med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

409
active users

#ipv6

18 posts9 participants1 post today
gyptazy<p>What do you guys do with your left-over (public) IPv4 addresses? And no, that’s meant for real :)</p><p><a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> <a href="https://mastodon.gyptazy.com/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/Ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ipv6</span></a> <a href="https://mastodon.gyptazy.com/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.gyptazy.com/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/aws-lambda-inbound-ipv6-connectivity-aws-privatelink/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/aws-lambda-inbound-ipv6-connectivity-aws-privatelink/</span></a></p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/ipv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6only</span></a> <a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/amazon-memorydb-supports-ipv6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/amazon-memorydb-supports-ipv6/</span></a></p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/ipv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6only</span></a> <a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Jima :Compromise_bi_flag:<p>And another <a href="https://mspsocial.net/tags/HowIPv6HelpedMeThisWeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowIPv6HelpedMeThisWeek</span></a> (from another week) related to this toot, I have a BIND nameserver in my homelab with 112 views (for shenanigans reasons), and I can't expose that construct to the internet without either <a href="https://mspsocial.net/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>, or some truly hideous port-based NAT hijinks (which, ugh, no thank you).</p><p>(And worse: I actually have two of them now. 😂)<br><a href="https://mspsocial.net/@jima/114354031715285418" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mspsocial.net/@jima/1143540317</span><span class="invisible">15285418</span></a></p>
hallunke23 🇺🇦<p>Wie wäre es, ihr kümmert euch mal um den <a href="https://troet.cafe/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>|-Rollout auf social.bund.de? Ja, ihr müsstet dafür entweder Fa. T-Systems etwas bearbeiten oder den Hoster wechseln. Aber es lohnt sich, weil euch dann endlich die Grundfunktionen der genutzten Dienstleistung zur VErfügung stehen würden! <span class="h-card" translate="no"><a href="https://social.bund.de/@Bundesregierung" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Bundesregierung</span></a></span></p>
Jill Veldhuis 💾<p>Noob-level <a href="https://kind.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a> <a href="https://kind.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> question:</p><p>My home computers are connected through a router and, although they're clearly using NAT through said router for IPv4, they appear to all have outside IPv6 addresses. Are those addresses directly accessible from outside? When adding AAAA records to my outside DNS zones, should they point to my router's address, or the target machine's?</p>
Martin Pugh<p>Today, <a href="https://bsd.network/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> to the rescue. </p><p>I broke DHCP for the legacy IP space on my pfSense router today but thanks to running dual stack I could reconnect using the IPv6 address and fix things. I was trying to move to using <a href="https://bsd.network/tags/Ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ansible</span></a> for managing pfSense and somehow despite getting zero errors and Ansible reporting things as idempotent, things were unhappy.</p><p>I managed to get back into the router and deleted the new records, recreating them manually and everything is working again. No clue what I broke yet, but yay for IPv6.</p>
TheDragon 🔥<p>As someone who until the past year or so had not really taken the time to (seriously) consider using <a href="https://hachyderm.io/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> .... </p><p>finding this gist has really made this feel like it *might* actually be not *quite* as scary as I'd always envisaged.</p><p>I honestly wish I'd understood sooner that devices could be set to only use IPv6 ULAs (Unique Local Addresses), as a result making them unreachable *directly* from the internet, sooner! </p><p>I had always envisaged a need to carefully operate and maintain firewalls directly on all individual local only devices.</p><p><a href="https://gist.github.com/timothyham/dd003dbad5614b425a8325ec820fd785" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/timothyham/dd0</span><span class="invisible">03dbad5614b425a8325ec820fd785</span></a></p><p>Is there anything I should be mindful/aware of, or think about, in addition to the points highlighted in this gist?</p><p>If this helps gets me from IPv4 only to IPv6 mostly, I hope I can contribute anything "extra" mentioned in replies (and/or from my own experience) back to the gist, and hopefully help others in the process!</p><p>TIA! 🙏</p>
Max Resing<p>Just wanted to share some thoughts on <a href="https://infosec.exchange/tags/RFC9715" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC9715</span></a> - an <a href="https://infosec.exchange/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> that defines standards on reducing the <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> issue of IP fragmentation over <a href="https://infosec.exchange/tags/UDP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UDP</span></a>. It's not a long read, but a good one for everyone who understands the issues of large UDP responses on the <a href="https://infosec.exchange/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a>. A great leap forward to (hopefully) reduce the reflection/amplification <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> potential of DNS.</p><p>Just today I learned that <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> will share their public DNS resolvers to limit to ~1400 bytes (smaller adjustments expected while figuring out the sweet spot in production). From now on, DNS responses which exceed this limit will have the truncated flag set instructing the client to resolve back to <a href="https://infosec.exchange/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a>. </p><p><a href="https://infosec.exchange/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> <a href="https://infosec.exchange/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://infosec.exchange/tags/ietf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ietf</span></a></p>
Yvan ー イボん 🗺️ :ferris: :go:<p><a href="https://hachyderm.io/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> is hell</p><p>So much easier to go <a href="https://hachyderm.io/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> only.</p>
sep<p><span class="h-card" translate="no"><a href="https://floss.social/@9to5linux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>9to5linux</span></a></span> i guess that is good. But until ipfire 3 is out, with <a href="https://snabelen.no/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> support, this project is unfortunatly not a realistic firewall alternative</p>
gyptazy<p>Oops! The MXP01 (Italy) peer had some fuck ups, followed by some insane traffic f*ckups at 3AM &amp; 6AM on the other instances.</p><p>Rule Nr. 1: Even changing a single character can result in f*ckups. Always test!</p><p><a href="https://mastodon.gyptazy.com/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mastodon.gyptazy.com/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.gyptazy.com/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a> <a href="https://mastodon.gyptazy.com/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.gyptazy.com/tags/traffic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>traffic</span></a> <a href="https://mastodon.gyptazy.com/tags/fail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail</span></a> <a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a></p>
lw<p>new freebsd PR: merge traceroute6 into traceroute</p><p><a href="https://github.com/freebsd/freebsd-src/pull/1647" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freebsd/freebsd-src</span><span class="invisible">/pull/1647</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/aws-end-user-messaging-ipv6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/aws-end-user-messaging-ipv6/</span></a></p><p><a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a></p>
Miyuru Sankalpa<p>Looks the <span class="h-card" translate="no"><a href="https://mastodon.archive.org/@internetarchive" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internetarchive</span></a></span> crawler has IPv6 now. Using their own ASN.</p><p><a href="https://web.archive.org/web/20250405000858/https://ipv6.icanhazip.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025040500</span><span class="invisible">0858/https://ipv6.icanhazip.com/</span></a></p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/internetarchive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internetarchive</span></a></p>
Kevin Bowen :xfce:<p><span class="h-card" translate="no"><a href="https://hachyderm.io/@rishi556" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rishi556</span></a></span> <span class="h-card" translate="no"><a href="https://ipv6.social/@miyuru" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>miyuru</span></a></span> </p><p>I suppose we could ask <span class="h-card" translate="no"><a href="https://fosstodon.org/@kev" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kev</span></a></span> directly which aspect of fosstodon doesn't support <a href="https://fosstodon.org/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> instead of speculating amongst ourselves. 😄</p>
Kevin Bowen :xfce:<p><span class="h-card" translate="no"><a href="https://ipv6.social/@miyuru" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>miyuru</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@rishi556" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rishi556</span></a></span> </p><p>As far as I know, Fastly provides fosstodon with CDN &amp; dDos protection services not hosting. As far as I can tell, that <a href="https://fosstodon.org/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> address won't allow access to the fosstodon website. I get the following error in my browser:</p>
HoldMyType<p>Yggdrasil is a new experimental compact routing scheme. It is designed to be a future-proof and decentralised alternative to the structured routing protocols commonly used today on the Internet, as well as an enabling technology for future large-scale mesh networks. <br><a href="https://mathstodon.xyz/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <br><a href="https://yggdrasil-network.github.io/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yggdrasil-network.github.io/</span><span class="invisible"></span></a></p>
Kevin Bowen :xfce:<p>Bummer. fosstodon.org's host doesn't support <a href="https://fosstodon.org/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a></p>
saiki 🚒💨:manjaro: :debian:<p><span class="h-card" translate="no"><a href="https://elbmatsch.de/@DerSchulze" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DerSchulze</span></a></span> Ich nutze auch einen, weil ich hier hinter nem CGNat mit <a href="https://social.tchncs.de/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> stecke und keine IPv4 habe :D aber für gewisse Dinge im Selfhost braucht man leider noch ne <a href="https://social.tchncs.de/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a>.</p>