Top
Best
New

Posted by mahirsaid 3 days ago

I spent a week without IPv4 (2023)(www.apalrd.net)
164 points | 352 comments
jrmg 2 days ago|
I’m surprised home many technically knowledgeable people on Internet forums still think IPv6 is some niche, unreliable thing.

In my direct experience, in the USA, at least Spectrum, AT&T, and Xfinity (Comcast) still run IPv4, of course, but they also have IPv6 working and on by default on their home internet offerings.

All mainstream computer and mobile OSes support it by default and will prefer to connect with it over IPv4.

‘Everyone’ in many areas is using it. For many of us, our parents are using Facebook and watching Netflix over it. Over 50% of Google’s American traffic is over it. It just works.

nine_k 2 days ago||
T-Mobile, a major phone provider, runs an ISP which is IPv6 only. That is, your phone never gets an IPv4, unless connected to WiFi. They offer home access points with a 5G modem and a router; the external address is also IPv6 only.

It works plenty well. I access everything accessible via IPv6, and the rest through their 464XLAT, transparently.

My LAN still has IPv4, because some ancient network printers don't know IPv6. OpenWRT on my router supports IPv6 just fine. Of course I do not expose any of my home devices to the public internet, except via Wireguard.

themafia 2 days ago||
Ironically there's T-Mobile Business which is static IPv4 only.
nine_k 2 days ago|||
I suspect it's an acquired property with a sufficiently separate network.
immibis 2 days ago||
If the service area is the same, it's probably tunneled. You'd be surprised how much tunneling ISPs use. They're not connecting your network directly to their network.
xiconfjs 1 day ago|||
Not here in Germany - our T-Mobile Business access only gets a static IPv6 and our main fiber uplink from Telekom (same provider) gets both.
ekr____ 2 days ago|||
Well, for some value of "just works".

For example, I recently attended the IETF meeting in Montreal, which offers a by default v6-only network. My Mac worked fine, but my son's school-issued Chromebook had glitchy behavior until I switched to the network that provided v4.

josephg 2 days ago||
Sounds like exactly the sort of thing the IETF's IPv6-only network is trying to shake out.

I went to IETF a few years ago and ran into issues on their IPv6 only network because I host some stuff from home, and my residential ISP doesn't support IPv6 at all. It made me really want to get all that fixed.

LeoPanthera 2 days ago|||
My problem with IPv6 is that my ISP (Xfinity) won't give me a static prefix, so every now and again it changes.

Unlike IPv4, my LAN addresses include the prefix, so every time they change it, all my LAN addresses change.

Combined with the lack of DHCP6 support in many devices, this means reverse DNS lookups from IP to hostname can't be done, making identifying devices by their IP essentially impossible.

db48x 2 days ago|||
I think you’re conflating multiple things there. There’s nothing magical about IPv4 that gives your LAN addresses stability when your ISP changes your IP prefix. That’s provided by your router doing network address translation. You send a packet from your address which is 192.168.0.42 (a local address), and your router changes the bytes in the packet so that it comes from X.Y.Z.W (your router’s public address). If you really wanted it to your router could do the same thing for IPv6.

IPv6 also has local addresses, but a lot more of them. Anything starting with fd00::/8 is a local address with 40 bits available as the network number. So you can set up your local network with the prefix fdXX:XXXX:XXXX::/48 (where the Xs are chosen randomly) as the prefix and still have 16 bits left over for different subnets if you want. These addresses do not change when your ISP changes your public prefix.

And if you want to add reverse dns for SLAAC addresses then just have your router listen for ICMPv6 Neighbor Announcement addresses and use them to update your DNS server as appropriate. Or configure your servers to use stable addresses based on their MAC address rather than random addresses (which are better for privacy), and then just configure the DNS as you add and remove servers.

mahirsaid 1 day ago|||
Keep in mind the WAN AND LAN preferences associated.
littlecranky67 2 days ago|||
what servers?
Dylan16807 2 days ago||
The things on your LAN that you're connecting to via DNS and IP, which cause the desire to have stable LAN IPs in the first place.
shibapuppie 2 days ago||
That's what DNS is for... to not need to remember or know numerical addresses.
Dylan16807 2 days ago||
And DNS is easier to set up if the IP doesn't change constantly.

This conversation is going in circles.

vel0city 2 days ago||
If you're doing your DNS properly it's not really that difficult. If you're statically definining all your DNS you're doing it wrong.
Dylan16807 2 days ago|||
Okay, how do I properly set DNS so it tracks the changing public addresses of my desktop and printer? And I'd better still be able to use SLAAC.
vel0city 2 days ago||
You register addresses based on Router/Neighbor Advertisements in NDP. In your RA, you'd point it to your DNS server, which would then handle registration when hosts check in with their new IP addresses.
stereo 2 days ago|||
Which dns server supports this kind of dynamic dns in practice?
shibapuppie 2 days ago|||
Wow look, DNS has the solutions!
immibis 2 days ago|||
How, exactly, pray tell, is "properly"?
throw0101c 2 days ago||||
> Unlike IPv4, my LAN addresses include the prefix, so every time they change it, all my LAN addresses change.

Yes, a topic of active discussion at the IETF. See perhaps BCP RFC 9096, "Improving the Reaction of Customer Edge Routers to IPv6 Renumbering Events":

* https://datatracker.ietf.org/doc/html/rfc9096

And informational RFC 8978, "Reaction of IPv6 Stateless Address Autoconfiguration (SLAAC) to Flash-Renumbering Events":

* https://datatracker.ietf.org/doc/html/rfc8978

A few drafts, like "Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to Flash Renumbering Events":

* https://datatracker.ietf.org/doc/html/draft-ietf-6man-slaac-...

Using ULA seems to be what a lot of folks recommend:

* https://en.wikipedia.org/wiki/Unique_local_address

baq 2 days ago||||
you should advertise a local prefix (anything in fd00::/8) in your network and it should just work. no need to use the isp-provided prefix for lan.
justaboutanyone 2 days ago|||
There are some address source selection problems if you're still using any ipv4 for the local services https://blog.ipspace.net/2022/05/ipv6-ula-made-useless/
jeroenhd 2 days ago||
Are those problems? If either addressing method works and is reachable, who cares which one end up getting used first?
silb 2 days ago|||
For IPv6, multiple addresses on an interface is the norm: an interface has both a public address from your ISP (replacing IPv4 NAT) and a unique local address (replacing stable IPv4 RFC 1918 LAN addresses).
hdgvhicv 2 days ago||||
My ISP will route as many /64s to me as I want (I think I get a /48 by default, I guess if I want more than 64k subnets I’d have to justify it)

So I don’t have the changing ip issue. I do however have an issue if I want to change ISP as it’s a whole mess of rules to update rather than a couple of dns entries and two dst nat rule (one per public IP)

I believe the idea in v6 if you have multiple prefixes on the same network - including a local fc00::/7 one for local services. Layers and layers of things to break.

ebiederm 2 days ago||
Odd.

Using Openwrt which pretty much all home routers are built on, all I have to do is tell my router which offset to give my subnets from the prefix and it does the rest.

Both for subdividing up the prefix from the ISP and my ULA prefix I use for internal devices.

I have changed ISPs I think 3 times with no ill effects. Plus it works when my ISP occasionally gives me a new prefix.

The only tweaking I had to do was when I went from an ISP that game me a /48 to one that only gave me a /56. I had been greedy and was handing a /56 to my internal router. I changed that to a /60 and updates it's expectations about which subnets it could hand out and all was good.

But I expect two layers of home routers without NAT is a bit of an exception.

karlshea 2 days ago||||
Use a ULA (unique local address) for everything internal that you want shorter. It's just like rfc1918 addresses except you don't need NAT.
Sleaker 2 days ago||||
Well.. that's because with ipv6 you're not technically on a lan everything is exposed by default unless you set it all up differently.
Dagger2 2 days ago||
Nope, you're on a LAN, and usually the router has a firewall that blocks inbound connections by default. Some OSs (like Windows) also have their own by-default firewalls that block connections from hosts on different networks out of the box.
bcoates 2 days ago|||
Is reverse dns even a thing outside of irc and forgetting to give command line tools the "don’t be slow" flag?
esseph 2 days ago||
If you run a traceroute with DNS on, that is referencing DNS PTR records of those IP addresses.

(same for ping)

phito 2 days ago|||
Myeah... I've had weird issues on my network that I could only resolve by disabling IPv6. Granted, it's probably my fault, but if everything still works fine with ipv4 that's fine to me. One day I will get into it and learn how it work and maybe I'll get it figured out... One day...
Dagger2 2 days ago||
Random guess: PMTUD? Like on v4, some people fuck up their PMTUD and are incapable of realizing or fixing it, so you have to have some kind of workaround.

If setting your client machine MTU to 1280 (`ip link set mtu 1280 dev eth0` or equivalent) magically fixes it, that's your problem.

josephg 2 days ago|||
Urgh I wish it were like that here in Australia! We have a fast, modern fiber internet connection in inner Melbourne. But my ISP still doesn't support IPv6 at all. I file a ticket about once a year, and I'm always met with more or less the same response - essentially that there's no demand for it.

I'd love to test all the internet services I host to make sure everything works over IPv6, but I can't. At least, not without using a 4to6 relay of some sort - but that adds latency to everything I do.

I just checked - apparently my ISP is "evaluating IPv6" because they're running out of IPv4 addresses and want to use CGNAT for everyone. I suppose its not the worst reason to switch to ipv6. But they've been making excuses for years. I really wish they'd get on with it.

hdgvhicv 2 days ago|||
Corporate laptop won’t work (their version of windows seems to require an ipv4 adddess on an interface, not sure if that’s a windows thing or a them thing)

Doesn’t remove the need for nat - my wired IsP might be able to bgp with me, but my backup 5g won’t, and when I want to choose which to send my traffic through with PBR that means natting.

My router doesn’t support 64, so I have to use my isp’s which is speed constrained compared with native 4. Ok that’s on my setup. Haven’t tested my 5g provider and where 64 occurs, I’d hope in their network, but how do I configure my dns64.

Still need to provide v4 at the edge and thus 46 nat so I can reach internal v6 only servers from v4 only locations

Perhaps lost of that is because my router doesn’t do 64, but again that just shows that v4 is still essential. I haven’t found a single service that’s v6 only, so if I have to run a v4 network (even if only as far as a 64 natting device) why bother running two networks, double the opportunity for misconfiguration and thus security holes. Enabling dual v6 on my IoShit network would allow more escape routes for bad traffic, meaning another set of firewall rules to manage. Things like SLACC make it harder to work out what devices are on the network, many end user devices are user hostile now and keeping control of them on v4 alone is less work than in v4 and v6.

labcomputer 2 days ago|||
> Doesn’t remove the need for nat - my wired IsP might be able to bgp with me, but my backup 5g won’t, and when I want to choose which to send my traffic through with PBR that means natting.

Yes, it does. You just have each of your routers (wired and 5G) advertise the /64 prefix delegated by each of your ISPs. Your hosts will self-assign a v6 address from each prefix.

To control which link the traffic uses, you just assign router priority in the router advertisement (these are all standard settings in radvd.conf).

> Things like SLACC make it harder to work out what devices are on the network

Again, not true. If you really don’t trust your devices, then DHCP isn’t going to save you. Malicious hosts absolutely can self assign an unused v4 address, and you’ll be none the wiser if you just look at your DHCP leases.

toast0 2 days ago||
> Yes, it does. You just have each of your routers (wired and 5G) advertise the /64 prefix delegated by each of your ISPs. Your hosts will self-assign a v6 address from each prefix.

> To control which link the traffic uses, you just assign router priority in the router advertisement (these are all standard settings in radvd.conf).

Have you done this? Did it actually work for you?

When I tried it, clients would regularly send to router B with an address from router A, and often ignore the priorities. As I understand the RFCs/client behavior, the router priority field is only relevant if multiple prefixes are in a single advertisement, otherwise most recent advertisement wins.

Once you need to aggregate the advertisements, you may as well NAT66, cause it will be easier.

bblb 2 days ago|||
>their version of windows seems to require an ipv4 adddess on an interface

Could be DirectAccess. Microsoft's earlier built-in VPN solution before Always On VPN. DirectAccess works only with IPv4 inbound so you can't use IPv6 only stack. Under the hood it uses a combination of v4-v6 transition and translation protocols, but it still requires the Windows client machines to have IPv4 addresses.

If you can run PowerShell commands on the laptop and if "Get-DnsClientNrptPolicy" returns some DirectAccessDnsServers then it's DA laptop.

mightyham 2 days ago|||
For consumer traffic, your probably right. In data centers, cloud computing, and various enterprise networking solutions, IPv4 is still king. I'm sure IPv6 would work fine in all these use cases, but as long as many large tech companies are not exhausting the CIDR ranges they own (or can opt for using private ranges) there is no impetus to rework existing network infrastructure.
betaby 2 days ago||
> cloud computing

Nope. Large scale DCs are IPv6 only underneath, exascalers like Google and Meta have stated that multiple times. I.e. https://www.youtube.com/watch?v=Q3ird3UDnOA also see various NANOG talks https://www.youtube.com/@TeamNANOG/videos

kortilla 2 days ago|||
The underlay might be v6, but that doesn’t change the fact that people heavily use v4 for the actual workload traffic (i.e. the cloud computing part). EC2 VPCs still default to v4 only last time I checked.

Hyper scalers != cloud computing.

immibis 2 days ago||||
A great many home ISPs are also IPv6 only, and tunnel your IPv4 packets.
umanwizard 2 days ago|||
What about Amazon?
opan 2 days ago|||
I had working IPv6 in the past, but currently I seem to have no working IPv6. Using Xfinity. I have access to some servers at a friend's place in another city, pretty sure he also doesn't have IPv6. Maybe some phone calls would sort it out, but when "everything" still works (with IPv4), it's hard to care.
bigstrat2003 2 days ago||
That is really bizarre, because I have Comcast and I find their IPv6 support excellent. The only complaints I have are that I wish you could get bigger than a /60 prefix (a /56 would be nice), and that I wish it was feasible to get a static prefix as a residential customer. Granted you said you don't really care to fix it, but if that ever changes I do think you could get them to fix it pretty easily. IPv6 is one of the things they generally do right.
oarsinsync 2 days ago||
Curious what you’re doing that requires more than 16 SLAAC-enabled subnets (or a lot more non-SLAAC enabled subnets)
cornonthecobra 2 days ago|||
CenturyLink, an ILEC, only offers IPv6 using 6rd gateways. The IPv6 throughput is a fraction of IPv4 and has much higher latency. During peak times, the 6rd gateway saturates, forcing me to stop advertising the prefix to restore internet access. It has been this way for years.

It is also impossible to report IPv6-specific outages. CenturyLink technical support is the worst of the worst, with agents utterly incapable of doing more than pushing a "check ONT" button on their end and scheduling a technician visit with a multiday window. If you ask them for the 6rd configuration information, they act like you're speaking an alien language.

Even among their technicians, IPv6 knowledge is rare. Imagine the guy installing hundreds of dollars of gigabit fibre equipment at your demarc staring you like an idiot because you spoke two extra syllables between "IP" and "address". I'd think the term "IPv6" is chatbot poison if it weren't for the fact it's a human physically in front of me.

The result is their service is effectively IPv4-only.

toast0 2 days ago|||
I had CenturyLink CPE that would crash when a fragmented IPv6 transitted it. That was fun :P. They're also all in on PPPoE and at least on my VDSL2 line, didn't enable RFC 4638 (baby jumbos) to get back to MTU 1500. Pretty happy to be on muni fiber now (although the installation cost was huge).
cornonthecobra 2 days ago||
Ya my router has to do tagged PPPoE through the ONT even though I pay for a static /28. At least I don't have to also do RIP for the subnet like Xfinity requires.

Interestingly, if I pay for their IPTV service the internet side becomes a bare ethernet port over which I can do DHCP for the upstream interface and number the downstream subnet out of my /28.

I have debated paying for TV service as a sanity fee.

kstrauser 2 days ago|||
Ah, good ol’ CenturyLink: “We put the TTY in TTY.” Be happy it’s not IPv4 over telegraph.
evanjrowley 19 hours ago|||
Over the past 10 years, the majority of "my internet stopped working" cases have been solved by disabling IPv6. In each case, it's AT&T who for some reason can't seem to operate it reliably.

My own home is Verizon, and they simply do not offer IPv6 in my area (nearby Washington DC).

paulddraper 2 days ago|||
> It just works.

Until you want to like, use GitHub.

notKilgoreTrout 2 days ago||
There is a clean bifurcation between just works and Microsoft compatible.
mahirsaid 2 days ago|||
i don't like how these companies dictate standards. It's always the case, but they do spend a great deal of money making sure practices morph into standards.
m463 2 days ago||
they figured out the "de facto standard" game...

for example:

Microsoft Word DOC. Due to the market dominance of Word, it is supported by all office applications that intend to compete with it, typically by reverse engineering the undocumented file format. Microsoft has repeatedly internally changed the file specification between versions of Word to suit their own needs, while continuing to reuse the same file extension identifier for different versions.

https://en.wikipedia.org/wiki/De_facto_standard

paulddraper 2 days ago|||
Whoa! Did you see where those goalposts went?
notKilgoreTrout 2 days ago|||
Presumably, they were working before Microsoft came up and they needed to be embraced, extended and extinguished.

https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguis...

orangeboats 2 days ago|||
Your goalpost already moved from "IPv6 just works" to "IPv6-only just works" though. ;)

In all seriousness, I have IPv6 enabled and GitHub works just fine for me. Though at a slower speed sometimes because the IPv4 CGNAT is heavily congested in my area.

paulddraper 2 days ago||
If you count that as IPv6 just working, sure.
chasing0entropy 2 days ago|||
There so e obvious caveats that make ipv6 migration impossible for most users: 1. Ipv6 bridges are not practical at scale which means best case is dual use protocols for a decade (or more) which no one wants to support.

2. Actual implementation MUST be ubiquitous (it never will be) some examples - glo fiber in Virginia, and while I can get pfsense assigned a ipv6 address, there is usually no upstream gateway (meaning that if I disable IPv4, I will not have internet). I say usually because of four times I've checked, once I did get assigned a gateway which was unresponsive even to icmp.

Starlink roam - assigns ipv6 but no bridge so if you disable v4 you lose access to most internet.

Frontier FiOS in Florida - does not support ipv6 at all on my node. I have seen business nodes in Orlando/Tampa assign addresses with bridging but again, without browser or dns translation it's not a practical solution.

3. 'Everyone' is not using ipv6, everyone plugs in or logs into a device that has whatever network stack it has. Those users are not suddenly going to jump through hoops simply to avoid CGNAT and get a unique network address

4. Infrastructure; I have two modest half racks on the east coast at decent sized datacenters (esolutions and peak10), neither of those hosts offer ipv6 routing blocks by default. No provider I have gotten quotes for offers ipv6 by default

1vuio0pswjnm7 2 days ago|||
"I'm surprised home many technically knowledgeable people on Internet forums still think IPv6 is some niche, unreliable thing."

Where can we read some examples of this

I've read commentary about pros and cons of IPv6 over the years but never anything that suggested IPv6 was "niche" or "unreliable"

1vuio0pswjnm7 1 day ago|||
NB. The requests is for examples that inspired the quoted statement

In order to have inspired the quoted statement these examples would have to be found in forum comments published before the quoted statement was made

Comments made in response to, i.e., after, the quoted statement would not qualify

MaKey 2 days ago|||
The comment from phil21 directly above yours calls IPv6 unreliable.
inemesitaffia 1 day ago||
It is for many.
whatevaa 2 days ago|||
I'm in Europe. My country ISPs have actually too many ipv4 addresses so zero ipv6 support at any of them.
anonym29 2 days ago|||
Not all of the skepticism is "does IPv6 work", some of it is "why should I want it as an end user who values privacy and minimal attack surface?"

From my perspective:

• CGNAT is a feature, not a bug. I'm already deliberately behind a commercial VPN exit node shared with thousands of others. Anonymity-by-crowd is the point. IPv6 giving me a globally unique, stable-ish address is a regression.

• NAT + default-deny inbound is simple, effective security. Yes, "NAT isn't a firewall", but a NAT gateway with no port forwards means unsolicited inbound packets don't reach my devices. That's a concrete property I get for free.

• IPv6 adds configuration surface I don't want. Privacy extensions, temporary addresses, RA flags, NDP, DHCPv6 vs SLAAC — these are problems I don't have with IPv4. More features means more things to audit, understand, and misconfigure.

• I already solved "reaching my own stuff" without global addressing. Tailscale/Headscale gives me authenticated, encrypted, NAT-traversing connectivity. It's better than being globally routable.

So yes, my parents are using IPv6 to watch Netflix. They're also not thinking about their threat model. I am, and IPv4-only behind CGNAT + overlay networking serves it well.

"It just works" isn't the bar for me to adopt IPv6. "It serves my goals better than IPv4" is the bar, and IPv6 doesn't meet it. Never has, never will.

IPv6 wasn't designed as "IPv4 with more bits." It was designed as a reimagining of how networks should work: global addressability as a first-class property, stateless autoconfiguration, the assumption that endpoints should be reachable. That philosophy is baked in. For someone like me, whose threat model treats obscurity, indirection, and minimal feature surface as assets, IPv6 isn't just unnecessary, it's ideologically opposed to what I want.

Want me to adopt a new addressing scheme? Give me a new addressing scheme, don't impose an opinionated routing philosophy on me.

oarsinsync 2 days ago||
> Anonymity-by-crowd is the point

Only for IP based trackers. Any webpages embedding facebook/twitter/microsoft/google trackers have already deanonymised you through a variety of fingerprinting techniques. This includes if you use private browsing sessions, and even qubesOS. You get a fuzzy feeling doing the things you do (and I do these things too), but that battle is lost.

> NAT + default-deny inbound is simple, effective security … That's a concrete property I get for free

Depends on your definition of “free”. Is it cheaper to lookup just a connection state table, or is it cheaper to look up both a connection state table and a NAT table?

> IPv6 adds configuration surface I don't want … More features means more things to audit, understand, and misconfigure.

100% agreed. More complexity, more attack surface, more things to go wrong.

> I already solved "reaching my own stuff" without global addressing … It's better than being globally routable.

I do something like this too. It’s more private and more secure. It adds more complexity, and it restricts my ability to access things from terminals I don’t personally own & control unless I create another exposed vector though. “Better” is subjective based on metrics being optimised for.

> IPv6 wasn't designed as "IPv4 with more bits." It was designed as a reimagining of how networks should work: global addressability as a first-class property

Apologies, but global addressability as a first-class property is exactly how the internet was designed. NAT was originally deployed as a hacky add-on to temporarily alleviate the lack of addressing space in IPv4 until a successor could resolve that.

That said, the internet of the 90s was a very different beast to the internet of today. A lot of your concerns and perspective is absolutely valid and extremely reasonable given the internet of today.

> "It serves my goals better than IPv4" is the bar, and IPv6 doesn't meet it. Never has, never will … Want me to adopt a new addressing scheme? Give me a new addressing scheme, don't impose an opinionated routing philosophy on me.

IPv6 can absolutely be configured in ways that just gives you a new addressing scheme and does away with a lot of the other complexity. You’re just very much straying off the happy path, removing complexity by introducing … other complexity.

FWIW, I’m operating my home networks much the same way you do. I’ve also been dual stacking networks since the 2000s. Things have come a long way since the original pure-dogma introduction of ipv6.

anonym29 2 days ago|||
Thank you for the thoughtful response.

To be fair about fingerprinting, there's no such thing as "bulletproof", but I do have a pretty robust setup. DNS level ad and tracker blocking, browser extension level ad and tracker blocking, LibreWolf's extensive anti-fingerprinting measures, kernel-level measures like kloak, I block all third party JS by default, etc. My goal isn't to become invisible and untraceable to nation states (which is essentially impossible when 90%+ of all global ISPs can and do sell netflow metadata, enabling timing and packet size correlation even across multiple hops, even with background traffic forgery / traffic pattern obfuscation), but rather to frustrate lower-level tracking efforts, and mostly to reduce attack surface for security reasons, and to reduce the total amount of information I'm sending to adversaries, even if it technically increases uniqueness. For instance, WebGL, JS JIT, WASM, WebRTC, and even SVG rendering are similarly disabled by default on my browsers, and I may very selectively enable them on a case-by-case basis depending on how important I feel the web property I'm trying to access actually is. I'll spoof my UA, my screen dimensions, and use residential SOCKS5 proxies, one by one, to identify which fingerprinting measures are being used to block me with YouTube, for instance, without enabling JIT compilation or SVG rendering. This approach absolutely does make me more distinctly identifiable (less anonymous), but doesn't necessarily make me less private, nor less secure, if e.g. ad network JS never even runs on my box in the first place. Security is the base of the pyramid, it is the prerequisite for privacy, but doesn't guarantee it. Privacy is the middle layer, it is the prerequisite for anonymity, but doesn't guarantee it. I'm aggressively climbing that pyramid where I can while accepting some tradeoffs where the net benefit is positive to me. I don't think of any of these - security, privacy, or anonymity - as binary properties, but rather a unified journey I am on to enhance gradually and iteratively over time. Switching to IPv6 would greatly complicate and regress my path through much of the journey I've already completed.

If I could leave you with a couple questions: What tangible benefits have you reaped from IPv6 that simply weren't possible on IPv4? Has the ROI for you on going dual stack outweighed the costs on your time, attention, and configuration work required for securely handling edge cases, dealing with weird or unexpected routing issues, for straying from the happy path?

oarsinsync 1 day ago||
> What tangible benefits have you reaped from IPv6 that simply weren't possible on IPv4?

Personal networks: Globally unique addressing. That then lends itself to not needing any kind of split DNS for services, or worrying about addressing clashes with whatever LAN I happen to be on with my own network.

Work networks: Increased revenues.

> Has the ROI for you on going dual stack outweighed the costs on your time, attention, and configuration work required for securely handling edge cases, dealing with weird or unexpected routing issues, for straying from the happy path?

Personal networks: Absolutely not. I removed the dual stacks and went back to IPv4 only everywhere.

Work networks: That's a question for the bean counters.

astrobe_ 2 days ago|||
> Any webpages embedding facebook/twitter/microsoft/google trackers have already deanonymised you

I bet OP has already blocked at least 3 of them. Private browsing is only a partial solution, blocking/unblocking domains, scripts, etc. on a case-by-case basis is a more reliable way to defend your right to privacy against abusive practices (I'm talking about fine grained adblockers such as uMatrix/uBlockOrigin) daily.

I admit it can be a hassle sometimes, in particular if one explores the net every day, but staying away from bad actors (such as some of those 4) is one way to maybe eventually stop them - even if "vote with your clicks" feels as pointless as "vote with your feet" when you're just one in many millions.

rkagerer 2 days ago||
How well do those 4 trackers track you if you don't have accounts with any of them?
oarsinsync 2 days ago||
Extremely well. You don’t need an account to have a unique fingerprint that will eventually tie to an identity somewhere, and data brokers exist specifically for this purpose.
ekr____ 2 days ago|||
Well, for some value of "just works".

For example, I recently attended the IETF meeting in Montreal--practically the epicenter of v6 thinking--which offers a by default v6-only network. My Mac worked fine, but my son's school-issued Chromebook had glitchy behavior until I switched to the network that provided v4.

pyuser583 2 days ago|||
It’s still a pain to manage ipv6 AWS infrastructure via Terraform.
6r17 2 days ago|||
I'm "niche" - but i had issues with Wireguard being able to connect me through ipv6 to a v4 - other than that i spent most of my time on v6 and as you said it just works
esseph 2 days ago|||
Yes the largest companies have the most resources. Makes sense.

Most do not.

There are far more single person, small, and mid sized companies that do not.

This includes b2b, regional ISPs, etc.

m463 2 days ago|||
I use ipv4 on my internal lan, and turn off ipv6

It is well supported, easy to configure, private, secure.

...and I don't have to configure and secure ipv6 in parallel

raffraffraff 2 days ago||
This! I guess a good number of tech people will have IPv4 home networks long after their non-tech parents, neighbors and friends will be using IPv6 (without even knowing it).

IPv4 in the home is dead easy. You only need to remember the last digit (unless you've got multiple networks, but most won't). You can ssh to any device by remembering that ".1" is router, ".2" is NAS etc. Firewalls are simple.

You can buy a cheap domain and use it as your home DNS (eg "router.myhome.net" -> "192.168.0.1") so it works anywhere! In the home or roaming (over VPN). I don't really need to run DNS at home. My domain runs on Cloudflare DNS, my devices use NextDNS (with rebind protection disabled for my home domain).

I run OpenWRT and preallocate DHCP addresses for all known devices. Then I shrink the DHCP pool to a blacklisted range. A script automatically creates DNS records for all preallocated devices. If a new device appears in the blacklisted DHCP pool, I can manually allocate its MAC address a proper IP.

It's easy to get TLS certs for any service in the house using the ACME DNS01 challenge.

Tailscale is sexy and it worked fine until one day while roaming it wouldn't connect without "admin work", so I instantly dropkicked it. I'm now using the very unsexy OpenVPN Cloud (free for limited use) and in over two years it has never failed me. Plus it doesn't fuck with the IP addresses with fancypants tailnet addresses - I access devices directly using their DNS names which resolve to private addresses.

So, from inside or outside the home I can access the NAS to watch a movie, sync photos to Immich, print a document, check my IP cameras or ask my wife to put a document on the ancient scanner and access it via the raspberry pi phpscan website (which is on https://scanner.myhome.net)

I'm sure there's a very good reason not to do this and someone will now point it out.

justsomehnguy 2 days ago|||
# IPv6 in the home is dead easy. You only need to remember the last digit (unless you've got multiple networks, but most won't). You can ssh to any device by remembering that ".1" is router, ".2" is NAS etc. Firewalls are simple.

# You can buy a cheap domain and use it as your home DNS (eg "router.myhome.net" -> "2003:123:4:5::1") so it works anywhere! In the home or roaming (over VPN). I don't really need to run DNS at home. My domain runs on Cloudflare DNS, my devices use NextDNS (with rebind protection disabled for my home domain).

# I run OpenWRT and preallocate DHCP addresses for all known devices. Then I shrink the DHCP pool to a blacklisted range. A script automatically creates DNS records for all preallocated devices. If a new device appears in the blacklisted DHCP pool, I can manually allocate its MAC address a proper IP.

# It's easy to get TLS certs for any service in the house using the ACME DNS01 challenge.

There is literally no difference between v4 and v6 here.

raffraffraff 1 day ago||
So why bother with v6?
nottorp 2 days ago|||
> IPv4 in the home is dead easy

Exactly. I randomly try to "upgrade" to ipv6 in my home once in a while and i always give up because I'd have to do the whole enterprisey setup for no good reason.

Edit:

Basically ipv6 is too complex and automated to hold your home network's whole configuration in your head without effort.

So the techies don't set it up at home unless they have a fetish for overcomplicated setups. They're not familiar with it so they don't push for it at work either.

Adoption is solely driven by ipv4 address space exhaustion. There is no "new toy!" feeling involved.

immibis 2 days ago||
IMO, not having NAT is a "new toy". It allows end-to-end connectivity again. Any peer-to-peer apps work much better on IPv6, and if you're developing one then it's actually possible again.

You could try fd00::1, fd00::2, ... for short internal static addresses. You don't have to use a random prefix in that range - it's just policy (for good reasons that might not matter for a small network).

nottorp 2 days ago||
> Any peer-to-peer apps work much better on IPv6, and if you're developing one then it's actually possible again.

Yeah, and my Windows box is again accessible from the outside with whatever services MS deems to run by default...

Yes, there are firewalls, but isn't it better if a potential attacker doesn't even know what's behind my router?

P.S.: Since webrtc showed up to do whatever it wants with my network, peer to peer has started to mean "donating resources to some company" to me.

Dagger2 2 days ago||
v4 networks commonly only get one IP for the whole network, and people use NAT with port forwarding to make inbound connections work. With this setup, an attacker only needs to scan the 65536 ports on the router to exhaustively enumerate every single publicly accessible server on your entire network, which is about 3 megabytes of traffic and takes approximately no seconds.

On v6, you don't use NAT and networks are /64. Finding every server requires scanning 65536 ports on all 2^64 IPs, which is about 72 billion petabytes of traffic. There are ways to prune this down somewhat, but however you do it the search space is still far larger.

If you want attackers to not know what's behind your router, you want v6.

nottorp 1 day ago||
> to exhaustively enumerate every single publicly accessible server on your entire network

Enterprise thinking. It's not the publicly accessible servers i worry about, it's the other boxes that shouldn't be publicly accessible...

Dagger2 23 hours ago||
That's what I meant. On v4, it's trivial to find every server that can be reached from the Internet, whether it was intentional or not. It's not so trivial on v6.
immibis 21 hours ago||
Note that V6 is easier to scan than some people assume. You don't have to scan all 2^128 addresses - you can look at provider address blocks in the registry, and make an assumption (or try it and see) what size block that provider assigns to each server, and then guess the server is ::1 or ::2 in each block. This isn't an exhaustive scan, but you'll find a lot of services this way anyway.
Dagger2 7 hours ago||
You can also e.g. monitor certificate transparency logs for hostnames. But the difference is that without NAT, knowing about one server on the network doesn't automatically give you the IP for every other accessible server on the same network. You have to actually try host IPs one by one instead of the router kindly filling that part in for you.
phil21 2 days ago||
> I’m surprised home many technically knowledgeable people on Internet forums still think IPv6 is some niche, unreliable thing.

The more technically knowledgable you happen to be on the subject, the more you realize IPv6 is some unreliable thing when compared to IPv4. Perhaps no longer niche though.

It's unfortunately still an afterthought for many backbones - and not just US-centric ones. There is a noticeable difference in performance metrics from clients served via IPv4 endpoints vs. IPv6 for web assets in the same locations from the same transit providers.

It is pretty much the opposite of "just works" depending on your definition of "just works". It results in more Traffic Engineering per bit served by a large factor compared to IPv4.

mightyham 2 days ago||
> Peer-to-peer communications such as gaming usually have to deal with NAT traversal, but with IPv6 this is no longer an issue, especially for multiple gamers using the same connection

You know the list of "benefits" is thin when the second item is entirely theoretical. Even though IPv6 doesn't have to do NAT traversal, it still has to punch through your router's firewall which is effectively the same problem. Most ISP provided home routers simply block all incoming IPv6 traffic unless there is outbound traffic first, and provide little to no support for custom IPv6 rules.

Even if that were not an issue, my bet is that there are close to zero popular games that actually use true peer to peer networking.

justaboutanyone 2 days ago||
Punching through just a firewall is much easier than punching through a typical NAT+firewall setup

https://tailscale.com/blog/how-nat-traversal-works

whatevaa 2 days ago|||
How do you punch trough firewalls? You have to manually open them, punching through firewall would be a firewall vulnerability.
tenacious_tuna 2 days ago|||
This is a common function of uPnP, which I've seen as features in router config pages since the mid 2000s.

https://en.wikipedia.org/wiki/Universal_Plug_and_Play#NAT_tr...

ectospheno 1 day ago||
Running a firewall with upnp enabled has always amused me. Might as well just turn the firewall off if you let any machine shoot any hole it wants in it.
mightyham 2 days ago|||
Typically firewalls will record the src and dst header values of outbound IP packets then temporarily allows inbound IP packets that have those values flipped.
mightyham 2 days ago|||
You're just asserting that without explination. Please correct me if I'm wrong, but afiak the only difference in NAT hole-punching is that clients don't know their public port mapping ahead of time. This actually doesn't make a huge difference to the process because in practice, you still want a central rendezvous server for automated peer IP discovery. The alternative being that each peer shares their IP with every other peer "offline", as in manually through an external service like IRC or discord, which is a horrible user experience.
tenacious_tuna 2 days ago||
> You just asserted that without explanation.

They linked a whole article detailing the complexities of specifically NAT traversal.

I should think it obvious that by removing an entire leaky layer of abstraction the process would be much simpler. Yes, you still need a coordination server, but instead of having to deduce the incoming/outgoing port mappings you can just share the "external IP" of each client--which in the IPV6 case isn't "external," it's just "the IP".

mightyham 2 days ago||
I already am aware of how NAT traversal works. Linking a generic article explaining it is not a meaningful response.

Also NAT is a pretty simple abstraction, it's literally a single table.

orangeboats 1 day ago||
>Also NAT is a pretty simple abstraction, it's literally a single table.

...And now, let's try punching a hole through this "simple" table. Oops, someone is using a port-restricted or symmetric NAT and hole punching has gotten just a tad more complicated.

tenacious_tuna 1 day ago||
Agreed; Or they're using CG-NAT, or consumer grade NAT behind CG-NAT, or....
themafia 2 days ago|||
> it still has to punch through your router's firewall

That's why most routers use a stateful firewall. Then nothing has to "punch through" it just has to be established from the local side.

> block all incoming IPv6 traffic unless there is outbound traffic first, and provide little to no support for custom IPv6 rules.

This is why STUN exists.

> my bet is that there are close to zero popular games that actually use true peer to peer networking.

For game state? You're probably right. For low latency voice chat? It's more common than you'd think.

mightyham 2 days ago|||
> it just has to be established from the local side

This is exactly the problem. Unless you expect users to manually share their IPs with every other user in a given lobby through an external service, you would need to make a central peer discovery and connection coordination mechanism which ends up looking pretty similar to classic NAT traversal.

ruszki 2 days ago|||
The complication starts when such an ephemeral port gets connection from somewhere else, which is the crucial part not the creation of such ports. That is not supported necessarily by firewalls, or not that simple than just having a stateful firewall.
brigade 2 days ago|||
Getting a streamer’s IP attracts DDoSes and doxxing, so yeah it’s generally considered a vulnerability to use P2P in games
whatevaa 2 days ago||
Yeah, p2p is fine only with friends, people you know, otherwise it's like posting your private address for everybody to see.
trashtensor 2 days ago|||
Not having a congested CGNAT in the mix at 4pm every day is a nice benefit.
Spivak 2 days ago||
Also NAT66 exists and I use it on my home network so you still have to have the machinery to do NAT traversal when needed. It's nice to use my public addresses like elastic IPs instead of delegating ports. IPv6 stans won't be able to bully their way into pretending that NAT doesn't exist on IPv6.
mojuba 2 days ago||
> Groups of zeros can be omitted with two colons, but only once in an address (i.e. 2000:1::1, but not 2000::1::1 as that is ambiguous)

Can someone explain why it's ambiguous?

On the subject, IPv6 is one of the strangest inventions on the internet. Its utility and practically are obvious no matter how you look at it except... just one thing.

Network-related things are generally easy to remember and then type from memory: IPv4, domain names, standard port numbers. Back in the day it was the phone numbers, again, easy to remember and dial when you need it. IPv6 is just too long and requires copy/paste all the time. This is the only real reason in my opinion, why IPv6 is doomed to be second-grade citizen for (probably) a few more decades.

clashandcarry 2 days ago||
2000:1::1 would expand to 2000:0001:0000:0000:0000:0000:0000:0001

2000::1::1 could be 2000:0000:0000:0000:0001:0000:0000:001, or 2000:00000000:0001:0000:0000:0000:001

There's ambiguity on where to fill in the five groups of 0000 in the second case.

rockskon 2 days ago||
The second address is invalid. You can only use :: once per address.

Edit: Whoops. Didn't read what the above post was in response to. My bad.

tpetry 2 days ago||
That exactly what was the question about and they explained why it is invalid…
throw0101c 2 days ago|||
> This is the only real reason in my opinion, why IPv6 is doomed to be second-grade citizen for (probably) a few more decades.

Except if you're using a mobile phone, in which case many telcos hand out only IPv6 addresses to handsets. 2018 NANOG presentation "T-Mobile's journey to IPv6":

* https://www.youtube.com/watch?v=d6oBCYHzrTA

From 2014, "Case Study: T-Mobile US Goes IPv6-only Using 464XLAT":

* https://www.internetsociety.org/deploy360/2014/case-study-t-...

But who cares about mobile phones, right? They're only second-grade devices.

ck2 2 days ago||
my tmobile 5g modem has ipv4 but changes ip every single page load, it's wild

I'm used to cablemodems with static ipv4 for months basically until mac changes

throw0101c 2 days ago|||
Is it per chance 100.64.0.0/10?

* https://en.wikipedia.org/wiki/IPv4_shared_address_space

WarOnPrivacy 2 days ago||
It could be 21.0/8

ref:https://old.reddit.com/r/tmobileisp/comments/1gg7361/why_is_...

I booted an LTE router using a T-Mobile SIM.

Within an hour I had changed WAN IP. Both were from AS749 US-DOD NIC

    in 33.79.135.0/24 & 21.140.100.0/24.
They were cgnat'd behind TMble's advertised asn.
immibis 2 days ago||||
Your IPv4 packets are getting tunneled to a CGNAT server which has an IP address pool.

Your website will load faster on cellphones if it supports IPv6. This is because the packets take more direct routes (because they don't go to the central CGNAT server) and because less processing is applied to them. Almost all mobile networks are now IPv6-only, with IPv4 traffic tunneled and CGNATted. Apparently T-Mobile is the rare exception.

hylaride 2 days ago|||
> my tmobile 5g modem has ipv4 but changes ip every single page load, it's wild

They're probably using CG-NAT, though IP changes that often is a bit aggressive.

WarOnPrivacy 2 days ago||
> They're probably using CG-NAT, though IP changes that often is a bit aggressive.

TMobile uses IPv4 addys in DOD's address space. They do change unexpectedly often.

And yeah. Being DOD IPs, they're cgnat'd behind tmobile's public ASN.

api 2 days ago|||
I've said this since time immemorial, and networking people often dismiss it. "Just use DNS," say people who have never actually worked netops or devops.

The length of the addresses and the clunky nature of their ASCII representation is absolutely the #1 reason the IPv6 has taken this long. User experience is the most powerful force affecting large scale adoption, and IPv6 has poor UX.

I think the UX is partly fixable by creating less horrible ASCII representation, but this would take a lot of coordination that was hard even back then and is virtually impossible now. If someone told me in 500 years we're still running dual-stack IPv4/IPv6 absolutely unchanged, I'd believe it.

zamadatix 2 days ago||
Half the reason (literally) the address looks so bad is not because of IPv6 but because everyone keeps choosing to implement randomized in-subnet addresses and cycle through them for privacy reasons.

E.g. 2600:15a3:7020:4c51::52/64 is not too horrible but 2600:15a3:7020:4c51:3268:b4c4:dd7b:789/64 is a monster by unrelated intent of the client.

flumpcakes 2 days ago|||
This is pretty much on the money. IPv6 addressing can be pretty simple if you design your subnets and use low numbers for hosts. But hosts themselves will forgo that and randomly generate 64 bit random host addresses for themselves - some times for every new connection. Now you have thousands of IPv6 addresses for a single computer speaking out to the Internet.

"Modern" tooling in the consumer space is pretty dire for IPv6 support too. The best you can reasonably get is an IPv6 on the WAN side and then just IPv4 for everything local. At least from the popular routers I've experienced lately.

api 2 days ago||
I’ve been amazed for years at the fact that many of the best routers turn V6 off by default.

Of course I know why. If you turn it on it slightly increases edge case issues as complexity always does. Most people don’t actively need it so nobody notices.

api 2 days ago|||
Yes, I forgot about SLAAC and worthless privacy extensions.

Privacy extensions are worthless because there are just sooooo many ways to fingerprint and track you. If you are not at least using a VPN and a jailed privacy mode browser at a bare minimum, you are toast. If you’re serious about privacy you have to use stuff like Tor.

V6 privacy extensions are like the GDPR cookie nonsense: ineffective countermeasures with annoying side effects.

SLAAC sucks too. They should have left assignment up to admins or higher level protocols like with V4. It’s better that way.

immibis 2 days ago||
Privacy extensions are the reason your ISP can't make you pay money for the number of internet-connected devices at your house.
zamadatix 1 day ago|||
Most people are just using the ISP provided router as their gateway today anyways. E.g. ATT fiber is proud to advertise to you that it knows about each of your devices on the ONT+Router combo - that's even the only way to set up a port forward (you can't just type in an IP, you have to pick a discovered device).

"But people can NAT the v4 with another router to hide it!" -> sure, and the same crappy solution works with v6.

"But at least prosumers can replace the ONT via cloning the identifiers and certain hardware" -> also no change with v6.

Randomized addresses do have valid use cases though, particularly when connecting to Wi-Fi networks other than your own when set to randomize the MAC per connection (not just the scanning MAC) as well, but I'm just not really convinced this is a realistic example as framed.

api 2 days ago||||
I think you just changed my mind. I hadn’t thought about that angle.
kstrauser 2 days ago||
Respect for considering new information.
mmwelt 2 days ago|||
If ISPs tried that, everyone would just go back to using NAT, even for IPv6.
nwellinghoff 2 days ago|||
I said this in a previous post and was shot down hard. I think you are right. Every time I look at a ipv6 address my brain goes “fack this”.
mike_d 2 days ago|||
IPv4 isn't perfect, but it was designed to solve a specific set of problems.

IPv6 was designed by political process. Go around the room to each engineer and solve for their pet peeve to in turn rally enough support to move the proposal forward. As a bunch of computer people realized how hard politics were they swore never to do it again and made the address size so laughably large that it was "solved" once and for all.

I firmly believe that if they had adopted any other strategy where addresses could be meaningfully understood and worked with by the least skilled network operators, we would have had "IPv6" adoption 10 years ago.

My personal preference would have been to open up class E space (240-255.*) and claw back the 6 /8s Amazon is hoarding, be smarter about allocations going forward, and make fees logarithmic based on the number of addresses you hold.

throw0101c 2 days ago|||
> IPv4 isn't perfect, but it was designed to solve a specific set of problems.

IPv4 was not designed as such, but as an academic exercise. It was an experiment. An experiment that "escape the lab". This is per Vint Cerf:

* https://www.pcmag.com/news/north-america-exhausts-ipv4-addre...

And if you think there wasn't politics in iPv4 you're dead wrong:

* https://spectrum.ieee.org/vint-cerf-mistakes

> IPv6 was designed by political process.

Only if by "political process" you mean a bunch of people got together (physically and virtually) and debated the options and chose what they thought was best. The criteria for choosing IPng were documented:

* https://datatracker.ietf.org/doc/html/rfc1726

There were a number of proposals, and three finalists, with SIPP being chosen:

* https://datatracker.ietf.org/doc/html/rfc1752

> I firmly believe that if they had adopted any other strategy where addresses could be meaningfully understood and worked with by the least skilled network operators, we would have had "IPv6" adoption 10 years ago.

The primary reason for IPng was >32 bits of address space. The only way to make them shorter is to have fewer bits, which completely defeats the purpose of the endeavour.

There was no way to move from 32-bits to >32-bits without every network stack of every device element (host, gateway, firewall, application, etc) getting new code. Anything that changed the type and size of sockaddr->sa_family (plus things like new DNS resource record types: A is 32-bit only; see addrinfo->ai_family) would require new code.

mike_d 2 days ago||
This is a lot of basically sharpshooting, but I will address your last point:

> There was no way to move from 32-bits to >32-bits without every network stack of every device element (host, gateway, firewall, application, etc) getting new code. Anything that changed the type and size of sockaddr->sa_family (plus things like new DNS resource record types: A is 32-bit only; see addrinfo->ai_family) would require new code.

That is simply not true. We had one bit left (the reserved/"evil" bit) in IPv4 headers that could have been used to flag that the first N bytes of the payload were an additional IPv4.1 header indicating additional routing information. Packets would continue to transit existing networks and "4.1" capable boxes at edges could read the additional information to make further routing decisions inside of a network. It would have effectively used IPv4 as the core transport network and each connected network (think ASN) having a handful of routed /32s.

Overlay networks are widely deployed and have very minor technical issues.

But that would have only addressed the numbering exhaustion issues. Engineers often get caught in the "well if I am changing this code anyway" trap.

adrian_b 2 days ago|||
An explicit goal of IPv6 considered as important as the address expansion was the simplification of the packet header, by having fewer fields and which are correctly aligned, not like in the IPv4 header, in order to enable faster hardware routing.

The scheme described by you fails to achieve this goal.

mike_d 2 days ago||
I am glad you brought this up, that is another big issue with IPv6. A lot of the problems it was trying to solve literally don't exist anymore.

Header processing and alignment were an issue in the 90s when routers repurposed generic components. Now we have modern custom ASICs that can handle IPv4 inside of a GRE tunnel on a VLAN over MPLS at line rate. I have switches in my house that do 780 Gbps.

adrian_b 2 days ago||
It is irrelevant what we can do now.

At the time when it was designed, IPv6 was well designed, much better than IPv4, which was normal after all the experience accumulated while using IPv4 for many years.

The designers of IPv6 have made only one mistake, but it was a huge mistake. The IPv4 address space should have been included in the IPv6 space, allowing transparent intercommunication between any IP addresses, regardless whether they were old IPv4 addresses or new IPv6 addresses.

This is the mistake that has made the transition to IPv6 so slow.

throw0101c 2 days ago|||
> The IPv4 address space should have been included in the IPv6 space […]

See IPv4-mapped ("IPv4-compatible") IPv6 addresses from RFC 1884 § 2.4.4 (from 1995) and follow-on RFCs:

* https://datatracker.ietf.org/doc/html/rfc1884

* https://en.wikipedia.org/wiki/IPv6#IPv4-mapped_IPv6_addresse...

yjftsjthsd-h 2 days ago|||
> The IPv4 address space should have been included in the IPv6 space, allowing transparent intercommunication between any IP addresses, regardless whether they were old IPv4 addresses or new IPv6 addresses.

How would you have implemented it that is different from the NAT64 that actually exists, including shoving all IPv4 addresses into 64:ff9b::/96?

zajio1am 2 days ago||
Ideally, 464XLAT should have been there from the beginning and its host part (CLAT) should have been a mandatory part of IP stack.
throw0101c 2 days ago||||
> That is simply not true. We had one bit left (the reserved/"evil" bit) in IPv4 headers […]

Great, there's an extra bit in the IPv4 packet header.

I was talking about the data structures in operating systems: are there any extra bits in the sockaddr structure to signal things to applications? If not, an entirely new struct needs to be deployed.

And that doesn't even get into having to deploy new DNS code everywhere.

Dagger2 2 days ago|||
But v6 did do what you're describing here?

They didn't use the reserved bit, because there's a field that's already meant for this purpose: the next protocol field. Set that to 0x29 and it indicates that the first bytes of the payload contain a v6 address. Every v4 address has a /48 of v6 space tunnelled to it using this mechanism, and any two v4 addresses can talk v6 between them (including to the entire networks behind those addresses) via it.

If doing basically exactly what you suggested isn't enough to stop you from complaining about v6's designers, how could they possibly have done any better?

shawabawa3 2 days ago||||
Imo they should have just clawed 1 or 2 bits out of the ipv4 header for additional routing and called it good enough
immibis 2 days ago||
This would require new software and new ASICs on all hosts and routers and wouldn't be compatible with the old system. If you're going to cause all those things, might as well add 96 new bits instead of just 2 new bits, so you won't have the same problem again soon.
immibis 2 days ago|||
IPv6 is literally just IPv4 + longer addresses + really minor tweaks (like no checksum) + things you don't have to use (like SLAAC). Is that not what you wanted? What did you want?

And what's wrong with a newer version of a thing solving all the problems people had with it...?

There are more people than IPv4 addresses, so the pigeonhole principle says you can't give every person an IPv4 address, never mind when you add servers as well. Expanding the address space by 6% does absolute nothing to solve anything and I'm confused about why you think it would.

WarOnPrivacy 2 days ago|||
> Every time I look at a [long] ipv6 address my brain goes “fack this”.

I do get that but I also get 'There are so many I could have all I wanted ... or I could if any of our fiber ISPs would support it, that is'

hdgvhicv 2 days ago||
I finally clicked when I worked out it was 2^64 subnets . You have a common prefix of you /48, which isn’t much longer than an ipv4 address - especially as it seems everything is 2001::/16, which means you basically have to remember a 32 bit network prefix just like 12.45.67.8/32.

That becomes 2001:0c2d:4308::/48 instead

After that you just need to remember the subnet number and the host number. If you remember 12.45.67.8 maps to 192.168.13.7 you might have

2001:0c2d:4308:13::7

So subnet “13” and host “7”

It’s not much different to remebering 12.45.67.8>192.168.13.7

WarOnPrivacy 2 days ago|||
> especially as it seems everything is 2001::/16

I was sort of expecting that this week.

I had to transcribe a v6 addy for a WAN-WAN test (a few mi apart).

That's when I noticed that Charter (Spectrum) had issued

   2603:: for one WAN and 
   2602:: for the other WAN.
ref: https://bgp.he.net/AS33363#_prefixes6
themafia 2 days ago|||
The current global unicast space is actually limited to just 2000::/3.

https://www.iana.org/assignments/ipv6-address-space/ipv6-add...

WarOnPrivacy 2 days ago|||
> Network-related things are generally easy to .. type from memory [but] IPv6 is just too long

I was reminded of this 2d ago; I was testing one IPv6 WAN from another. DDNS had failed so I didn't have my usual crutch to lean on.

boob 2 days ago|||
> Can someone explain why it's ambiguous?

Because you don’t know how many zeroes are on each side around the 0001 in the middle.

It can be 2000:0000:1:0000:0000:0000:0000:1 or 2000:0000:0000:0000:0000:1:0000:1 etc.

koakuma-chan 2 days ago||
This shortcut system of ipv6 only makes it worse. It's too hard to remember how it works.
icedchai 2 days ago|||
Is it really hard to remember? A hint is in the syntax itself. What's in between the two colons '::'? Nothing. In other words, all zeros.

IPv4 also has a similar, though rarely documented or utilized, shortcut system. Try `ping 1.1` for example. It expands to 1.0.0.1.

karlshea 2 days ago|||
":: is all zeros" is too hard??
webignition 2 days ago|||
How many zeros?
db48x 2 days ago|||
Exactly enough to fill out the address, which is always the same length. BTW, IPv4 does basically the same thing. The address 127.1 is equivalent to 127.0.0.1.
integralid 2 days ago||
Not really the same, the mechanics are different and this particular behaviour is pretty much an accident, not abbreviation.

In IPv4 you also have 127.257 equal to 127.0.1.1, 123456789 equal to 7.91.205.21, and 010.010.010.010 is a well-know DNS server. This notation is also rejected by most implementations.

icedchai 2 days ago|||
It is? Those alternate IPv4 notations are all accepted by Linux, FreeBSD, and MacOS. I remember playing around with "alternate notations" 30+ years ago on old SunOS boxes.
karlshea 2 days ago|||
But IPv6 is "too hard"
karlshea 2 days ago||||
There are a total of 8 groups of 4 hex digits, so 8 minus however many groups you already have.

google.com: 2607:f8b0:4009:819::200e (5 groups) -> 2607:f8b0:4009:0819:0000:0000:0000:200e (3 groups of added zeros)

a ULA address: fd2a:1::2 (3 groups) -> fd2a:0001:0000:0000:0000:0000:0000:0002 (5 added)

localhost: ::1 -> 0000:0000:0000:0000:0000:0000:0000:0001

jstanley 2 days ago||||
However many are left. In what circumstances do you care?
kstrauser 2 days ago||||
However many it takes to make the whole A::B number exactly 128 bits long.
paulddraper 2 days ago|||
“Enough”
koakuma-chan 2 days ago|||
It's not just ":: is all zeroes"
ninkendo 2 days ago||
… such as?
DaSHacka 2 days ago||
https://news.ycombinator.com/item?id=46338674
Dylan16807 2 days ago|||
That's a post about invalid things that are not IPv6 addresses.

In IPv6 addresses, :: is all zeroes and there's no ambiguity.

WarOnPrivacy 2 days ago|||
I am not clear what your point is. The parent's point stands. A double colon only represents zeros (that were compressed and are not displayed).

Your link does not show different addresses from a valid compression, it shows different addresses from an invalid compression. The link examples what we don't do.

Conversely, if we compress the expanded addresses in your link, we will get 2 different compressed addresses.

zajio1am 2 days ago|||
> IPv6 is just too long and requires copy/paste all the time.

That is only true for autogenerated/SLAAC IPs. In contrast, manually assigned IPs are often much simpler and easier to remember in IPv6 than in IPv4. I have one common subnet prefix that can be uniformly split to end networks and last number in IP address for such network always end with 0 (and therefore the first device is xxx::1). While in IPv4 i had multiple prefixes, each split non-uniformly based on how many devices was expected to be on that end network, and because most end network prefixes were smaller than /24 (say /26-28), the last number of IP address varies between these networks.

ekropotin 2 days ago|||
I mean yes, but there’s no escape from the fact that ip addresses need to be longer as amount of devices on the internet already exhausted the pool of IPv4 addresses by multiple orders of magnitude.

I guess it could be possible to implement sort of mnemonic phrases for addresses, à la bip-39, but it would be just trading one kind of pain for another.

ggm 2 days ago||
whats the rule to say where the first 1 floats between the 2000: and the :1 at the end? the :: rule says "all zeros" but not how long.
db48x 2 days ago|||
It’s a really complicated rule called “subtraction”. Addresses are always 128 bits long, or 8 groups of four hex digits. 2000::1 is two groups, so you need six groups in between to make 2000:0000:0000:0000:0000:0000:0000:1. But I don’t know why people always ask this, because it’s always the computer you are typing addresses in to that does the subtraction. You never ever have to type out the whole address. Just type the shortened version, because 2000::1 _is_ the whole address.
Dylan16807 2 days ago||
They were answering the question of why "2000::1::1" would be ambiguous if it was allowed.
doubletwoyou 2 days ago||||
the :1 is short for :0001 basically and then just put that bit of the address at the very end and put the first bit of the address at the front, and then just fill each missing group inbetween with 0000
webignition 2 days ago||
"just"
bigstrat2003 2 days ago||
Yes, in fact "just". This isn't remotely hard.
karlshea 2 days ago|||
These types of complaints are how I know the objection to v6 is not serious.
Dagger2 2 days ago|||
Well, okay, show us how to follow those instructions then.

"the :1 is short for :0001 basically" is easy enough: you get 2001::0001::0001.

Then "just put that bit at the very end" -- but which bit? If it means the ":0001", then there's two of them and they can't both go at the very end. If not, then it fails to specify which bit. Either way I don't see how these instructions are followable at all, let alone easily.

ggm 2 days ago|||
My answer was too terse. IF there was two :: in the address, then the length of EACH :: denoted section is not known. It can be either longest left :: or longest right :: and that wasn't defined, because the rule is THERE IS ONLY ONE :: section.

Posed as a question, disingenuously.

mlangenberg 2 days ago||
> There are also still a lot of misconceptions from network administrators who are scared of or don’t properly understand IPv6

Enable IPv6 on a TP-Link Omada router (ER7212PC) and all internal services are exposed to the outside world as there is no default IPv6 deny-all rule and no IPv6 firewall. I get why some people are nervous.

jeroenhd 2 days ago||
That's more proof that TP-Link should not be trusted than that there is a problem with IPv6, really. Even cheap $20 Aliexpress routers have a firewall enabled by default.
mlangenberg 2 days ago||
Agreed.
gz09 2 days ago|||
I believe that was more a bug in the firmware that's been fixed for a while now.
mlangenberg 2 days ago|||
In case of the ER7212PC, it’s only fixed in the v2 hardware revision.

No free upgrade.

buggjenrmf 2 days ago|||
A bug that was implemented, because ipv6 is more complex to secure.
throw0101c 2 days ago||
> Enable IPv6 on a TP-Link Omada router (ER7212PC) and all internal services are exposed to the outside world as there is no default IPv6 deny-all rule and no IPv6 firewall. I get why some people are nervous.

A router routing traffic makes people nervous? Isn't that what it's supposed to do? I'd be annoyed if my router did not pass traffic.

Now, if the ER7212PC was a firewall that would be something else.

(And no, I'm not being pedantic: routers should pass traffic unless told otherwise, firewalls should block traffic unless told otherwise. The purposes of the two device classes are different, they just happen to both deal with Layer 3 protocol data units.)

baobun 2 days ago|||
Routers and access points are also typically separate device classes. Yet the market has figured out that most consumers prefer all-in-one devices. Expecting households to run dedicated firewalls besides their AiO wifi-routers is ludicrous.

What firewall do you recommend a typical user couple their ER7212PC (which BTW is already tripling as VPN gateway and cloud-controller) with?

The problem is that TP-link does not give two cents to security in their products.

> And no, I'm not being pedantic

You very much are.

throw0101c 2 days ago||
> Yet the market has figured out that most consumers prefer all-in-one devices. Expecting households to run dedicated firewalls besides their AiO wifi-routers is ludicrous.

Except the ER7212PC, nor anything else under the Omada (sub-)brand, is not a consumer / household device. The tagline of Omada is "Networks Empower Business":

* https://www.omadanetworks.com

If you want to haul your boat buy an F-150 pickup and don't complain that your Golf doesn't have enough towing capacity: buy the tool that you need for the problem/job you have. If you want an all-in-one then buy an AiO and not a router.

>> And no, I'm not being pedantic

> You very much are.

Expecting a router to not-route IPv6 is the unreasonable thought.

tsimionescu 2 days ago||||
Are you suggesting that people should buy both a router and a firewall for their home networks? I suppose they should buy a separate Wi-Fi AP as well, and a switch or two, in your opinion?
throw0101c 2 days ago||
> Are you suggesting that people should buy both a router and a firewall for their home networks?

I am suggesting the ER7212PC is not a home network device, and thus having the two functions glommed together is an anti-feature in its design. The tagline of Omada is "Networks Empower Business":

* https://www.omadanetworks.com

Expecting that a router to not-route IPv6 by default is to misunderstand its purpose.

flumpcakes 2 days ago||||
You are of course correct, but most people will disagree because the world we live in is a lot messier than what we should do and people expect a base line. You have to remember that people rely on IPv4 NATing for security, despite every network engineer knowing that is it is not - in effect it is.
throw0101c 2 days ago||
> You have to remember that people rely on IPv4 NATing for security, despite every network engineer knowing that is it is not - in effect it is.

Then buy a device that does default NATing and other consumer-y if you want that. Don't complain that a generic routing system routes IP—whether IPv4 or IPv6—by default.

If you want a firewall buy a firewall. If you want an all-in-one firewall/gateway/AP/whatever, buy it.

In this particular case the "problem" is not in the device but in purchasing the wrong tool for the job at hand. If you want to haul lumber buy a cargo van or pickup truck, not a VW Golf.

zajio1am 2 days ago||||
'firewall' is just a colloquial term for packet filtering, which is a term for a class of functionality that could be provided by a router.

Customer edge routers are expected to contain firewall (see RFC 7084 and RFC 6092).

throw0101c 2 days ago||
> Customer edge routers are expected to contain firewall (see RFC 7084 and RFC 6092).

The ER7212PC, nor anything else in the Omada line, is not for residential consumers which is what RFC 6092—"Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service"—refers to.

And RFC 7084 has two instances of the word "firewall", one (§3.1) in reference to IPv4 NAT:

    A typical IPv4 NAT deployment by default blocks all incoming
    connections.  Opening of ports is typically allowed using a Universal
    Plug and Play Internet Gateway Device (UPnP IGD) [UPnP-IGD] or some
    other firewall control protocol.
and the other (§4.5) to tunnelling:

    S-3:  If the IPv6 CE router firewall is configured to filter incoming
          tunneled data, the firewall SHOULD provide the capability to
          filter decapsulated packets from a tunnel.
I agree that a consumer all-in-one firewall/gateway/AP/whatever should ("MUST"?) have a default-deny rule on incoming connections. But the original complaint that kicked off this sub-thread is about a particular device, which is not a consumer device but a more generic routing system and not a "firewall" as such.
shrx 2 days ago|||
People expect their router to act as a firewall too, via NAT. If you take this away and force people to buy an additional piece of hardware to restore the expected functionality, they won't switch. Simple as that.
tsimionescu 2 days ago||
All modern NAT routers include a firewall. They don't "act as a firewall too, via NAT", they have both NAT and firewall functionality, even for IPv4. It has been like this for a long time now.
throw0101c 2 days ago|||
> All modern NAT routers include a firewall.

AFAICT the ER7212PC is not a "NAT router" but just a "router".

Even some switches have ACL functionality for the IP layer, but they're sold as switches and not as firewalls.

shrx 2 days ago|||
Sure, but people still use NAT as a way to secure their internal network, so it's effectively acting as a firewall.
Animats 2 days ago||
Here's China's current IPv6 plan.[1] It was an explicit objective of the 14th Five Year Plan, now concluding, to get most of China's Internet on IPv6. About 70% of China's mobile users are on IPv6 now. But fixed IPv6 traffic in China is only 27%.

[1] https://www.cac.gov.cn/2025-05/20/c_1749446498560205.htm

orangeboats 2 days ago|
Their IPv6 deployment rate saw a huge jump from 40ish% to 53% after this report though.

https://stats.labs.apnic.net/ipv6/CN

yjftsjthsd-h 2 days ago||
> I spent a WEEK without IPv4 to understand IPv6 transition mechanisms

> NAT64 - the method I’ve setup for this test

> IPv6 is absolutely ready for prime-time and has been for awhile

So... No, you spent a week effectively using both v6 and v4 with extra steps. If someone said "Linux is ready for primetime" but their setup only worked because they ran a bunch of applications in a Windows VM, I'd call that strong evidence that it really wasn't. Same here.

That said... This is from early 2023. Any chance it's better now?

eqvinox 2 days ago||
> That said... This is from early 2023. Any chance it's better now?

I accidentally went IPv6 only on my home wifi for a few weeks a while ago. I only noticed when GitHub didn't load (I avoid work things at home, hence accessing GitHub being rare.)

Relatedly, fuck GitHub and their incompetence at rolling out IPv6. It's nothing other than that at this point. Blank, unadulterated incompetence.

lmm 2 days ago|||
> No, you spent a week effectively using both v6 and v4 with extra steps.

It's less steps though. You can do all your network setup in the nice v6 world, and set up v4 emulation for those who need it. Yes, it's not yet practical to turn of v4 entirely, just like it's not yet practical to turn off Rosetta on your ARM mac.

imrejonk 2 days ago|||
My former colleague Marco Davids from SIDN Labs (the R&D department at the .nl TLD operator) did an experiment in 2021 where he actively disabled IPv4 support on all components in his test network, even disabling the complete IPv4 stack in the FreeBSD kernel (not possible on Linux, at least not at the time). So far, his test is the only thing I know of that came close to an authentic simulation of an IPv6-only world.

https://www.sidnlabs.nl/en/news-and-blogs/can-we-do-without-...

1970-01-01 2 days ago||
AAAA record resolution is the real bottleneck for adoption. Once you have dual stack working, I did a real-world, simple test: Release your ISP IPv4 DHCP lease on the router (kill udhcpc) and flush DNS on your hosts. Now all public DNS lookups must resolve to a IPv6 domain. You will very quickly find many domains on the Internet still don't have AAAA records. Lots of popular services will simply fail to resolve their hard coded domains. QED.

https://whynoipv6.com/

rendaw 2 days ago|||
None of the ISPs where I live provide NAT64 gateways. Exactly one advertised it, I signed up almost a year ago and they still haven't enabled it for me yet (I think they don't actually offer it and just forgot to remove the page).
topranks 2 days ago||
No, because unfortunately the need for v4 hasn’t changed. In other words many sites and parts of the internet remain only on v4.

Until nearly everything is on v6 too it won’t be realistic to ditch the mechanisms that provide v4 access.

karlshea 2 days ago||
My two IPv6 issues (even having had a HE tunnel in the past):

- My local ISP (US Internet, soon to be part of T-Mobile Fiber) hasn't enabled it, even though the CEO has said on Reddit for years that it's a priority. Now that they've been acquired who knows if it'll ever happen.

- Linode allows transferring v4 addresses between machines, so if I need to rebuild something I can do so without involving my client who usually has control over DNS. They do not support moving v6 addresses, which means that the only sites I have control over that support v6 are the ones that I control DNS.

Making IPv6 a thing seems like it would be super easy if a couple hours could be spent solving a bunch of dumb lazy problems.

toast0 2 days ago|
> My local ISP (US Internet, soon to be part of T-Mobile Fiber) hasn't enabled it, even though the CEO has said on Reddit for years that it's a priority. Now that they've been acquired who knows if it'll ever happen.

Being a priority doesn't mean it's high priority. It could be a priority, but the lowest ranked one, so other stuff always comes first. :P

T-Mobile wireless US is pretty invested on IPv6, so if they take over the network, they may well push it.

karlshea 2 days ago||
It "finally hit the top of the project list" two years ago so we'll see lol.

It's "T-Mobile Fiber Home Internet" which looks to be a bunch of local ISPs they've been snatching up, so we'll see what happens. USI's customer service and reliability have been amazing so hopefully that doesn't get screwed up.

dpkirchner 2 days ago||
I try enabling IPv6 every year or so. The last time I tried IPv6 at home I couldn't figure out what my netmask was, nor the size of my allocation. Some folks say my ISP issues /60s, others /64. I couldn't figure out how to get my IP to remain static long enough to have long-running TCP sessions, either. It was a mess and not much better than it was 20 years ago when I first tried it (and had to disable it because it being on broke all sorts of things).

Maybe 2026 will be the year of IPv6. I kinda doubt it given I'm some jackass and dedicated network professionals still don't use IPv6.

ianburrell 2 days ago||
Why are you setting up anything? You turn on IPv6, the router figures out its prefix from the upstream router, and then router broadcasts the network to devices.

The netmask for IPv6 is nearly always /64. ISPs give out /60 to allow multiple subnets, but router makes /64 subnets from that.

ninkendo 2 days ago|||
Not OP, but when I first tried to learn IPv6 for my home internet, I found that it's very important that you get the DHCP-PD prefix size right when configuring your router, or it would just not work at all.

I have Comcast, and they do give me a /56, but you can't ask for a /56 in the DHCP-PD request, because they don't support a single request grabbing all of your prefix space. You have to ask for /60's, which I had to find out through trial and error.

But it may have been even worse (my memory is fuzzy) because I think at one point I did successfully get a /56, but that then exhausted my DHCP allocation, and then after I rebooted my router I couldn't get anything any more. It didn't help that the router I had been using (Unifi security gateway) didn't seem to keep a static DUID that comcast was happy with, so I kept getting new prefixes every time it rebooted.

Comcast probably has so few customers that bring their own cable modem/router at this point that they basically don't have any support for this, you won't get anything from them over the phone, they just push you to pay them to rent their equipment (where they configure all these parts the way their network expects.) You have to be adventurous to run your own equipment with IPv6.

topranks 2 days ago||||
Nah. There are lots of things you’ll need to know.

Does it use SLAAC on the WAN side or DHCPv6? How do I get a range for my lan then, DHCPv6 prefix-delegation? Or maybe it’s statically assigned somehow. Some carrier’s just use link-local ok the WAN, with no public v6 just RAs for the link-local, and a GUA block via IA_PD.

Regardless there are too many ways this is done, and this hampers adoption as it’s not just the “switch it on” operation you suggest.

ianburrell 1 day ago||
All of those are handled automatically. The only people who have problems are ones who want to configure manually. More importantly, this is no different than IPv4 where have DHCP or manual.

Nearly every ISP uses DHCPv6-PD cause harder for manual configuration. The range is in the DHCP-PD, your router picks a subnet. The WAN address is automatic, and don't care about it cause never see it. Mine is link-local and hadn't known until I checked.

dpkirchner 2 days ago|||
I need to know what IPs they might assign to my network, and then what IPs are to be assigned to my computers (or what I can assign statically).
ianburrell 1 day ago||
You find out the addresses after it is configured automatically. This is no different than IPv4 and DHCP.

If you don't want to use the public addresses internally, then you can assign ULA addresses. If you don't want to use MAC derived addresses, assign them static host addresses.

For names, I use mDNS. I don't know the IPv6 address for my server. If I did need it, I would get it from the router.

topranks 2 days ago|||
Probably the largest barrier to IPv6 adoption is the myriad ways IP allocation to clients can be done and the various options that exist.

It’s fine for mobile providers, where the client activation defines what’s needed and the carrier essentially just needs to support two OS’s (iOS and Android).

Also mostly fine for residential when the carrier provides the CPE, and can set it up to work with how they have the network built.

But if you’re managing your own router it can be complex to know exactly what to use. And most ISP support aren’t very good either.

If you happen to be an expert it’s fine, but if you’re a power user not a full time network guy there is still way more complexity than there ought to be.

illusive4080 2 days ago||
If you have ATT fiber, it’s a pain in the butt. Their default router will only issue a single passthrough /64 on request. If you have multiple VLANs you have to setup some scripts to ask for more, and even then you only get 8 of them. The gateway reserves the other 8 from the /60 it gets for its own use.

The only way I got IPv6 working well with them was to bypass their gateway. Now all my VLANs have /64, which is the standard subnet size.

ekropotin 2 days ago||
I think bypassing their gateway, that is - bringing your own router is the only way to do VLANs, because their gateway is very basic and doesn’t support VLANs at all.
illusive4080 2 days ago||
You can do VLANs with their gateway but only IPv4, or you have to write custom scripts to ask for additional IPv6 delegations.
ekropotin 2 days ago||
Interesting. Which model of their gateway do you have? I have BGW320 and it definitely doesn’t support vlan tagging.
PaulKeeble 2 days ago||
When I moved to an ISP that supported IPv6 earlier this year I ran into niggly problems. Ubuntu failed to update because one of its regional servers was misconfigured. OpenDNS one of its servers seemed not to be there on a regular basis over IPv6. I also had odd behaviour and latency issues where sometimes IPv6 would fail to route for short periods and it would fail and fall back to IPv4.

It was a painful experience of trying to work out if I had misconfigured it, if it was something to do with my opensource router software or if it was my ISP or the end services. I didn't get to the end of working this out and reporting issues and I just gave up. Due to the intermittent nature of the issues I was facing I never managed to get a report of issues my ISP would accept.

So I'll give it some time and give it a try after a year and see if things have improved, but it was definitely not ready for prime time.

wolrah 2 days ago|
> Don’t blame your provider when they deploy CG-NAT, embrace IPv6 and global routing instead.

In theory this makes sense, but in practice my personal experience is that not a single wireline ISP I've ever seen deploy CG-NAT offered IPv6 service at all, nor did any of them indicate any intent or even interest when asked about it.

The mobile providers on the other hand have almost entirely gone IPv6-first, using 6>4 transition methods as the default form of v4 access which I fully support.

4>4 CG-NAT should never have existed and providers who deploy it without offering fully functional v6 should be shamed.

More comments...