Top
Best
New

Posted by Aaronmacaron 1 day ago

IPv6 traffic crosses the 50% mark(www.google.com)
726 points | 518 comments
rtdq 13 hours ago|
And still, in the year of our lord 2026, GitHub does not support IPv6.

https://github.com/orgs/community/discussions/10539

growse 13 hours ago||
A non-trivial minority of the time, they don't support IPv4 either!
CupricTea 6 hours ago|||
GitHub is at the point where it immediately rate limits me if I try to look at a project's commit history without being logged in, as in the first time I even open a single URL to the commit history, I get "Too Many Requests" from GitHub thrown at me. I don't know if my work's antivirus stack is causing GitHub to be suspicious of me, but it's definitely egregious.
sholladay 4 hours ago|||
It’s not you or your setup. I experience the same behavior. Tried with and without Private Relay, residential and commercial ISPs at different locations, and more to debug it. Same results.

I think GitHub has just gotten so aggressive with their rate limit policies that it’s straight up incompatible with their own product. The charitable interpretation is that they aren’t keeping good track of how many requests each page actually performs in order to calibrate rate limiting.

kdhaskjdhadjk 4 hours ago||
On the other side of the coin, they also punish people who have slow connections. The acceptable speed for downloading from github on my connection is 90k/sec. No more, no less. Something prevents the rate from being higher (probably Github), and if the rate drops any lower for any length of time, the connection will suddenly abort right in the middle of the download. Since the dumpster fire that is git doesn't support resume, welcome to hell. If I didn't have a fast server elsewhere to git to then zip up and re-download, I'd be screwed.
vhcr 2 hours ago||||
My theory is that they rate limit that URL aggressively due to AI scrapers. At this point it's faster to just clone the repo and do your searching locally.
colechristensen 5 hours ago|||
Your work is probably all exiting through the same IP, you competing with others on the same IP is causing the rate limit.
CupricTea 5 hours ago|||
I've considered this, but the company is small enough that the number of people who would be on GitHub at any moment (instead of our internal git forge) can be counted on one hand, and when I'm the first one there in the morning it still rate limits me.
NewJazz 4 hours ago|||
Do you have any on-prem cicd jobs that access github? Our's kept failing, had to move over to the ECR release of some stuff.
colechristensen 42 minutes ago||||
Hm, I've also noticed sites being more aggressive about verifications after I started using LLMs locally. They think I'm a bot (which... fair), even on completely unrelated sites I seem to be getting prompted for human verification much more often.
growse 5 hours ago|||
Maybe your company's ISP is CGNat'ting you?
embedding-shape 4 hours ago||||
The very same thing happen on my residential connection, I can do one search query, then I'm rate limited for 15+ minutes, same if I access any list of commits.
tyingq 4 hours ago|||
May explain the ipv6 resistance. Hard to do effective per-ip rate-limiting with v6.
nickserv 3 hours ago||
I don't understand, wouldn't it make it easier?
hkt 3 hours ago||
No, IPv6 as it is supposed to be implemented gives (say) a single server a /64, which is for all intents and purposes an inexhaustible supply of IPs. You could in principle have an IP per site you visit and have plenty left to spare.

Random Google result with a bit more:

https://www.captaindns.com/en/blog/ipv6-subnet-sizes-48-vs-5...

So if I wanted to annoy GitHub, I could connect to them without ever using the same IP twice. Their response would have to be banning my /64, or possibly /56.

wolrah 2 hours ago|||
> No, IPv6 as it is supposed to be implemented gives (say) a single server a /64, which is for all intents and purposes an inexhaustible supply of IPs. You could in principle have an IP per site you visit and have plenty left to spare.

No, as it's supposed to be implemented a single internet-routable /64 is used per *network* and then most devices are expected to assign themselves a single address within that network using SLAAC.

ISPs are then expected to provide each connected *site* with at least a /56 and in some cases a /48 so the site's admins can then split that apart in to /64s for whatever networks they may have running at the site. That said, I'm on AT&T fiber and I am allocated a /60 instead, which IMO is still plenty for a home internet connection because even the most insane homelab setups are rarely going to need more than 16 subnets.

> So if I wanted to annoy GitHub, I could connect to them without ever using the same IP twice. Their response would have to be banning my /64, or possibly /56.

Well yeah, but it's not like it's exactly rocket science to implement any sorts of IP rate limiting or blocking at the subnet level instead of individual IP. For those purposes you can basically assume that a v6 /64 is equivalent to a v4 /32. A /56 is more or less comparable to /25 through /29 block assignments from a normal ISP, and a /48 is comparable to a /24 as the smallest network that can be advertised in the global routing tables.

Hikikomori 3 hours ago|||
Its not harder to rate limit a /64 though.
mmbleh 2 hours ago||
It is because the IPv6 rollout has not been consistent. Some assign /64 per machine, some assign /64 per data center. Some even go the other way and do a /56 per machine. We've had to build up a list of overrides to do some ranges by /64 and others by /128 because of how they allocate addresses. This creates extra burden on server operators and it's not surprising that some just choose not to deal with it.
sidewndr46 8 hours ago||||
should we try going back to IPX ?
reincarnate0x14 2 hours ago|||
Comically IPv6 now has almost all the neat stuff IPX did. There probably is an argument for more datagram centric networking these days as the underlying services are generally much faster and more reliable and there is so much more session tracking going on at higher application layers anyway.
MisterTea 6 hours ago||||
IPX/SPX is datagram only. BUT it would be an opportunity to build a QUIC-like that runs over it :-)
MikeNotThePope 8 hours ago||||
Only if we're bringing back Token Ring, too.
synalx 7 hours ago|||
That might be challenging, I hear people are pretty short on tokens these days.
MikeNotThePope 5 hours ago||
There's only one token! It's just very popular.
sidewndr46 6 hours ago||||
While we're at what about older physical layers? Coaxial based stuff seems cool in 2026
jonhohle 5 hours ago||
Isn’t that what MoCa is for?
rayiner 5 hours ago||
Isn’t twinax just “I heard you like coax so I put coax in your coax.”
sidewndr46 4 hours ago||
twinax I think is used more like a balanced line with shielding. Twisted pair is preferred because it is cheaper, but for short stuff like SATA the cost difference is so low it might as well be used
riddlemethat 6 hours ago||||
If it’s not 10BaseT I can’t see small spread adoption.
bluGill 7 hours ago|||
Arcnet for me.
TabTwo 5 hours ago||||
I remember removing the IPX route entries from our Cat65 MSFC back in 2006 and from the ATM/Framerelay WAN Equipment. Wasn't very popular with the customers.

I also remember the first IPv6 Workshop on W2k SP3 back in 2002. Not that long ago.

colechristensen 5 hours ago|||
I've used IPX exactly once in my life, playing Diablo over modems calling my dorm neighbor to establish the connection (in 2005).
nailer 4 hours ago||||
IPv1, IPv2, and IPv3 were very early experimental versions of the Internet Protocol developed in the 1970s during the ARPANET era (the precursor to the modern internet). Has anyone tried to find out if GitHub is reliable on those?
hsbauauvhabzb 9 hours ago|||
What? One nine isn’t good enough for you?
lambda 9 hours ago|||
Excuse me. Zero nines. Or two nines if you relax your definition of where they are in the number. https://infosec.exchange/@0xabad1dea/116334321751266751
AlienRobot 7 hours ago|||
Excuse me, but I see 4 nines. 95 incidents in last 90 days, 89.91% uptime.
bdangubic 8 hours ago|||
we shut down our production every day from 2pm till 5pm for a siesta :)
fogllgldl 9 hours ago||||
You guys have nines?
fkarg 8 hours ago||
You must be from Anthropic
whh 8 hours ago||
the ghost of twitter's past
wiredfool 8 hours ago||||
Personally I’d look for the coveted 5 eights uptime.
MarsIronPI 7 hours ago||
66.6% uptime anyone?
doubled112 7 hours ago||
Still better than five eighths.
Ekaros 7 hours ago|||
As long as it is after the decimal separator I can try for that...
throw0101a 9 hours ago|||
> And still, in the year of our lord 2026, GitHub does not support IPv6.

Especially given that it is now owned by Microsoft, which has been working on IPv6-only (at least on their corporate network) for almost a decade:

* https://blog.apnic.net/2017/01/19/ipv6-only-at-microsoft/

* https://www.arin.net/blog/2019/04/03/microsoft-works-toward-...

rekoil 9 hours ago||
I mean Azure doesn't really support IPv6 well either for a lot of the big-ticket services.
Twirrim 1 hour ago|||
That seems weird given NIST, and the US Government, set a requirement for IPv6 Only back several years ago, and it sort-of became part of the JWCC requirements (It wasn't in the requirements, IIRC, because it came after those were set, but the government wouldn't fully approve use for JWCC if you didn't meet it).

You'd think they'd have sprinted for that feature as fast as they could go.

bigfatkitten 54 minutes ago||
Microsoft gets special treatment.

USG also set a whole bunch of security requirements under FedRAMP that Microsoft can never meet, but they received an ATO anyway because they are so heavily entrenched in government.

fogllgldl 9 hours ago|||
More importantly, it doesn’t support uptime well.
sidewndr46 8 hours ago||
we could meet in the middle: Azure support IPv6 with 0% uptime
jermaustin1 6 hours ago|||
Same with Twilio. We have an internal server that does system alerts. We recently moved it to an IPv6 only host, and a few weeks went by and noticed there were no longer receiving alerts.

Turns out we could not connect to Twilio's API which is IPv4 only.

tbrownaw 6 hours ago||
So zero validation after that change?
jermaustin1 4 hours ago|||
Couldn't tell you. I'm not part of the infrastructure team. I wasn't even aware the alerting service was moving.

QA found it a couple weeks later when they were testing alerting, and SMSes weren't coming through.

vlovich123 5 hours ago|||
Zero observability and alerting too. Seems like they’re planning to be a productive future member of that team.
jermaustin1 4 hours ago||
Who? The infrastructure team that did the move didn't even tell anyone. They were decommissioning old servers, and moving the VMs to new hardware. I'm just a lowly developer that had to troubleshoot why SMSes stopped going out.
vlovich123 4 hours ago||
Observability and alerting is pretty standard devops. Both the dev and infrastructure teams dropped the ball here. But at least as part of remediating this you added alerting to make sure you’d notice when your twillio connection fails in the future, right?
jermaustin1 3 hours ago||
Even better, infrastructure enabled IPv6, and the issue was closed.

In corporate software development, we work the tickets assigned, and keep our KPIs up so that we don't face the wrath of the bean counters.

jeroenhd 12 hours ago|||
They supported IPv6 for a short time, but then stopped their experiment.

An excellent reason to move away from Github, I find.

literalAardvark 9 hours ago||
I've been there. Management was fine with the testing but it added too much overhead for nearly no benefit to us.

One more thing to troubleshoot at 3 am, one more thing to teach to a disinterested tier 1 support team, one more thing for Chrome to be weird about, hundreds more rules to manage in a hostile load balancer, logging tools that don't understand ipv6.

Turned it off. End customer asked why the site got a little slower (CGN) and when we can turn ipv6 back on. As far as I know it's still on the backlog.

jeroenhd 8 hours ago|||
One of the big challenges with IPv6 remains that many of the knows-just-enough-about-networking people, like support staff, often never received any IPv6 training (or, for that matter, even enough IPv4 training that they don't need to Google things that come up in real life). Another is that the weird, awful, everyone-hostile corporate "solutions" often break IPv6 in stupid ways (like load balancers and logging tools being unable to cope with minor changes and requiring a full configuration rework).

Things have definitely gotten better over time, though. The massive 90s style corporate networks will probably never transition, but smaller and more modern companies don't have that issue.

Apple mandating that apps are IPv6 compatible and various government legislation forcing companies to make their shitty middleware IPv6-compatible has improved things quite a bit so far. As uptake keeps rising, the need for technologies like STUN and TURN will slowly start decreasing, and as a result more and more people will end up in "untested" situations where not having IPv6 and falling back to legacy paths starts becoming a problem.

GoblinSlayer 6 hours ago|||
A networking dude (he clutched his smartphone all the time) typed "spedtes" in my browser and was deeply confused when the server wasn't found. He tried several times more with slightly different spelling to the same effect, he literally couldn't even what went wrong.
QuercusMax 3 hours ago|||
Here's an example of a potential security hole caused by lack of ipv6 knowledge:

I've been setting up Snapcast (open-source multi-room audio), and needed to move the server to a different machine. While I was setting up the new system, I told it to only bind to localhost. Somehow this only affects the ipv4 networking stack, as some of my clients started automatically connecting to the new server even before I had finished all my testing.

Turns out that it was advertising some kind of ipv6 link-local address that showed up in autodiscovery. In my case there wasn't any harm, but this type of thing could very easily result in a major security vulnerability.

jeroenhd 1 hour ago|||
Localhost doesn't appear on autodiscovery. Whatever you ran into had nothing to do with IPv6, but rather with your application not binding to the address you were telling it to bind to. On IPv6, localhost binds to ::1, not anything reachable by any other address. Furthermore, whatever you set up automatically seems to have added itself to your server's firewall, which is equally troubling.
QuercusMax 1 hour ago||
The address my clients were finding automatically was a link-local address (fe80...). Can't say exactly what happened but it was very surprising since I didn't even know these addresses existed.

I'm sure it's totally my fault but that's the point: folks who know how ipv4 works may have huge blind spots for ipv6.

jcgl 3 hours ago|||
I don't see how this generalizes into a security hole caused be lack of IPv6 knowledge. It just sounds like a random bug in Snapcast (great program!). If a user configures a program to only bind to loopback, but the program binds to other interfaces as well, that's a bug in the program.
QuercusMax 3 hours ago||
There are sure to be dozens or hundreds of vulnerabilities like this, that's what I'm saying. I'm not even sure it's a bug in snapcast - very possible I configured it wrong without realizing.
jcgl 55 minutes ago||
Without knowing exactly what happened here, it could be hundreds, dozens, or zero other such vulnerabilities.

The usual convention for configuring listening interfaces usually involves listing IP addresses or interface names. There's very little room for misconfiguration here, although it's possible. More likely to be a bug in Snapcast (it's almost certainly not an issue in the Linux kernel).

Moreover, this general problem (i.e. configuring listening interfaces) is not/should not be different between IPv4 and IPv6. So introducing IPv6 should not™ incur any additional risk at this level.

But as said, it's hard to get more concrete without knowing exactly what happened in your case.

throw0101a 9 hours ago||||
Facebook is (AIUI) 100% IPv6-only on their internal network, and has been for many years:

* https://engineering.fb.com/2017/01/17/production-engineering...

* https://www.internetsociety.org/blog/2014/09/facebook-launch...

IPv4 is actually the "leftover" stuff they have to deal with at the front end.

But they are an eye-balls heavy service, with a lot of mobile devices, which also tend to be IPv6-native.

tialaramex 8 hours ago|||
It also just takes actual policy will. Somebody has to actually say "No" when the supplier who promised an IPv6 product says afterwards actually they meant IPv6 "ready" and they should have put an asterisk because really only the next version will be "ready", and er, so the product they've delivered doesn't actually work with IPv6 but that's fine right?

"No". Not every human is psychologically prepared to do that. They want to acquiesce, to go along to get along, you need somebody to be firm. "No".

m-s-y 8 hours ago|||
I have found that it is incredibly satisfying to whip out the “no” card.

I have also found that an uncomfortable number of people do not consider it appropriate in any way shape or form. Even when it’s ultimately your call and no one else’s.

Folks don’t really like waves. They like looking at them from the shore, but freak out when it’s their turn to hang 10

lazide 6 hours ago|||
Just wait until someone starts remembering the other archaic terms like ‘fraud’, ‘indictment’, etc.
toast0 4 hours ago|||
From my time there, this is for the internal prod network. Corporate networking was dual stack (which was pretty useful because it was common for v4 or v6 to break, but usually not at the same time)
nextaccountic 1 hour ago|||
That's why ipv6 migration should be government mandated. Then it becomes just the cost of doing business
Landing7610 12 hours ago|||
Our university has bad problems with ipv4. Every few days you'll notice some websites being unreachable, including github. Although with their uptime recently, you never know who's to blame...
strenholme 5 hours ago|||
Kinda sorta.

github.com doesn’t have an IPv6 address.

github.io does have an IPv6 address. Indeed, one workaround for getting rate limited when using a carrier NAT with github.com is to have a github.io page and pull data from github.io instead of github.com.

Edit: About a decade ago, all of my hosting had full IPv6 support, and I tried to move over to IPv6. However, there was an issue with Letsencrypt certs not validating over IPv6, so I made my web pages IPv4 only. Recently, I gave IPv6 a go again, and the cert issue has been fixed, so now my webpages finally have both IPv4 and IPv6 addresses.

sschueller 12 hours ago|||
Just found this little site. https://isgithubipv6.web.app/

Maybe we shouldn't even measure percentage adoption and instead just if github has finally adopted..

farfatched 11 hours ago|||
GitHub should absolutely support IPv6, but until then... transip.eu provide IPv6 addresses which transparently proxy to github.com: https://www.transip.eu/knowledgebase/5277-using-transip-gith...

You'll need to update your DNS server to include those as AAAA records.

Do providers like NextDNS or RethinkDNS allow these sorts of overrides?

voltagex_ 10 hours ago||
>The Github IPv6 Proxy can only be used for traffic to Github using a VPS from TransIP which uses IPv6.
farfatched 4 hours ago||
Good spot. Sorry to disappoint!
jiggawatts 9 hours ago|||
The irony of this is that pretty much all they'd have to do to enable IPv6 support is to use Azure Front Door as their CDN. Or... use any other CDN, they pretty much all default to providing IPv6!
aetimmes 2 hours ago||
Last I checked, they're on Fastly who already support IPv6.
globular-toast 13 hours ago|||
Do we know any technical reason for this? Or are we left to think this is somehow a political thing?
michh 10 hours ago|||
Perhaps a little tin foil hatty and definitely not the only reason but Microsoft owns Github and also makes a boatload of money off of Azure. Incumbent cloud providers like Azure have a major advantage in terms of having plenty of IPv4 addressing available whereas a new entrant to that market would have to buy or lease that space at a premium. Thus, these companies have an incentive to keep IPv4 a necessity.
IshKebab 10 hours ago||
IPv4 is going to be a necessity for many many decades no matter what Microsoft do. Even when IPv6 is at 99%, people aren't going to want 1 in every 100 people to not be able to access their site at all. It'll need to be like 99.9% before we start seeing serious IPv6-only services.
michh 8 hours ago|||
I don't know what the percentage would be, but we do have some historical precedent that could give us a clue.

Best one I can think of is when bigger websites started actually dropping SSLv3 and TLSv1.0 (and later TLSv1.1) support, cutting off older browsers and operating systems. Google and Amazon still support TLSv1.0, but plenty of others (including Microsoft) have dropped 1.0 and 1.1. HN itself doesn't accept 1.1 anymore either.

Then there's browser support. Lots of websites - big and small - cut off support for Internet Explorer 6 when it was somewhere below 5% marketshare because the juice was no longer worth the squeeze. Of course, few of those actually fully cut off the ability to browse the (now broken) website fully but it's a datapoint suggesting trade-offs can and will be made for this sort of thing. Or to put it in the present: a significant amount of webapps don't support Firefox (3% market share) to the extent their product is completely unusable in it.

1317 7 hours ago||
a browser you at least have the ability to change though. if your ISP doesn't offer v6 you're SOL really
pbhjpbhj 6 hours ago||||
Meanwhile big gaming companies when Linux users are 5% of Steam users: 'eff off'.
jiggawatts 9 hours ago||||
Sure, but the implementation in the public clouds is totally backwards.

What they should have done is have their core network default to IPv6 with IPv4 an optional add-on for things like public IP addresses, CDN endpoints, edge routers, VPNs, etc...

Instead, their core networks are IPv4 only for the most part with IPv6 a distant afterthought.

fogllgldl 9 hours ago||
IPv6 is the protocol of the future. And will be so.
globular-toast 1 hour ago|||
I don't buy that. Do Netflix or YouTube care that people on 56k can't use their service?
denkmoon 12 hours ago||||
Outdated beliefs probably. When I talk about v6 support in our b2b saas, PM laughs and says nobody uses that shit. Big tech are massive laggards on this funnily enough.
throw0101d 8 hours ago|||
> Outdated beliefs probably. When I talk about v6 support in our b2b saas, PM laughs and says nobody uses that shit.

Nobody except the 140M subscribers on T-Mobile US's network:

* https://www.youtube.com/watch?v=d6oBCYHzrTA

But sure, be IPv4-only and add latency by forcing traffic through an extra translation box.

ViscountPenguin 12 hours ago||||
It's because big tech is USA based mostly, where there's still a glut of ipv4 available.
FuriouslyAdrift 6 hours ago|||
IPv4 was exhausted at ARIN in 2011. Last time I bought a /24 on the open market, it was around $6k. I assume it is much more, now.
Dylan16807 1 hour ago||
It's close to that right now. Prices more than doubled as covid set in, then dropped back down to about where they were before.
paulddraper 6 hours ago|||
Where can I get it, asking for a friend?
10000truths 9 hours ago||||
Definitely not for the biggest ones. Google and Meta have so many machines in their data centers that IPv6 addressing becomes a technical necessity due to the risk of exhausting the RFC 1918 address space. Naturally, they were early adopters of IPv6.
paulddraper 6 hours ago|||
Well it’s over 50%…
alex_duf 12 hours ago||||
It's a possibly a managerial thing, which KPI are you improving when spending engineering time on adding IPv6 support?

That said, for their HTTP stack they use fastly (as far as I understand), which should make the shift moderately easier.

mmbleh 8 hours ago||||
IPv6 is very difficult to implement and enforce reliable rate limits on anonymous traffic. This is something we've struggled a lot with - there is no consistent implementation or standard when it comes to assigning of IPv6 addresses. sometimes a machine gets a full /64, other times a whole data center uses a full /64. So then we need to try and build knowledge of what level to block based on which IP range and for some it's just not worth the hassle.
RiverCrochet 7 hours ago|||
Well, even if there was a standard, that's still not a guarantee that the other side of the /64 would be following it. It's correct for you to rate-limit the whole /64.
Tuna-Fish 8 hours ago|||
... But that's no different from IPv4. Sometimes you have one per user, sometimes there are ~1000 users per IP.

Most of the ipv4 world is now behind CGNAT, one user per ip is simply a wrong assumption.

mmbleh 6 hours ago||
Anonymous rate limits for us are skewed towards preventing abusive behavior. Most users do not have a problem, even there is a CGNAT on IPv4.

For IPv6, if we block on /128 and a single machine gets /64, a malicious user has near infinite IPs. In the case of Linode and others that do /64 for a whole data center, it's easy to rate limit the whole thing.

Wrong assumption or not, it is an issue that is made worse by IPv6

agwa 6 hours ago|||
I don't doubt your experience, but I wouldn't expect it to continue. I don't think Tuna-Fish is correct that "most" of the IPv4 world is behind CGNAT, but that does appear to be the trend. You can't even assume hosting providers give their subscribers their own IPv4 addresses anymore. On the other hand, there's a chance providers like Linode will eventually wise up and start giving subscribers their own /64 - there are certainly enough IPv6 addresses available for that, unlike with IPv4.
Tuna-Fish 5 hours ago|||
> I don't think Tuna-Fish is correct that "most" of the IPv4 world is behind CGNAT

~60%+ of internet traffic is mobile, which is ~100% behind CGNAT.

On desktop, only ~20% of US and European web traffic uses CGNAT, but in China that number is ~80%, in India ~70% and varies among African countries but is typically well over 70%, with it being essentially universal in some countries.

Overall, something a bit over 80% of all ipv4 traffic worldwide currently uses CGNAT. It's just distributed very unevenly, with US and European consumers enjoying high IP allocations for historical reasons, and the rest of the world making do with what they have.

agwa 4 hours ago||
Oh wow, thanks for those numbers!

Since mmbleh mentioned Linode I'm guessing they're more concerned with traffic from servers, where CGNAT is uncommon. But even that may be changing - https://blog.exe.dev/ssh-host-header

mmbleh 2 hours ago||
Yeah, our traffic is more from automated systems/servers, nothing from mobile
mmbleh 5 hours ago|||
Yeah, absolutely no expectations for the future. My point was more that while there may be clear benefits for users, IPv6 presents real problems for service operators with no clear solutions in sight.

Given that GitHub also offers free services for anonymous users, I can imagine they face similar problems. The easiest move is simply to just not bother, and I can't blame them for it.

GoblinSlayer 4 hours ago|||
If a single machine gets /64 and you rate limit by /64, what doesn't work?

>Linode and others that do /64 for a whole data center

That's how it's supposed to work.

Dylan16807 1 hour ago||
> That's how it's supposed to work.

According to who?

It could fit best practices if your datacenter has one tenant and they want to put the entire thing on a single subnet? In general I would expect a datacenter to get something like a /48 minimum. Even home connections are supposed to get more than /64 allocated.

And Linode's default setup only gives each server a single /128. That's not how it's supposed to work. But you can request /64 or /56.

GoblinSlayer 53 minutes ago||
If the OS uses SLAAC by default, then it will just work, but SLAAC is for humans and makes less sense for web servers (yet can make sense for vpn servers). For web servers /128 is more meaningful.
skywhopper 7 hours ago||||
IPv6 rollout is a lot of operational work that ends with next to no immediate quantifiable benefit. So I’ll never be prioritized in a cost-cutting environment.
tialaramex 4 hours ago||
I mean, all your numbering woes vanished, so, that's probably an immediate quantifiable benefit unless you're so tiny you never needed any renumbering effort, in which case your "operational work" to deploy IPv6 was probably zero.
direwolf20 12 hours ago||||
It could be that they don't want to implement IP bans in IPv6.
merpkz 9 hours ago|||
How does IP bans work in IPv6 case? One just blocks whole /64 or /56 address range?
throw0101d 8 hours ago||
I have not had a deal with this, but if I was going to, I would start at the /64 and move up by nibble (4-bit) boundaries: /64, /60, /56, /52, /48.

/56 is often recommended as the minimum as for a (residential) customer. /48 is considered a "site" address prefix, and is the smallest allocation that can be advertised in BGP:

* https://blog.apnic.net/2020/06/01/why-is-a-48-the-recommende...

* https://www.infoblox.com/blog/ipv6-coe/a-48-for-every-site-a...

You get 65k subnets with it, which is what you get with 10/8.

GoblinSlayer 1 hour ago|||
APNIC blog says /48 prefixes are for global routing, i.e. site=country there, not web server.

>/48 is the minimum prefix size that will be routed globally in the BGP.

roryirvine 4 hours ago|||
Yes, /64 is a reasonable starting point for blocking outright, but /48 is the right unit for scoring reputation.
c0balt 10 hours ago|||
Or the most likely more expensive rate limiting (computational wise)
michh 10 hours ago||
I mean, given how the site performs on average I don't think they've optimized so much that the extra cpu cycles of ANDing with the fixed constant of 2^64-1 and then looking up or hashing a 16 byte integer - whatever they do - rather than a 4 byte one would increase the load significantly. Let's be pessimistic and say it's 20 extra cpu cycles, that's not gonna be much of a problem if their load balancers were made in the past 20 years.
AtNightWeCode 10 hours ago|||
You probably need a hefty security reimplementation if you want to add IPv6 to Github.
sandeepkd 13 hours ago|||
Came here to exactly check on this to see if there are any changes on Github side too
missingdays 12 hours ago||
Most websites still don't
keybits 10 hours ago||
Tailscale have a great FAQ about IPv4 vs IPv6: https://tailscale.com/docs/reference/faq/ipv6

If you're not an expert in this area it's worth a read - I certainly learned a few things!

rmunn 10 hours ago||
That was excellent, thanks for recommending it. I particularly liked how it's a pretty factual FAQ, not particularly cheerleading for IPv6 nor saying "IPv6 is a failure, give up on it".
sedatk 4 hours ago|||
Here is my article that I wrote when I wanted to learn more about IPv6: https://ssg.dev/ipv6-for-the-remotely-interested-af214dd06aa...

EDIT: After reading Tailscale's article, I noticed that I overlooked our neverending dependence to NAT despite that IPv6 seems to eliminate it.

menotyou 10 hours ago||
"IPv6 is the next generation of the Internet Protocol (IP), the successor to IPv4."

This is a misconception. It is not the successor to IPv4, it is an alternative. Maybe the alternative is so good it will eventually make the older extinct, but it does not look like that

connicpu 4 hours ago|||
Regardless of whatever other things may be better or worse about ipv6, it's still a reality that as we continue connecting more and more devices to the internet eventually ipv4 addresses will become so scarce and valuable that a not-insignificant minority of residential customers will be behind such aggressive CGNAT that the internet will become nearly unusable unless a majority of the services they are using support ipv6.
Galanwe 8 hours ago|||
I agree with you. While I can see some benefits to v6 on the internet, I find v4 to be miles easier and cleaner to work with in a LAN setup. Unfortunately though v6 oversteps on LAN features and makes bridging v4 and v6 way uglier than it should.
cassianoleal 3 hours ago||
> v6 oversteps on LAN features and makes bridging v4 and v6 way uglier than it should

How so?

usui 13 hours ago||
It has barely hit 50% and it's already plateauing. This adoption rate is ridiculous despite basically all network interfaces supporting it. I thought I would see IPv6 take over in my lifetime as the default for platforms to build on but I can see I was wrong. Enterprise and commercial companies are literally going to hold back internet progress around 60 to 75 years because it's in their best interest to ensure users can't host services without them. Maybe even 75 years might be too optimistic? They are literally going to do everything in their power to avoid the transition, either being dragged out kicking and screaming or throwing their hands up and saying they can't support IPv6 because it costs too much.

Try going IPv6-only by disabling IPv4 on your computer as a test and notice that almost nothing works except Google. End users shouldn't need to set up NAT64/6to4 tunneling. It should be ISPs doing that to prepare for the transition.

Also, notice how Android and iOS don't support turning off IPv4.

keeperofdakeys 13 hours ago||
Nearly all ISPs these days are deploying IPv6 for their mobile networks and core service networks, especially in less developed markets^1. The reason is simple, a cost justification. What doesn't exist is a cost justification for Enterprises to deploy IPv6, and for ISPs to deploy Residential / Corporate Internet IPv6.

IMO with the right market conditions, IPv6 could spread really fast within 6-24 months. For example, most cloud providers are now charging for IPv4 addresses when IPv6 is free. Small changes like that push in the right direction.

^1 https://www.theregister.com/2025/08/04/asia_in_brief/

reddalo 12 hours ago||
Hetzner makes you pay 1 € per IPv4, while IPv6 is free. I'd gladly get rid of all IPv4's given that I have many servers.
andix 11 minutes ago|||
But their VLANs still only support ipv4, which makes it hard to route external ipv6 traffic through the VLANs. You need tunnels.
saltyoldman 46 minutes ago|||
I don't even know why clouds offer public IP addresses. In my opinion all clouds should only have a gateway that routes via host header for millions of customers. IPv4 should be a special priv for special situations at a higher price. Then these clouds could own maybe 20 IPs total instead of millions.
kstrauser 10 minutes ago|||
> In my opinion all clouds should only have a gateway that routes via host header for millions of customers.

This is incompatible with TCP/IP networking. In TCP connections, (sender_address, sender_port, receiver_address, receiver_port) is a unique combination. Those numbers together uniquely identify the sender talking to the receiver. For a public webserver:

* sender_address is the client machine's IP address

* sender_port is a random number from 0..65535 (not quite, but let's pretend)

* receiver_address is the webserver's IP address

* receiver_port is 443

That means it'd be impossible for one client IP to be connected to one server IP more than 65535 times. Sounds like a lot, right?

* sender_address is the outbound NAT at an office with 10,000 employees

Now each user can have at most 6.5 connections on average to the same webserver. That's probably not an issue, as long as the site isn't a major news org and nothing critical is happening. Now given your scheme:

* receiver_address is the gateway shared by 10000 websites

Now each user can have at most 6.5 connections to all of those 10000 websites combined, at once, total, period. Or put another way, 100,000,000 client/website combos would have to fit into the same 65535 possible sender_ports. Hope you don't plan on checking your webmail and buying airline tickets at the same time.

seabrookmx 18 minutes ago|||
> host header

Not all workloads are HTTP.

> gateway .. for millions of customers

That's basically what an AWS ALB is. It's not provisioning bespoke infrastructure when you create it.. it's just a routing rule in their shared infra.

If Amazon wanted, they could easily have shared IP's but the cost of an IPv4 isn't so great that this approach has been warranted yet, clearly.

dtech 12 hours ago|||
Apple/iOS is probably one of the biggest individual drivers of IPv6 adoption. They've been requiring that iOS apps work on IPv6-only networks for close to 10 years now
throw0101d 8 hours ago|||
> They've been requiring that iOS apps work on IPv6-only networks for close to 10 years now

This was at the behest of mobile network. E.g., T-Mobile US has 140M subscribers, and moved to IPv6-only many years ago:

* https://www.youtube.com/watch?v=d6oBCYHzrTA

lxgr 8 hours ago||||
The requirement is to support IPv6 only networks with IPv4 transition mechanisms. It does not preclude contacting v4-only servers.
moduspol 6 hours ago||
And the higher level libraries mostly do it for you, too, even if you directly specify IPv4 addresses in your code (due to NAT64 [1]). I think it only even requires special work from you as a developer if you're using low-level or non-standard libraries.

[1] https://en.wikipedia.org/wiki/NAT64

lxgr 6 hours ago||
The problematic low-level libraries are standard, and effectively impossible to fully deprecate since they're decades old and part of the socket API.

I think currently Apple still helps you with these via "bump in the stack" (i.e. they can translate internal v4 structures and addresses into NAT64-prefixed v6 at the kernel level), but they probably don't want to commit to doing that forever.

aniviacat 12 hours ago|||
If that's the case, how does the Github app work on iOS?
dtech 12 hours ago|||
Nat64: https://developer.apple.com/support/ipv6/
eptcyka 12 hours ago||||
Differential enforcement.
fogllgldl 9 hours ago||
Apple’s App Store enforcement is very arbitrary. For example, if the app developer offends steve jobs, you’re banned for life.
falsemyrmidon 8 hours ago||
[dead]
nothrabannosir 10 hours ago|||
I’m guessing the app works but their prod servers don’t? If they can point the app during review at a “self hosted” GitHub Enterprise server on a test domain with AAAA that would pass the requirement as stated by gp , without requiring GitHub.com actually support ipv6.
Dagger2 9 hours ago||
The prod servers work. The app does a DNS lookup, receives something like 64:ff9b::140.82.112.5 and 140.82.112.5 from the ISP's DNS servers, and then connects to 64:ff9b::140.82.112.5. Some part of the ISP network translates the connection into a v4 connection to 140.82.112.5.

The requirement is simply that the app does AAAA queries, and that it attempts to connect to them if they exist. It doesn't matter whether the server does v6 natively or if the ISP is covering for a v4-only server via backwards compatibility. (Native v6 will probably perform better, but any site that wants to give up that advantage is free to do so.)

lxgr 5 hours ago||
That’s DNS64, which is pretty annoying in practice. (For one thing, you can’t use your own DNS server anymore, but more importantly, anything using v4 literals will 100% break.)

What’s nicer is 464XLAT, or more generally NAT64 prefix announcements. Then your local OS can just synthesize NAT64 addresses from v4 literals, either at the socket library or kernel networking (via “bump in the stack” translation) layer.

crazygringo 4 hours ago|||
> It has barely hit 50% and it's already plateauing.

Is it plateauing? From the chart it doesn't look that way at all to me.

You could say it's flat between August 2025 and now, but it also was from Jun 2024-Feb 2025, or August 2023-March 2024. There's just a lot of noise to it -- lots of short plateaus or even dips followed by lots of sudden jumps. Indeed, it seems to have a bit of a yearly cycle to it, suggesting we're at the inflection point of another jump upwards.

So it still seems to be growing strongly to me. The rate of growth has slowed maybe the tiniest bit 2024-2026 compared 2018-2023, but I don't see it anywhere close to plateauing yet.

RiverCrochet 6 hours ago|||
> It has barely hit 50% and it's already plateauing. This adoption rate is ridiculous despite basically all network interfaces supporting it

It's fine. IPv4 and IPv6 can be used at the same time. There's no hurry. Network interfaces support anything as long as both sides agree (nothing stopping you from building your own IPX network over MPLS).

People can move to IPv6 when the IPv4-as-real-estate speculators get out of control, and if IPv6 prevents IPv4 rental prices from going haywire, then it's served a useful purpose.

I saw a news article that said something about India considering moving to IPv6-only? That's going to be interesting if the rest of the world moves to IPv6 and the U.S. doesn't.

> End users shouldn't need to set up NAT64/6to4 tunneling. It should be ISPs doing that to prepare for the transition.

100%

realityking 1 hour ago|||
The Czech government has announced it’ll stop offering its services via IPv4 in June 2032.

Source https://konecipv4.cz/en/

bananamogul 4 hours ago|||
I've been hearing that those speculators were going to get out of control and the IPv4 price was going to skyrocket for 10+ years.

Yet I can still rent a VPS with IPv4 for $12/year from a wide variety of providers.

Dylan16807 1 hour ago|||
You can, but a significant portion of that money is going toward paying off that IP.

"Skyrocket" is wrong but the market cap of IPv4 addresses is quite high.

RiverCrochet 4 hours ago|||
For now, :) Hopefully it continues.

> if IPv6 prevents IPv4 rental prices from going haywire, then it's served a useful purpose.

Competition is good.

imoverclocked 13 hours ago|||
ISPs often fail to do this because there is always someone in the hierarchy who says, "nobody is demanding it."
betaby 7 hours ago|||
Nobody is demanding IPv4 either. Or Ethernet. People buy "Wi-Fi", literally "Wi-Fi", not Internet access.
kentm 4 hours ago|||
Exactly. To this point I went to a Comcast store to cancel my internet and the person asked me if I meant I wanted to cancel my “Wi-Fi”. I was very confused for a couple seconds.
vel0city 5 hours ago|||
It has been interesting to me to see how the usage of "my wifi bill" instead of "my internet bill" has shifted.
throw0101d 4 hours ago||||
> ISPs often fail to do this because there is always someone in the hierarchy who says, "nobody is demanding it."

I'm with an ISP whose landline/fibre division does not have IPv6, but whose mobile division gives IPv6 to handsets.

FridgeSeal 11 hours ago||||
I worked at a place where they refused to run it _anywhere_ because a couple of people were insistent that it was “insecure”.
Galanwe 8 hours ago||
... and they were right.

v6 adoption is often an all or nothing, because if you run both stacks, you have to ensure they are consistent. While you can reasonably do it on your home LAN, doing it across an entire infrastructure is the worst.

Now you have to make sure all your subnets, routing, VLANs, firewall rules, etc work exactly the same in two protocols that have very little in common.

It is the equivalent of shipping two programs in different languages and maintaining exact feature parity between both at all times.

sethops1 4 hours ago|||
This is exactly why I decided not to enable IPv6 on my colo. When money is involved, the benefits of IPv6 simply do not outweigh the risk, in my estimation. If my side gig eventually pays enough to pay a contractor to handle networking then sure, that'll be one of the first tasks. But when it's just me managing the entire stack, my number one priority is security, and for now that means keeping things simple as possible.
kstrauser 7 hours ago|||
I genuinely don’t understand this. The concepts are nearly identical between the two.
Galanwe 5 hours ago||
Hum no, to me they are orthogonal.

v4 was built around the idea of multiple free standing networks linked by gateways. v6 was built around the idea of a universal network.

I dont care about what your LAN adress space look like when I'm in my LAN, because we are not in the same v4 network. I am sovereign in my network.

With v6, everyone is effectively in the same network. I have to ask my ISP for a prefix that he will rent me for money even for my LAN. If I want some freedom from said ISP prefix, I am mercifully granted the honor of managing ULA/NAT66 (granted I paid for a fancy router).

Also if I want any kind of privacy, I will have to manage privacy extensions and the great invention of having to use automatically generated, dynamically routed, essentially multiple random IPs per interface. How lucky am I to use such a great new technology.

Seriously v6 was created by nerds in a lab with no practical experience of what people wanted.

kstrauser 3 hours ago||
v4 and v6 were build around the exact same use cases.

> With v6, everyone is effectively in the same network.

Just like IPv4.

> I have to ask my ISP for a prefix that he will rent me for money even for my LAN.

Just like IPv4, if you need a static address.

> If I want some freedom from said ISP prefix, I am mercifully granted the honor of managing ULA/NAT66 (granted I paid for a fancy router).

Compared with IPv4, where if you want some freedom from said ISP subnet, you are mercifully granted the honor of managing RFC-1918 addresses/NAT (granted you paid for a router that doesn't screw it up).

> Also if I want any kind of privacy, I will have to manage privacy extensions

...which are enabled by default nearly universally

> and the great invention of having to use automatically generated, dynamically routed, essentially multiple random IPs per interface.

Make up your mind. Are rotating, privacy-preserving addresses good or bad? The way it works in real life, not in the strawman version, is that you (automatically!) use the random addresses for outgoing connections and the fixed addresses for incoming.

bluGill 8 hours ago|||
I with I knew how to get through that I want it. I'm supposed to be a tech guy - that means I need experience with the latest tech in my house
moduspol 6 hours ago||
I switched my home ISP from cable (which supported IPv6) to fiber (which doesn't) and I've had a nagging disappointment ever since. But I guess consumers aren't really demanding it enough.
lmm 12 hours ago|||
I think we'll hit a tipping point soon, just like with Python3 - for years and years it seemed almost stalled, then it became easier to start with python3 than python2 and suddenly everyone migrated.
usui 11 hours ago|||
This seems like wishful thinking. Python3 vs. Python2 seems different than IPv6 vs. IPv4.
tucnak 7 hours ago||
"seems" is doing a lot of heavy-lifting in your message
yangm97 10 hours ago||||
“Gradually, then suddenly.”
falsemyrmidon 7 hours ago|||
[dead]
zokier 13 hours ago|||
> End users shouldn't need to set up 6to4 tunneling. It should be ISPs doing that to prepare for the transition.

Which is what ISP are doing with 464XLAT deployments. IPv6-mostly networking and IPv4-as-a-service are things that are happening in real world right now.

kalleboo 11 hours ago||
Yeah in Japan my ISP even lets me choose which IPv4 provider I want to use, as the fiber network is IPv6-native and IPv4 is "just another service" like IPTV.
lxgr 5 hours ago||
Wow, that’s very cool! Do you know how that works? Do they just connect you to a NAT64 gateway of your choice?
kalleboo 5 hours ago||
IPv4 is provided using DS-Lite or MAP-E depending on the provider.

I'm using OpenWRT and paid for a static IP so I had to manually configure all the details for the MAP-E tunnel in OpenWRT myself, I think typically the routers sold to consumers pick up the configuration automatically somehow.

usui 5 hours ago|||
Which provider are you using? I'm curious about this since there are not many OpenWrt guides for getting connected in Japan. Is your config similar to this write-up? https://github.com/fakemanhk/openwrt-jp-ipoe

I didn't need to do any configuration for DS-Lite or MAP-E, as DHCPv6 with a configured prefix got IPv6 working, although DNS is still broken when turning off IPv4 entirely.

lxgr 4 hours ago|||
Woah, MAP-E allows static v4 (and presumably inbound connections)? That seems neat and much better than DS-Lite!
vr46 10 hours ago|||
My German ISP supports it now, which was the limiting factor for me, and a new VPS I just bought also does, so finally I was able to create my first personal AAAA record. I am hoping that we're seeing a tipping point. Again.
MiscIdeaMaker99 8 hours ago|||
Since when was there ever a plan to disable IPv4 on the Internet? Just because IPv6 is around doesn't mean that IPv4 is going to go away.
bluGill 7 hours ago|||
That was always the plan for "the future". That is get everyone to IPv6 and then get rid of IPv4. IPv4's days are numbered - but the number looks really big.
lxgr 5 hours ago|||
Why would we keep around a whole separate Internet? Dual stack was always only intended for the transition period.
g8oz 5 hours ago||
It's very hard to get rid of old standards.

"The past is never dead. It's not even past"

lxgr 3 hours ago||
Of course there's an incredibly long tail here, but in the big picture, "nobody except some people maintaining a few legacy systems ever need to learn to work with this protocol anymore" is practically the same thing.
drpixie 12 hours ago|||
>> It has barely hit 50% and it's already plateauing.

Well, the curve has got to level-out at 100%.

cowsandmilk 12 hours ago||
No, it can level out below that and is (as the parent was saying).
bluGill 7 hours ago|||
How far below is the question. It could level out at 60% - that is believable. However it can't level out at 99% - Somewhere around 95% major sites will decide IPv4 isn't worth supporting and they will just ignore that final 5% of customers, which will force them to upgrade - which in turn will give others confidence to remove their final 4% of customers - until IPv4 dies.
lazide 6 hours ago||
There are still ascii dialup bulletin boards out there. and operating model T’s. IPv4 will be around for longer than you or I.
Dylan16807 49 minutes ago|||
> IPv4 will be around for longer than you or I.

That's a matter for the legacy network on the other side of the internet to handle, as it converts my IPv6 packets to IPv4.

lxgr 5 hours ago|||
There are also still Telex and X.25 networks around there, not to forget the whole public telephone network!

But at some point, getting a native connection to all of these started becoming increasingly rare, and now these are largely emulated/tunneled on top of IP. The same can happen for IPv4.

umanwizard 4 hours ago|||
That’s indeed what they’re saying, but they’re simply wrong which is obvious from looking at the graph and accounting for seasonal variation.
ectospheno 7 hours ago|||
> Also, notice how Android and iOS don't support turning off IPv4.

You can trivially connect an iOS device via IPv6 only.

usui 5 hours ago|||
Can you share details on how one trivially connects via IPv6 only? I see no option in iOS Wi-Fi settings to do this, and I think it's reasonable to expect not to have to turn off IPv4 on my access point to test IPv6-only networking.
boredatoms 6 hours ago||||
Presumably thats with the network having a PLAT somewhere if you’re relying on CLAT for any v4-only connections when you use safari
unethical_ban 2 hours ago|||
I think they're saying you can't force disable ipv4 entirely.
waynesonfire 12 hours ago|||
> It has barely hit 50% and it's already plateauing.

That makes sense. The majority of IPv6 deployment is mobile.

The next wave of adoption requires ISPs start offering residential IPv6. Once this happens, router manufacturers will innovate around the IPv6 offering as a differentiator, making it easy to deploy by end-users. IPv6 wifi APs will then become ubiqutious and so forth across other services. Has to start with ISPs.

dtech 12 hours ago||
ISPs in the US and Europe mostly have been offering IPv6 for a while now
jabl 11 hours ago|||
Unfortunately my ISP here in Europe is not one of those offering IPv6.
yxhuvud 11 hours ago||
Mine does and it works so well that I actually have to turn it off when working from home as a bunch of the third party servers at work doesn't have any support for it.
lxgr 5 hours ago||
That sounds more like broken support then. Not having any support at all (i.e. A records or v4 literals only) should just send you to whatever v4 transition technology your ISP offers, no?
Hikikomori 12 hours ago|||
Other than France or Germany its far from mostly.
stackghost 12 hours ago|||
Is there a reason why adoption has been so abysmally slow? Like surely all the big players have updated their networking equipment by now, and surely every piece of enterprise-grade kit sold in the last 20 years has supported v6.

The only arguments I've ever heard against ipv6 that made any sense are that:

1: it's hard to remember addresses, which is mayyyyybe valid for homelab enthusiast types, but for medium scale and up you ought to have a service that hands out per-machine hostnames, so the v6 address becomes merely an implementation detail that you can more or less ignore unless you're grepping logs. I have this on my home network with a whopping 15 devices, and it's easy.

and 2: with v6 you can't rely on NAT as an ersatz firewall because suddenly your printer that used to be fat dumb and happy listening on 192.168.1.42 is now accidentally globally-routable and North Korean haxors are printing black and white Kim Il Sung propaganda in your home office and using up all your toner. And while this example was clearly in jest there's a nugget of truth that if your IOT devices don't have globally-routable addresses they're a bit harder to attack, even though NAT isn't a substitute for a proper firewall.

But both of these are really only valid for DIY homelab enthusiast types. I honestly have no idea why other people resist ipv6.

noirscape 11 hours ago|||
The big reason is that domestic ISPs don't want to switch (not just in the US, but everywhere really.)

Data centers and most physical devices made the jump pretty early (I don't recall a time where the VPS providers I used didn't allow for IPv6 and every device I've used has allowed IPv6 in the last 2 decades besides some retro handhelds), but domestic ISPs have been lagging behind. Mobile networks are switching en masse because of them just running into internal limits of IPv4.

Domestic ISPs don't have that pressure; unlike mobile networks (where 1 connection needing an IP = 1 device), they have an extra layer in place (1 connection needing an IP = 1 router and intranet), which significantly reduces that pressure.

The lifespan of domestic ISP provided hardware is also completely unbound by anything resembling a security patch cycle, cost amortization or value depreciation. If an ISP supplies a device, unless it fundamentally breaks to a point where it quite literally doesn't work anymore (basically hardware failure), it's going to be in place forever. It took over 10 years to kill WEP in favor of WPA on consumer grade hardware. To support IPv6, domestic ISP providers need to do a mass product recall for all their ancient tech and they don't want to do that, because there's no real pressure to do it.

IPv6 exists concurrently with IPv4, so it's easier for ISPs to make anyone wanting to host things pay extra for an IPv4 address (externalizing an ever increasing cost on sysadmins as the IP space runs out of addresses) rather than upgrade the underlying tech. The internet default for user facing stuff is still IPv4, not IPv6.

If you want to force IPv6 adoption, major sites basically need to stop routing over IPv4. Let's say Google becomes inaccessible over IPv4 - I guarantee you that within a year, ISPs will suddenly see a much greater shift towards IPv6.

ENGNR 10 hours ago|||
It's frustrating that even brand new Unifi devices that claim to support IPv6 are actually pretty broken when you try to use it. So 10 years from right now even, unless they can software patch it upwards.
stackghost 4 hours ago||
Interesting, what's broken for you? I have some unifi gear and it handles v6 no problem.
zokier 10 hours ago|||
Except that is completely wrong. Consumer/residential networks have significantly higher ipv6 adoption rates that corporate/enterprise networks. That is why you see such clear patterns (weekend vs weekday) in the adoption graphs.
bluGill 8 hours ago||
There are still a lot that have not.
crote 11 hours ago||||
Sure, the data plane supports it - but what about the management plane?

I wouldn't be surprised if ISPs did all the management tasks through a 30-year-old homebrew pile of technical debt, with lots of things relying on basic assumptions like "every connection has exactly one ip address, which is 32 bits long".

Porting all of that to support ipv6 can easily be a multi-year project.

mjcl 3 hours ago|||
Comcast actually implemented IPv6 10-15 years ago so that they could unify the management of all of their cable modems. Prior to that they had many regional networks using with modems assigned management IPs in overlapping private IPv4 ranges.
Sesse__ 11 hours ago||||
> Porting all of that to support ipv6 can easily be a multi-year project.

FWIW, as someone who has done exactly this in a megacorp (sloshing through homebrew technical debt with 32-bit assumptions baked in), the initial wave to get the most important systems working was measured in person-months. The long tail was a slog, of course, but it's not an all-or-nothing proposition.

Hikikomori 10 hours ago|||
This is true, I worked for an old ISP/mobile carrier that started in the 80s about 10-15 years ago. They had basically any system you could think of still running, from decently modern vmware with windows and linux to hp-ux, openvms, sunos, AIX, etc. Could walk around and see hardware 30 years old still going, I think one console router had an uptime of 14 years or so. One time I opened a cabinet and found a pentium 1 desktop pc on the floor still running and connected, served some webpage. The old SMSC from the 80s on DEC hardware was still in its racks though not operational, they didn't need the space as the room couldn't provide enough power or cooling for more than a few modern racks. The planning program for fiber, transmission, racks, etc, required such an old java that new security bugs didn't apply to it, and looked and worked like an old mainframe program.

The core team supported ipv6 for a long time, but its rather easy to do that part. The hard part is the customer edge and CPE and the stack to manage it, it may have a lifetime of 2 decades.

lxgr 5 hours ago||||
> it's hard to remember addresses

We desperately need a standardized protocol to look up addresses via names. Something hierarchical, maybe.

> with v6 you can't rely on NAT as an ersatz firewall

Why would you not just use a regular firewall? Any device that is able to act as a NAT could act as a firewall, with less complexity at that.

stackghost 4 hours ago||
>Why would you not just use a regular firewall?

No idea, but people do it. Every time this comes up on HN there are dozens of comments about how they like hiding their devices behind a NAT, for security

lxgr 3 hours ago||
Just because people regularly bring up a non sequitur doesn't mean there actually is a problem.

"I have a device acting as both a NAT and a stateful firewall, why are you making me switch to IPv6 and in the process drop both the NAT and the stateful firewall?" is a non sequitur.

stackghost 3 hours ago||
I think we're talking about two different things, or maybe I just don't understand your reply.

What I'm saying is this: There exist people in the hobbyist space who believe that when their devices only have private IPv4 addresses such as 192.168.0.0/16 that this meaningfully increases their network security, and that if their raspberry pi has a globally-routable v6 address that this weakens their network security, even though this is bogus because NAT is orthogonal to network security considerations, and that this belief contributes to IPv6 hesitancy.

nottorp 6 hours ago||||
> But both of these are really only valid for DIY homelab enthusiast types. I honestly have no idea why other people resist ipv6.

Simple. The "homelab enthusiast types" are those that usually push new technologies.

This is one they don't care about, so they don't push it. Other people don't care about any technology if it's not pushed on them.

boredatoms 6 hours ago||||
Nothing stops you running a NAT for v6 too, its just people tend to choose not to when given the choice
ok123456 1 hour ago||
I set up NAT66 recently with DHCPv6. The IPv4 and IPv6 addresses are practically the same, except IPv6 has a prefix and a double colon as the last separator.

This really should be how SOHO routers do IPv6 out of the box.

Most people don't want 1:1 addressing for their entire home or office.

bananamogul 4 hours ago||||
"Is there a reason why adoption has been so abysmally slow?"

Just the obvious one: the people who designed IPv6 didn't design for backwards compatibility.

Dagger2 1 hour ago|||
How so? The same working group published e.g. https://www.rfc-editor.org/rfc/rfc1933, and it's hard to see how v6 could have been designed for backwards compatibility in ways that it wasn't already.

I've asked lots of people to describe a more backwards-compatible design, and generally the best they can manage is to copy the way v6 does things, ending up with the same problems v6 has. This has happened so often that the only reasonable conclusion is that it can't really be done any better than it was.

jampekka 2 hours ago|||
> Just the obvious one: the people who designed IPv6 didn't design for backwards compatibility.

Nor for easy transition.

Dagger2 9 hours ago||||
Has it been abysmally slow? What's the par time for migrating millions of independent networks, managed by as many independent uncoordinated administrators, to a new layer 3 protocol?

We've never done this before at this scale. Maybe this is just how long it takes?

alibarber 8 hours ago||||
> 1: it's hard to remember addresses

fd::1 is perfectly valid internal IPv6 address (along with fd::2 ... fd::n)

holowoodman 8 hours ago|||
fd::1 is somewhere in the reserved ::/8 space where various stuff like old ipv4 mapped addresses and localhost reside. What you probably mean is something like fd00::1, but that is something you shouldn't use, because 'fd00::/8' is a probabilistically unique local address (ULA) block. You are supposed to create a /48 net by appending 40 random bits to fd00::/8. Of course, if your fair dice roll lands on all zeroes, and you are ok with probable collisions in case of a network merge, you are fine ;)
ninkendo 7 hours ago||
In home networks, the idea of merging with someone else's network is... most certainly not worth worrying about. Maybe you marry someone or become roommates with someone who also picked fd00::/8? And you still want two separate subnets? Other than that I don't see a scenario where it matters.

Granted, if you're doing this in a corporate setting (where merging with someone else's address space is a lot more realistic), then yes definitely pick a random 40 bits. But at home? Who cares. Same as using 192.168.1.0/24 instead of a random 10.0.0.0/24 subnet... it's not worth worrying about.

holowoodman 7 hours ago||
I'm having my own and my girlfriend's router (in different flats) connect to each other with a wireguard tunnel, so I can print on her printer. Non-colliding addresses make this a lot easier.

But yes, renumbering also isn't a lot of work.

nubinetwork 12 hours ago||||
> Like surely all the big players have updated their networking equipment by now

My home isp can't even do symmetrical gigabit, let alone ipv6...

esseph 11 hours ago||
That's extremely common unless on "active" fiber (vs GPON, DOCSIS3, DSL, most fixed wireless, satellite, mobile, etc.)

Your wifi isn't symmetrical either.

Hikikomori 10 hours ago||
Those are designed to have static asymmetrical bandwidth though, *dm split gives ISP side more of possible shared bandwidth. Wifi bandwidth is shared and dynamic so client can use all of it.
esseph 4 hours ago||
> Those are designed to have static asymmetrical bandwidth though

Yes, that's why I said that?

> *dm split

No idea what you're trying to say here.

cyberax 10 hours ago||||
IPv6 is a recursive WTF. It might _look_ like a conservative expansion of IPv4, but it's really not. A lot of operational experience and practices from IPv4 don't apply to IPv6.

For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

In IPv6 each host has multiple global addresses. But if your global connection goes down, these addresses are supposed to be withdrawn. So your hosts can end up with _no_ addresses. ULA was invented to solve this, but the source selection rules are STILL being debated: https://www.ietf.org/archive/id/draft-ietf-6man-rfc6724-upda...

Then there's DHCP. With IPv4 the almost-universal DHCP serves as an easy way to do network inspection. With IPv6 there's literally _nothing_ similar. Stateful DHCPv6 is not supported on Android (because its engineers are hell-bent on preventing IPv6). And even when it's supported, the protocol doesn't require clients to identify themselves with a human-readable hostname.

Then there's IP fragmentation and PMTU that are a burning trash fire. Or the IPv6 extension headers. Or....

In short, there are VERY good reasons why IPv6 has been floundering.

jandrese 20 minutes ago|||
> For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

This is a troll right? NAT is a lot of things, but "simple and clean" is definitely not one of them. It causes complications at every step of the process.

Pure IPv6 is so much cleaner.

I will say that DHCP6 is probably misnamed. It does not fill the same niche has IPv4 DHCP, and this causes a lot of confusion with people who are new to IPv6. It should probably be called DPDP (Dynamic Prefix Distribution Protocol) or something like that. It's for routers not hosts.

In theory you should be using anycast DNS to find local hostnames, but in practice the tooling around this is somewhat underbaked.

teddyh 7 hours ago||||
> For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

No, that’s not the IPv4 design. That’s an incredibly ugly hack to cope with IPv4 address shortage. It was never meant to work this way. IPv6 fixes this to again work like the original, simpler design, without ”local” addresses or NAT.

> In IPv6 each host has multiple global addresses.

Not necessarily. You can quite easily give each host one, and only one, static IPv6 address, just like with old-style IPv4.

cyberax 3 hours ago||
Hyrum's law. That's how IPv4 is being used in practice.

> You can quite easily give each host one, and only one, static IPv6 address, just like with old-style IPv4.

You literally CAN NOT. On Android there's no way to put in a static IPv6 or even use stateful DHCPv6.

Dylan16807 21 minutes ago||
> Hyrum's law. That's how IPv4 is being used in practice.

It's still very ugly to mess with the ports that way.

The only clean NAT is 1:1 IP NAT.

dwattttt 9 hours ago||||
> For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

I assume you mean "interface", not "host". Because it's absolutely not true that a host can only have one "local net address".

EDIT: a brief Google also confirms that a single interface isn't restricted to one address either: sudo ip address add <ip-address>/<prefix-length> dev <interface>

throw0101d 4 hours ago||||
> For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

If you think NAT is "simple and clean", you may wish to investigate STUN/TURN/ICE. An entire stack of protocols (and accompanying infrastructure) had to be invented to deal with NAT.

Heaven help you if your ISP uses CG-NAT.

cyberax 2 hours ago||
I can type entire SIP handshakes from memory. And by now I'm convinced that STUN/TURN are a superior solution to IPv6, even with CGNAT.

Others agree with me. Don't believe me? Try to find a SIP provider in the US that has IPv6 connectivity. Go on. Try it.

toast0 6 hours ago||||
> Then there's IP fragmentation and PMTU that are a burning trash fire.

It's not significantly worse on v6 compared to v4. Yes, in theory, you can send v4 packets without DF and helpful routers will fragment for you. In practice, nobody wants that: end points don't like reassembling and may drop fragments; routers have limited cpu budget off the fast path and segment too big is off the fast path, so too big may be dropped rather than be fragmented and with DF, an ICMP may not always be sent, and some routers are configured in ways where they can't ever send an ICMP.

PMTUd blackholes suck just as much on v4 and v6. 6rd tunnels maybe make it a bit easier to hit if you advertise mtu 1500 and are really mtu 1480 because of a tunnel, but there's plenty of derpy networks out there for v4 as well.

kalleboo 5 hours ago|||
> but there's plenty of derpy networks out there for v4 as well.

God yes, I've helped so many users on PPPoE by telling them to set their MTU to something lower...

cassianoleal 3 hours ago||
In my case, I set the MTU of the physical NIC to 1508 and kept the PPPoE interface at 1500. Best of both worlds. Needs the ISP to support it though.
cyberax 2 hours ago|||
IPv4 allows fragmentation by the middleboxes, which in practice papers around a lot of PMTU issues.

The IPv6 failing was not taking advantage of the new protocol to properly engineer fragmentation handling. But wait, there's more! IPv6 also has braindead extension headers that require routers to do expensive pointer chasing, so packets with them are just dropped in the public Net. So we are stuck with the current mess without any way to fix it.

People are trying: https://datatracker.ietf.org/doc/rfc9268/ but it's futile. It's waaaay too late and too fundamental.

toast0 1 hour ago||
> IPv4 allows fragmentation by the middleboxes, which in practice papers around a lot of PMTU issues.

In theory yes; but actual packets are 99%+ flagged DF. Reassembly is costly, so many servers drop fragmented packets, or have tiny reassembly buffers. Back when I ran a 10G download server, I would see about 2 fragmented packets per minute, unless I was getting DDoSed with chargen reflection, so I would use a very small reassembly buffer and that avoided me burning excessive cpu on garbage, while still trying to handle people with terrible networks.

Router fragmentation is also expensive and not fast path, so there's pretty limited capacity for in path fragmentation.

holowoodman 7 hours ago||||
> For example, in IPv4 each host has one local net address, and the gateway uses NAT to let it speak with the Internet. Simple and clean.

That's only true for smalltime home networks. Try to merge 2 company IPv4 networks with overlapping RFC1918 ranges like 10.0.0.0/8. We'll talk again in 10 years when you are done sorting out that mess ;)

> In IPv6 each host has multiple global addresses. But if your global connection goes down, these addresses are supposed to be withdrawn. So your hosts can end up with _no_ addresses.

Only a problem for home users with frequently changing dialup networks from a stupid ISP. And even then: Your host can still have ULA and link-local addresses (fe80::<mangled-mac-address>).

> ULA was invented to solve this, but the source selection rules are STILL being debated: https://www.ietf.org/archive/id/draft-ietf-6man-rfc6724-upda...

RFC6724 is still valid, they are only debating a slight update that doesn't affect a lot.

> Then there's DHCP.

DHCPv6 is an abomination. But not for the reasons you are enumerating.

> With IPv4 the almost-universal DHCP serves as an easy way to do network inspection.

IPv4 DHCP isn't a sensible means to do network inspection. Any rougue client can steal any IP and MAC address combination by sniffing a little ARP broadcast traffic. Any rogue client can issue themselves any IPv4 address, and even well-behaved clients will sometimes use 169.254.0.0/16 (APIPA) if they somehow didn't see a DHCP answer. If you want something sensible, you need 802.1x with some strong cryptographic identity for host authentication.

> Stateful DHCPv6 is not supported on Android (because its engineers are hell-bent on preventing IPv6).

Yes, that is grade-A-stupid stubborness. On the other hand, see below for the privacy hostname thingy in IPv4 and the randomized privacy mac addresses that mobile devices use nowadays. So even if Android implemented stateful IPv6, you will never be reliably able to track mobile devices on your network. Because all those identifiers in there will be randomized, and any "state" will only last for a short time. If you want reliable state, you need secure authentication like 802.1x on Ethernet or WPA-Enterprise on Wifi, and then bind that identity to the addresses assigned/observed on that port.

> With IPv6 there's literally _nothing_ similar.

Of course there is. DHCPv6 can do everything that IPv4 DHCP can do (by now, took some time until they e.g. included MAC addresses as an option field). But in case of clients like Android that don't do DHCPv6 properly, you still have better odds in IPv6: IPv6 nodes are required to implement multicast (unlike in IPv4 where multicast was optional). So you can just find all your nodes in some network scope by just issuing an all-nodes link-local multicast ping on an interface, like:

> ping6 ff02::1%eth0

There are also other scopes like site-local: > ping6 ff05::1%eth0 https://www.iana.org/assignments/ipv6-multicast-addresses/ip...

(The interface ID (like eth0, eno1, "Wired Network", ...) is necessary here because your machine usually has multiple interfaces and all of those will support those multicast ranges, so the kernel cannot automatically choose for you.)

> And even when it's supported, the protocol doesn't require clients to identify themselves with a human-readable hostname.

DHCP option 12 ("hostname") is an option in IPv4. Clients can leave it out if they like. There is also such a thing as "privacy hostname" which is a thing mobile devices do to get around networks that really want option 12 to be set, but don't want to be trackable. So the hostname field will be something like "mobile-<daily_random>".

What you skipped are the really stupid problems with DHCPv6 which make it practically useless in many situations: DHCPv6 by default doesn't include the MAC address in requests. DHCPv6 forwarders may add that option, but in lots of equipment this is a very recent addition still (though the RFC is 10 years old by now). So if you unbox some new hardware, it will identify by some nonsensical hostname (useless), an interface identifier (IAID, useless, because it may be derived from the MAC address, but it may also be totally random for each request) and a host identifier (DUID, useless, because it may be derived from the mac address, but it may also be totally random for each request). Whats even more stupid, the interface identifier (IAID) can be derived from a MAC address that belongs to another interface than the one that the request is issued on. So in the big-company usecase of unboxing 282938 new laptops with a MAC address sticker, you've got no chance whatsoever to find out which is which, because neither IAID nor DUID are in any way predictable. You'll have to boot the installer, grab the laptop's serial number somewhere in DMI and correlate with that sticker, so tons of extra hassle and fragility because the DHCPv6 people thought that nobody should use MAC addresses anymore...

cyberax 2 hours ago||
> That's only true for smalltime home networks. Try to merge 2 company IPv4 networks with overlapping RFC1918 ranges like 10.0.0.0/8. We'll talk again in 10 years when you are done sorting out that mess ;)

Look, I've been doing IPv6 for 20 years, starting with a 6to4 tunnel and then moving to HE.net before getting native connectivity. I'm probably one of the first people who started using Asterisk for SIP on an actual IPv6-enabled segmented network.

I _know_ all the pitfalls of IPv6 and IPv4. And at this point, I'm 100% convinced that NAT+IPv4 is not just an accidental artifact but a better solution for most practical purposes.

> What you skipped are the really stupid problems with DHCPv6 which make it practically useless in many situations: DHCPv6 by default doesn't include the MAC address in requests.

Yes. DUIDs were another stupid idea. As I said, IPv6 is a cascade of recursive WTFs at every step of the way.

And let me re-iterate, I'm not interested in academic "but acshually" reasons. I know that you can run IPv4 with DHCP giving out publically routable IPv4 addresses to every host in the internal network without NAT. Or that you can do NAT on IPv6 or laboriously type static IPv6 addresses in your config.

What matters is the actual operational practice. Do you want a challenge? Try to do this:

1. An IPv6 network for a small office with printers, TVs, and perhaps a bunch of smart lightbulbs.

2. With two Internet uplinks. One of them a cellular modem and another one a fiber connection.

3. You want failover support, ideally in a way that does not interrupt Zoom meetings or at least not for more than a couple of seconds.

4. No NAT (because otherwise why bother with IPv6?).

Go on, try that. This is something that I can do in 10 minutes using an off-the-shelf consumer/prosumer router and IPv4. With zero configuration for the clients, apart from typing the WiFi password.

holowoodman 1 hour ago||
Well, I can do that with OpenWRT, no idea which prosumer devices already implement this, but it isn't rocket science: Announce the Prefix of the currently active connection, invalidate the other one. Will interrupt all your TCP connections, but they are toast anyways, most software should handle this just fine. It's quite the same as a Wifi-to-Cellular handover.
philipallstar 10 hours ago||||
How do the working IPv6 deployments cope with these issues?
cyberax 3 hours ago||
The simple answer is: they just don't deploy IPv6.

These days you can use ULA and third-party monitoring tools instead of DHCP.

stackghost 4 hours ago||||
>For example, in IPv4 each host has one local net address

Most of my home devices have multiple v4 addresses, not counting 127.0.0.1, so this assumption is incorrect.

yangm97 10 hours ago|||
The reason: Skill issue.
direwolf20 12 hours ago|||
Ignore all the excuses like longer addresses and incompatible hardware. The actual reason is that everyone hates change.
themafia 13 hours ago|||
Comcast, one of the largest residential ISPs in the USA, has almost full IPv6 deployment by default. The majority Verizon Wireless is IPv6 by default. Residential customers in the USA have great access if they just enable the stack.

There is nothing about IPv6 that prevents ISPs from filtering ports for all customers. They almost all actively filter at least port 25, 139 and 445 regardless of the actual transport. So I'm not sure "blocking service hosting" is the actual goal here.

The problem seems to be that all of the large and wealthy nations of the world have made the necessary huge investments into IPv6 while many of their smaller neighbors and outlying countries and islands have struggled to get any appreciable deployment.

It should be a UN and IMF priority to get IPv6 networks deployed in the rest of the world so we can finally start thinking about a global cutover.

dtech 12 hours ago|||
In many developing countries IPv6 adoption is far and sometimes networks are IPv6-only, because IPv4 is expensive and they have relatively little addresses compared to users...

You can see southeast Asia is pretty green on the map of the post.

kortilla 11 hours ago|||
A UN priority!? They have real issues they should be dealing with like the life and death of millions of people
realityking 12 minutes ago|||
To be fair to the grand parent, the International Telecommunications Union is a specialized agency of the UN and actively promoting IPv6: https://www.itu.int/en/ITU-T/ipv6/Pages/default.aspx
themafia 2 hours ago|||
I think it's fine if they have more than one priority.
fogllgldl 9 hours ago|||
Worst migration plan ever.
preisschild 13 hours ago|||
> It should be ISPs doing that to prepare for the transition.

Yeah, I dont get why more ISPs don't offer carrier-grade NAT64 instead of the typical CGNAT

ianburrell 2 hours ago|||
NAT64 doesn't make sense for consumers. There are too many apps that hardcoded IPv4 in their code. People are going to complain that their old Xbox games don't work.

For most people, dual stack works fine. For mobile, the solution is 464XLAT that translates locally. There is MAP-E that does translation on gateway with IPv4 on local network.

For businesses, NAT64 makes more sense cause they can control what software is running. Even there, usually have to make IPv4 subnet for the old printers.

preisschild 53 seconds ago||
> There are too many apps that hardcoded IPv4 in their code

That would work over CLAT, which most operating systems support.

lmm 12 hours ago|||
In parts of the world with fewer IP addresses they already are. My ISP _only_ offers MAP-E access to the IPv4 internet for anyone not grandfathered into an older plan.
panny 12 hours ago||
I don't want IPv6. Why would I? It's like a permanent global cookie. You're uniquely tagged and identifiable on every website you visit.

>it's in their best interest to ensure users can't host services without them.

They'll just keep blocking port 25. IPv6 won't change anything with regards to self hosting.

kstrauser 6 hours ago|||
> You're uniquely tagged and identifiable on every website you visit.

Almost every modern OS enables IPv6 privacy extensions, ie address randomization, by default.

farfatched 12 hours ago|||
My OS gives me IPv6 privacy addresses out-the-box which rotate every few hours.
rmunn 10 hours ago||
Zoom in on that graph using the controls at the bottom, and you'll see a repeating pattern of crests and troughs, weekly. There's about a 5% difference between the crests and the troughs: the crests are hitting the 50% line or just below it, and the troughs are down around 45%.

The real question is, why are the crests so predictable? They're always on Saturdays; Sunday dips down a little below the crest, then Monday-Friday is down in the 45% range before the next Saturday jumps up to 50% again. (Fridays usually have a small rise, up to the 46-47% area).

My theory: mobile access rises on weekends. People are more often accessing Google services from their work computers Monday-Friday, but on Saturdays and Sundays most (not all) people are away from the office. Many of them will end up using smartphones rather than laptops for Internet access, for various reasons such as being outdoors. And since smartphones are nearly all using IPv6 these days, that means an uptick in IPv6 usage over the weekends.

kalleboo 10 hours ago||
It's not just mobile networking but residential ISPs in general have better IPv6 support. In the US, Comcast was one of the first big IPv6 deployments, in Europe CGNAT+IPv6 is common in many places.

Meanwhile corporate IT for business and education networks have less incentive to upgrade and typically lag behind in adoption in general.

crest 2 hours ago||
I've been running full dual stack for >15 years now. It has become second nature by now and I'm slowly testing IPv6 mostly, but so far it's just easier to deliver dual-stack to all users instead of dealing with workarounds to make the last few non-IPv6 capable services work without native IPv4.
Xirdus 7 hours ago||
Residential vs. business. If the graph was hourly and per country, you'd see the same rise every morning and drop every evening (likely by more than 5pp).
colmmacc 10 hours ago||
If GitHub flipped a switch and enabled IPv6 it would instantly break many of their customers who have configured IP based access controls [1]. If the customer's network supports IPv6, the traffic would switch, and if they haven't added their IPv6 addresses to the policy ... boom everything breaks.

This is a tricky problem; providers don't have an easy way to correlate addresses or update policies pro-actively. And customers hate it when things suddenly break no matter how well you go about it.

[1] https://docs.github.com/en/enterprise-cloud@latest/organizat...

alibarber 10 hours ago||
Having been messing around personally with getting my own blocks of IP addresses and routing[1] - I've become terrified at the idea of implementing access control based on IP address.

Unless your own organisation in the RR has the IP addresses assigned to you as Provider Independent resources, there just seems to be so many places where 'your' IP address could, albeit most likely accidentally, become not yours any more. And even then, just like domain names, stop renewing the registration and someone else will get them - I was that someone else recently...

[1] AS202858

yosamino 9 hours ago||
Oh, cool! that's on my bucket list as well. I am still grappling with some concepts, though.

Do you have a writeup of your setup somewhere or can you recommend some learning materials ?

alibarber 8 hours ago||
It's fun and has now become an addictive rabbit hole - trying to get packets from one location to the other in the fastest, most direct way (and at hobbyist budget level).

Initial writeup based on IPv6: https://abarber.com/Setting-Up-ASN-IPv6-Routing-BIRD-Teltoni...

Have been having fun recently with an IPv4 block and Asynchronous routing, working on writing that up right now :)

progbits 10 hours ago|||
Anyone who relies on IP filtering for security deserves to have it broken. Change my mind.
omh 9 hours ago|||
I'll take that bait ;-)

IP filtering is a valuable factor for security. I know which IPs belong to my organisation and these can be a useful factor in allowing access.

I've written rules which say that access should only be allowed when the client has both password and MFA and comes from a known IP address. Why shouldn't I do that?

And there are systems which only support single-factor (password) authentication so I've configured IP filtering as a second factor. I'd love them to have more options but pragmatically this works.

friendzis 6 hours ago||
Why are you (re-)implementing client security on provider end? If a client requires that only requests from a particular network are permitted... Peer in some way.

I do understand the value of blocking unwanted networks/addresses, but that's a bit different problem space.

sebiw 9 hours ago||||
Defense in depth is a thing but I agree that relying on it is not a good idea.
tucnak 7 hours ago||
Defense in depth is not the point, zero trust networking is.
apexalpha 9 hours ago|||
IP filtering + proper security is better than just having the security.

There's value in restricting access and reducing ones attack surface, if only to reduce noice in monitoring.

bluGill 9 hours ago|||
If you can't handle sites switching to ipv6 in 2015 (ten years ago) your security plan is garbage.
azernik 2 hours ago|||
> providers don't have an easy way to correlate addresses

Yes, they do. It's called DNSSEC.

TabTwo 8 hours ago||
Thanks to the trend to SASE like Palo Alto GlobalProtect or ZScsler this practice is not a good idea anymore. Speaking of ZScaler, they are still IPv4 only, right?
loevborg 12 hours ago||
Sometimes TCP/IP is a leaky abstraction, and recently ipv6 peeked through in two separate instances:

- In a cafe wifi, I had partial connectivity. For some reason my wifi interface had an ipv6 address but no ipv4 address. As a result, some sites worked just fine but github.com (which is, incredibly, ipv4-only) didn't

- I created a ipv6-only hetzner server (because it's 2026) but ended up giving up and bought a ipv6 address because lack of ipv4 access caused too many headaches. Docker didn't work with default settings (I had to switch to host networking) and package managers fail or just hang when there's no route to the host. All of which is hard to debug and gets in your way

pastage 12 hours ago||
You can solve this issue if you have one server with ipv6/ipv4 you can run NAT with Jool and connect ipv6 only servers to that. Like Android does.

I wish hosting providers would give you a local routed ipv4 on ipv6 servers with a default NAT server. It is not that expensive I move 10Gbps "easily" and they could charge for that traffic.

zokier 12 hours ago||
> I wish hosting providers would give you a local routed ipv4 on ipv6 servers with a default NAT server.

You mean like AWS NatGW https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gat...

emj 11 hours ago|||
30 USD/month and 0.045 USD/GB for ingress it is ok if you are big. It is a cheap service to build yourself. I do feel the pain of it being hard to get IPv4 minimal connectivity on ipv6 only hosts, i.e. for me a 1 USD/GB would be fine.
crote 11 hours ago||||
Those are still per-customer and require you to dedicate an entire IP address to it. That's overkill for a server which mostly talks over ipv6 but needs to connect to an ipv4-only service like Github once in a blue moon.
loevborg 10 hours ago|||
Any services like this for Hetzner?
umanwizard 4 hours ago||
The cafe WiFi thing (getting IPv6 only, no ipv4, on a public network) used to happen quite often to me on macOS. I never figured out why, and I haven’t noticed in a while.
zokier 13 hours ago||
This google metric measures adoption in access networks, but at this point I feel more interesting metric is adoption in services.

One such stat is here:

> adoption ranging from 71% among the top 100 to 32% in the long tail

https://commoncrawl.org/blog/ipv6-adoption-across-the-top-10...

Getting full coverage on AWS (/GCP/Azure) and few other key services (GitHub...) would be significant here imho.

tonymet 5 hours ago|
great resource. Common crawl is a goldmine
mgulick 7 hours ago||
I get an IPv6 address from my ISP (a /56 I believe), but I wish there was some good information on how to update my OpenWRT VLAN configuration, routing, and firewall rules to be able to support native IPv6 on my devices. Would love to be able to have direct IPv6 connections to the internet from my devices, but I want to make sure I can do it safely.
dlcarrier 38 minutes ago||
Yeah, I'm in the same boat. I like the idea of being able to remotely connect to anything on my network, but I know just enough about networking to be dangerous, and don't trust my self to set it up securely, so I have IPv6 disabled on my router. With IPv4, it's physically impossible to mess up the firewall and NAT settings enough to make local devices public.
nzeid 7 hours ago|||
This was surprisingly complicated for me on Altice/Optimum, which is why my home didn't have IPv6 for a while even after they started provisioning.

We actually have a /128 address only, and had to tweak several settings including enabling IPv6 masquerading (NAT).

I haven't the slightest clue why they didn't give us a block.

_bernd 7 hours ago||
You only need to set nothing and it should setup ipv6 on all downstream vlan interfaces. For static prefix I'd you can set ip6hint per vlan interface. For each vlan interface you need a stanza in the DHCP config file. And regarding firewall, as with the default lan zone you might need to add new zones with the vlan interfaces and configure forwarding rules. That's it.
marginalx 5 hours ago||
Is most of that due to mobile?

The real migration challenges are in the server side/consumer home internet space which I'm not sure if there are clear stats around the adoption there.

I think IPV6 is a great example of over engineering, trying to do too much in one iteration. In an ideal scenario this could work, but in the context of large scale change with no single responsible party, it usually doesn't work well.

azernik 2 hours ago||
The problem has nothing to do with over engineering, or really anything to do with the actual contents of the IPv6 standard. It is just devilishly hard to make any backwards-incompatible change to layer 3, and address expansion is always going to be backwards incompatible.
mrjoe3332 22 minutes ago||
There were some choices of v6 that made it extra hard, like declaring all v4 addresses no longer valid in v6, or making slaac default
zokier 4 hours ago|||
CloudFlare Radar has stats for desktop (34%) vs mobile (46%) adoption: https://radar.cloudflare.com/explorer?dataSet=http&groupBy=i...
jollyllama 3 hours ago|||
I was wondering how much is "last mile" between end-user devices and the next hop vs. within cloud networks, but the bit about mobile is a good point.
mrjoe3332 28 minutes ago||
It'd be annoying even in the scenario where it got quickly adopted. Complicated spec, user-unfriendly addresses, unclear defaults.
molf 13 hours ago|
It's only a matter of time before laptops get 5G. Macbooks have been rumoured for a while to get cellular modems. [1]

This will probably help adoption. On the one hand it will generate more IPv6 traffic. On the other hand it will expose more developers to IPv6; which will expose them to any lack of support for IPv6 within their own products.

[1]: https://9to5mac.com/2025/08/14/apples-first-mac-with-5g-cell...

venzaspa 12 hours ago||
Dell, HP and Lenovo have had laptops with cellular modems for maybe 15 years at this point.
dlcarrier 37 minutes ago|||
Yeah, but any given technology hasn't been invented yet, until Apple releases it.
theandrewbailey 10 hours ago||||
I can confirm this. I work at an e-waste recycling company, and the vast majority of my inventory is corporate IT decommissioned gear. About 1 out of 10 laptops I tear down has a cellular modem, going back to about Intel Core 5th gen.
vel0city 4 hours ago|||
I've had laptops with cellular modems built in going back to Pentium IIIs. The Compaq N600c had a "multiport" bay on the lid, one of the options was a GSM modem.
brcmthrowaway 4 hours ago|||
Jesus, what a waste
gempir 8 hours ago|||
*A few select models got celluar modems.

I have owned several Dell, HP and Lenovo Laptops in the past 15 years and I have never had a cellular modem.

When Apple makes a change like that it impacts a lot of customers because they have way fewer skews.

dlcarrier 35 minutes ago||
I've never had a modern laptop with a cellular modem, but every one I've owned has supported them internally. Even when they aren't provisioned with them, they're usually still supported as aftermarket options.
Sweepi 5 hours ago|||
| Macbooks have been rumoured for a while to get cellular modems.

Maybe they are finally coming, however the rumors are older then the iPhone. Example from 2008: https://pcr-online.biz/2008/11/03/3g-macbooks-on-the-way/

nottorp 6 hours ago|||
> It's only a matter of time before laptops get 5G.

So you want laptops to cost <whatever the laptop costs> plus a measly 19.99/month for internet connectivity?

What's wrong with just tethering to my existing phone?

Glemllksdf 12 hours ago|||
Thats quite surprising thing to me and weirdly obvious.

If you are single, have a phone contract, you would need some extra contract for a landline internet and wifi router because thats what a lot of people just do and now they can just add an esim and pay a little bit more.

Interesting that this sounds/feels a lot more right or useful than it did 5 years ago.

panny 12 hours ago||
I can't imagine a worse privacy nightmare. Always on backdoored baseband in 5G with a unique permanent IPv6 address assigned to the machine. Okay, maybe it could be worse if each user account is assigned its own unique IPv6 perma-cookie.
Dagger2 8 hours ago|||
You're thinking of MAC addresses. Machines don't have permanently-assigned v6 addresses, rather the IP is assigned by whatever network they're currently attached to and will change based on that network's whims, just like it does in v4.
merpkz 9 hours ago||||
As if people doesn't already carry always online machine in their pockets
nottorp 6 hours ago|||
> Okay, maybe it could be worse if each user account is assigned its own unique IPv6 perma-cookie.

They will. One from facebook, one from google, one from tiktok, several from Palantir and its partners...

More comments...