home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 4141 
 Victor Sudakov to Michiel van der Vlist 
 Connection Tests 
 11 Apr 23 09:33:44 
 
REPLY: 2:280/5555 6434155d
MSGID: 2:5005/49 6434c8a4
CHRS: CP866 2
TZUTC: 0700
TID: hpt/fbsd 1.9.0-cur 2019-12-05
Dear Michiel,

10 Apr 23 15:46, you wrote to me:

 MV>>> Please eleborate...

 VS>> The Transmission torrent client, and the syncthing file
 VS>> synchronization utility can use the UPnP protocol to request a
 VS>> firewall to pass *IPv4* incoming traffic (and create a port
 VS>> porwarding for IPv4 NAT). They cannot however (at least to my
 VS>> knowledge) use UPnP or any other protocol to request a router to
 VS>> open a hole for incoming traffic in an *IPv6* firewall.

 MV> I see. Or so I think. You ask for some kind of "IPv6 equivalent" for
 MV> UPnP. But why would you want that? UpNP is a questionable idea anyway.
 MV> For IPv4 it creates an entry in de NAT table and as a side effect
 MV> creates a hole in the firewall.

 MV> But why would you need that for IPv6?

 MV> For IPv6 there (normally) is no NAT, so no need to create an entry in
 MV> a NAT table.

The "IPv6 equivalent" for UPnP is not for creating entries in the NAT table
(which is absent in IPv6). It is for creating rules in an IPv6 firewall
allowing incoming traffic to an application running on an IPv6-enabled host. A
firewall (IPv4 or IPv6) is usually configured to block incoming traffic which
is not part of an established outgoing connection.

 MV> In IPv6 avery device has a Unique Global Address, so one
 MV> can simply create pinholes in advance as needed for the address in
 MV> question.

Only when you know the IPv6 address and port beforehand. Usually an IPv6
address on the home LAN is dynamic (SLAAC), and the port in peer-to-peer
applications, VoIP applications etc is often dynamic too.

Victor Sudakov, VAS4-RIPE, VAS47-RIPN
--- GoldED+/BSD 1.1.5-b20170303-b20170303
 * Origin: Ulthar (2:5005/49)
SEEN-BY: 1/123 10/0 1 15/0 50/109 90/1 103/705 104/117 105/81 106/201
SEEN-BY: 123/131 124/5016 153/757 7715 154/10 203/0 214/22 218/0 1
SEEN-BY: 218/215 700 860 221/0 1 6 226/30 227/114 229/110 111 112
SEEN-BY: 229/113 206 307 317 400 424 426 428 452 470 550 664 700 240/1120
SEEN-BY: 240/5832 266/512 280/464 5003 5006 5555 282/1038 292/854
SEEN-BY: 292/8125 301/1 113 812 310/31 317/3 320/219 322/757 341/66
SEEN-BY: 341/234 342/200 396/45 423/120 460/58 463/68 467/888 633/280
SEEN-BY: 712/848 770/1 5000/111 5001/100 5005/49 53 5015/46 5020/545
SEEN-BY: 5020/715 830 846 1042 4441 5030/49 5053/51 5054/8 5058/104
SEEN-BY: 5064/56 5075/128 5080/102 5083/1 444
PATH: 5005/49 5020/1042 301/1 280/464 103/705 218/700 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca