Ulthar (2:5005/49) SEEN-BY: 1/123 10/0 1 15/0 50/109 90/1 103/705 104/117 105/81 106/201 SEEN-BY: 123/131 124/5016 153/757 7715 154/10 203/0 214/22 218/0 1 SEEN-BY: 218/215 700 860 221/0 1 6 226/30 227/114 229/110 111 112 SEEN-BY: 229/113 206 307 317 400 424 426 428 452 470 550 664 700 240/1120 SEEN-BY: 240/5832 266/512 280/464 5003 5006 5555 282/1038 292/854 SEEN-BY: 292/8125 301/1 113 812 310/31 317/3 320/219 322/757 341/66 SEEN-BY: 341/234 342/200 396/45 423/120 460/58 463/68 467/888 633/280 SEEN-BY: 712/848 770/1 5000/111 5001/100 5005/49 53 5015/46 5020/545 SEEN-BY: 5020/715 830 846 1042 4441 5030/49 5053/51 5054/8 5058/104 SEEN-BY: 5064/56 5075/128 5080/102 5083/1 444 PATH: 5005/49 5020/1042 301/1 280/464 103/705 218/700 229/426 |
[ << oldest | < older | list | newer > | newest >> ]