• eclipse@lemmy.world
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    5 months ago

    Given how large the address space is, it’s super easy to segregate out your networks to the nth degree and apply proper firewall rules.

    There’s no reason your clients can’t have public, world routeable IPs as well as security.

    Security via obfuscation isn’t security. It’s a crutch.

    • efstajas@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      edit-2
      5 months ago

      There’s no reason your clients can’t have public, world routeable IPs as well as security.

      There are a lot of valid reasons, other than security, for why you wouldn’t want that though. You don’t necessarily want to allow any client’s activity to be traceable on an individual level, nor do you want to allow people to do things like count the number of clients at a particular location. Information like that is just unnecessary to expose, even if hiding it doesn’t make anything more secure per se.

      • r00ty@kbin.life
        link
        fedilink
        arrow-up
        9
        ·
        5 months ago

        Well good news. Because ipv6 has a thing called privacy extensions which has been switched on by default on every device I’ve used.

        That generates random ipv6 addresses (which are regularly rotated) that are used for outgoing connections. Your router should block incoming connections to those ips but the os will too. The proper permanent ip address isn’t used for outgoing connections and the address space allocated to each user makes a brute force scan more prohibitive than scanning the whole Ipv4 Internet.

        So I’m going to say that using routable ipv6 addresses with privacy extensions is more secure than a single Ipv4 Nat address with dnat.