Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And that's the thing. With a firewall and IPv6 we can each configure for what we want without the NAT hassle/expectation.

I would aim for a default block with allowList and agree with you that a non-IoT host using a UPnP-like mechanism (does UPnP cover IPv6 firewall like scenario?) is probably ok.

Ideally I'd like some kind of notification system where I can click "allow" for the firewall. (Maybe the firewall notifies my phone?) I think UPnP as it currently stands is a bit too hands off but can understand not every user wants to deal with this.

And we agree regards mobiles being in a default hostile environment and expecting it to work. But I see that as a matter of fit-for-purpose. I don't trust every computer I have to that level.



> does UPnP cover IPv6 firewall like scenario?

The miniupnpd UPnP daemon (used e.g. by OpenWRT) includes code[0] to handle IPv6 "pinhole" requests—not port forwarding, which isn't required for IPv6, but rather just opening a port in the firewall to permit incoming connections to a certain host.

[0] https://github.com/miniupnp/miniupnp/blob/b734f94bdf6ff555a2...


Awesome reference.

I wish I could upvote you multiple times. This interaction with you has been most enlightening. Thank you.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: