Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Enterprise Networking Mikrotik Routers (RouterBoard & RouterOS), User and owner discussion group

views
     
asellus
post Jan 6 2024, 11:16 PM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 6 2024, 10:36 PM)
It is an option if the user decide that's the way forward, given the full context and list the actual problem.

I already gave him the option to disable IPv6 Firewall and never buy another Mikrotik again if his use case don't need it.

However I have a problem with people wording it as IPv6 is not mature, blah blah and disable until 2025.

It's time to move away from dual-stack network. It's double the work, double the trouble and it didn't solve IPv4 exhaustion problem.

People who insist to stay on IPv4 is clearly incompetent and lazy. Everyone who run dual-stack are appeasing to them.
*
Dual-stack network is going to be here for a very long time, at least 20 to 30 years more. IPv4 are going to be around and will never go away. Equipment vendors like Cisco/Huawei/ZTE/Nokia et. al has already done the needful therefore maintaining a dual-stack network is not double the work or trouble over maintaining an IPv6-only network or ones that features things like 464XLAT. Disabling IPv6 firewall is a worse thing to do than to completely disable IPv6. Just disable IPv6 when push come to shove.
asellus
post Jan 6 2024, 11:32 PM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 6 2024, 11:27 PM)
That's your opinion and I have no problem if user chose it given they have full context and know what is the problem.

You gotta be kidding me when you said it's not double the work and double the trouble. You clearly don't run a huge network. I wrote about it in Unifi forum when somebody else imply the same thing.
*
The massive problems TM will face if it goes 464XLAT far outweigh the work and trouble running a dual-stack network. A Malaysia mobile network operator that I will not name here has trialled it some time back and in the end they goes nope.avi and cancelled the trial.
asellus
post Jan 6 2024, 11:39 PM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 6 2024, 11:27 PM)

If you need perimeter security to save you, your security is clearly broken. The default IPv6 firewall rules in Mikrotik merely emulate NAT by allowing established connection and drop the rest.
*
And if you think client-level firewall is good enough to prevent hacking or unauthorized access or anything like that, then you have a very optimistic view of Internet security. routerOS default IPv6 rules doesn't do NAT, where on earth did you see that?
asellus
post Jan 7 2024, 12:24 AM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 6 2024, 11:48 PM)
I said it merely emulates NAT by accepting established connection and drop everything else.
I didn't say it do NAT per RFC or what not.

*
Since when iptables emulates NAT to allow established connection while dropping everything else?

QUOTE(kwss @ Jan 6 2024, 11:48 PM)

You are going further and further away by bringing in XLAT464, name drop Cisco, etc.
You tell people to disable IPv6 without context I will call you out again, and again, and again.

*
Of course I will bring up XLAT464 and Cisco because you say dual-stack network should go away. When you tell the public that dual-stack network is bad, be very prepared to be pushed back. Dual-stack network is the only way to offer IPv6 connectivity without breaking customers' applications and appliances. TM already has problems with their current consumer setup and ditching it for an IPv6-only network will make things much worse.

If you insist that dual-stack network has to go away, I for sure will call you out again, and again, and again.

QUOTE(kwss @ Jan 6 2024, 11:48 PM)

Enlighten me what Mikrotik default IPv6 firewall rule does. I am ready to learn from you how it beats client side firewall, or even when there's no open port client side.

*
From https://help.mikrotik.com/docs/display/ROS/...+First+Firewall

CODE

/ipv6 firewall filter
add action=accept chain=input comment="allow established and related" connection-state=established,related
add chain=input action=accept protocol=icmpv6 comment="accept ICMPv6"
add chain=input action=accept protocol=udp port=33434-33534 comment="defconf: accept UDP traceroute"
add chain=input action=accept protocol=udp dst-port=546 src-address=fe80::/10 comment="accept DHCPv6-Client prefix delegation."
add action=drop chain=input in-interface=sit1 log=yes log-prefix=dropLL_from_public src-address=fe80::/10
add action=accept chain=input comment="allow allowed addresses" src-address-list=allowed
add action=drop chain=input


Pretty much self-explanatory I say for anyone who understand iptables.
What you don't understand is that very many IPv6-supporting client devices has no security whatsoever or very poor at it. A good example would be Playstation 5. If a PS5 got a public IPv6 address via DHCPv6 or SLAAC and the router has no firewall, better pray to Jesus or Allah or Buddha or flying spaghetti monster that there are no zero days for the PS5 that will turn it into part of a botnet. The Xbox has done better in this aspect. If you go to sites like insecam or even Shodan, you will see that client-side security is not exactly a given. Good for you if you can guarantee that all devices has top-notch security, but that's not always feasible.
asellus
post Jan 7 2024, 12:49 AM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 7 2024, 12:37 AM)
The rules you posted confirm exactly what I mention. Accept established connection and drop everything else. Obviously you posted your custom rule there as well but the gist is that it emulate NAT. Whatever connection not established will be dropped, hence the term NAT firewall.

*
iptables can emulate NAT, but iptables did not use that feature to accept established connection while dropping everything else.


QUOTE(kwss @ Jan 7 2024, 12:37 AM)
I just did a project for pure IPv6 core using Segment Routing v6. IPv4 is at the edge using stateless NAT64 and NAT46 to provide IPv4 as a Service.

You dislike XLAT464, you have your reason. I never mention it, never bring it up. You keep talking as it's the one and only way forward.

Yes dual stack need to die. It is going to die.
Incompetent people like you don't want it gone because you don't need to do IPv6.

*
Stateless NAT64 and NAT46? Oh boy, damn. Thanks god TM isn't going to implement this because the 100 line, and the Maya live chat and Facebook direct message support lines are going to be swamped with "Why my [insert device's name here] doesn't work?" questions.

QUOTE(kwss @ Jan 7 2024, 12:37 AM)
Still waiting for enlightenment how that IPv6 rule beats client-side firewall.

*
Apparently you just glossed over the Playstation 5 example.
asellus
post Jan 7 2024, 07:48 AM

#gompusas
Group Icon
Elite
4,541 posts

Joined: Jan 2003
From: BSRPPG51 Access Concentrator


QUOTE(kwss @ Jan 7 2024, 01:03 AM)
CODE

/ipv6 firewall filter
add action=accept chain=input comment="allow established and related" connection-state=established,related

This rule did it. Not sure why you keep harping on iptable. How Mikrotik did it delivers what I described.

I did it for hyperscaler, not eyeball network. But I am sure the same method works with CGNAT, where they get their address via IPv4 as a service. CPE side continue as its with dual stack.

See, you quickly say my method don't work for you without any context, as if I don't know Steam don't work with NAT64 or XLAT464.

I glossed over because you are blaming one security issue on IPv6, plus you lie about Shodan.

So many IPv4 network get hacked everyday yet nobody call it the IPv4 problem. Everything that showed up in Shodan is very well IPv4 problem, or is it?
When the term "IPv6" appear, suddenly it's all IPv6 fault.
Is it a Layer 3 protocol problem or is it a general security issue?
*
Don't tell me that you did not know that the firewall rule is just a wrapper for an iptables command, or ip6tables to be exact. That's why I mentioned iptables directly instead of routerOS firewall.

When I talk about Shodan, I am talking about client-level security in general, not IPv6 only to be exact. The devices you see in Shodan are all devices with lousy client-level security implementations, but you assume that all devices out there has stellar client-level security implementations, at least for IPv6. You rely too much on the hope that device manufacturers will implement robust security on their IPv6-supporting devices, but not all will do so, just like Sony.




4 Pages « < 2 3 4Top
 

Change to:
| Lo-Fi Version
0.0168sec    0.58    7 queries    GZIP Disabled
Time is now: 28th November 2025 - 05:54 AM