this post was submitted on 25 Apr 2026
66 points (95.8% liked)
Technology
84222 readers
5754 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Oh that's cool.
Couldn't you do that with v4? Or maybe that was only with bridge interfaces. hmm
This is... interesting. At first I thought it was just like the v4 loopback range, but like you mentioned it opens up the possibility of routing between two on-machine networks. I'm gonna have to digest that idea for a while.
What's a useful way to manage clients identities? Like before, static MAC would allow the assignment of a static IP, then that device could be handled by the firewall using that IP. But with these random addresses is there any way to use targeted firewalling/monitoring for specific devices?
Multiple v4 addresses are possible, like secondary/virtual configurations, but it’s not a concept built into the formal specifications, and usually constrained to advanced networking equipment.
With v6, multiple addresses, across multiple prefixes, are first class features in even the dumbest nodes. I honestly consider it one of the most valuable features of v6.
ULA prefixes are basically equivalent to RFC1918 v4 private ranges. I have a unique ULA prefix wherever I have a RFC1918 range. Again, the key feature is they exist alongside GUA (public) prefixes, not instead of them. The key is the routing stack explicitly constrains reachability to within your administrative domain.
The way you’re supposed to identify hosts for v6 configuration is with a DUID instead of a MAC. That said, I don’t consider it necessary to keep track of individual hosts except for servers or other requirements for static addresses.
A better way of managing it is to group common hosts within a specific /64, and set policy specific to that. The hosts can then cycle through IADs as normal. It’s why it’s so important for ISPs to provide a minimum of /60 or /56 via PD as a default.
The only exception is if you need historical tracking of host activity, but any environment in that position is already heavily infected with surveillance urchins.
So this is just a feature of DHCPv6, right? The one unsupported by Android?
Then, without some kind of ident, you need physical separation or VLANs which gets kind of annoying in a small/home network. Mostly I want to keep an eye on windows machines, silence consumer devices (IoT/entertainment devices), and allow some services for a couple of servers (don't tell my ISP). They all need to be treated uniquely by the router/firewall.