• 62 Posts
  • 2.36K Comments
Joined 3 年前
cake
Cake day: 2023年6月13日

help-circle

  • The way you’re supposed to identify hosts for v6 configuration is with a DUID instead of a MAC.

    So this is just a feature of DHCPv6, right? The one unsupported by Android?

    A better way of managing it is to group common hosts within a specific /64, and set policy specific to that. The hosts can then cycle through IADs as normal. It’s why it’s so important for ISPs to provide a minimum of /60 or /56 via PD as a default.

    Then, without some kind of ident, you need physical separation or VLANs which gets kind of annoying in a small/home network. Mostly I want to keep an eye on windows machines, silence consumer devices (IoT/entertainment devices), and allow some services for a couple of servers (don’t tell my ISP). They all need to be treated uniquely by the router/firewall.


  • treadful@lemmy.zipOPtoCooking @lemmy.worldMujadara
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 天前

    That’s basically low-heat frying them for more than half an hour, according to the recipe?

    Basically. The goal is to literally caramelize the sugars in the liquid you sweat out of the onions. This takes time and a lot of attention to prevent burning or sticking to the pan.


  • treadful@lemmy.zipOPtoCooking @lemmy.worldMujadara
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 天前

    Btw, one thing I’ve found that pairs unexpectedly well with the taboulah salad and mujadara is unflavored Greek yogurt.

    I completely forgot that in the fridge. I’ll be having that with leftovers.

    Not to mention, SCO (steel cut oats) are always an improvement over hulled rice.

    I originally bought some groats to use (since that’s what wikipedia said), but my lack of experience with it and inability to find a good recipe using them made me go the rice route. Might give that a shot at some point.



  • As far as privacy is concerned, v6 allows a much broader scope for protection than v4 and NAT, as the IA portion (second 64 bits) can be changed at will by that endpoint. EUI-64 is still common with basic v6 stacks, but SLAAC will rotate every ~24 hours.

    Oh that’s cool.

    One of my favourite features of v6 is it explicitly permits, and caters for, multiple addresses on an interface. This means you could theoretically have a unique address per application, within multiple prefixes if they’re available.

    Couldn’t you do that with v4? Or maybe that was only with bridge interfaces. hmm

    I personally have all my internal services accessible only on addresses under ULA prefixes, which intrinsically prevents them from being accessed outside of my network, no firewall required. Using WireGuard permits remote access when needed.

    This is… interesting. At first I thought it was just like the v4 loopback range, but like you mentioned it opens up the possibility of routing between two on-machine networks. I’m gonna have to digest that idea for a while.


    What’s a useful way to manage clients identities? Like before, static MAC would allow the assignment of a static IP, then that device could be handled by the firewall using that IP. But with these random addresses is there any way to use targeted firewalling/monitoring for specific devices?




  • From the perspective of the internet, and any properly configured routing infrastructure, they should only ever be interested in the first 64 bits when routing, the second 64 should be exclusively the domain of the last segment.

    Interesting. But routers don’t actually strip that, do they? So the endpoint I’m communicating with will still get the full /128 address? I’m concerned about the privacy implications of MAC addresses being sent to everybody and their mother.