IPv6 questions

Started by inaevrodom, Jun 17, 2022, 05:52 AM

Previous topic - Next topic

inaevrodomTopic starter

Hey all

If a provider offers you an IPv6/48 with your Rackspace and a few months later still cannot provide this because they are "out of stock" but still are advertising it is included on their latest forum adverts and website is that fair or considered legitimate?


Most providers if they have their own IPv6 space get a /32 or smaller allocation from which they can allocate /48's. It would be difficult to run out of these since there are 65,536 in a /32. It may be worth asking for the real reason. If you are happy with them then no reason to be alarmed but this is weird.


I'd probably be asking for a test IPv6 IP on their network, sounds like it's not enabled/they have some IPv6 issues rather than anything else..?

Obviously you shouldn't be reporting this to law enforcement as it is a civil matter, are you paid up to date with the provider? I find it hard to belive any provider is going to hold your servers "hostage" if you have all your invoices paid to date?


Compared to the fourth version, the TCP/IPv6 protocol has a number of additional functionality:
a simpler header is used, non-essential parameters are excluded from it, which reduces the load on routers when processing network requests.;
a higher level of security, authentication and confidentiality, which are the basis of this technology;
the protocol implements the Quality of Service (QoS) function, which allows detecting delay-sensitive packets;
multicast groups are used when transmitting broadcast packets;

to implement multicasting technology in IPv6, the built-in FF00::/8 address space is used;
To increase security, support for the IPsec encryption standard is used, which allows you to encrypt data without the need for any support from the application software.

Currently, experts are discussing data security in the case of a hybrid application of the two protocols.
Providers are building IPv6 tunnels to provide IPv4 users with access to high-level content. The use of this technology increases the risks of hаcker attacks. The auto-configuration function, when devices independently generate an IP address based on the MAC address of the equipment, can be used to illegally track confidential user data.