User:NeddySeagoon/IPv6

Overview
This page helps you decide if you really want to add IPv6 and if you do, how to go about it.

Your ISP
Your ISP has just arrived in the 21st century and offered you a native IPv6 connection. A native IPv6 connection is not required, since its perfectly possible to tunnel IPv6 over IPv4. 'Tunnel brokers' have been around for years. Tunnelling is not described here.

Range of Addresses
IPv4 allows at most 232 different IP addresses. IPv6 allows 2128 different IP addresses.

Some tricks have been used to expand IPv4 such as Network Address Translation (NAT). This allows several internet connected devices to share a single public IP. For example, IP addresses in the 10.0.0.0/8 range are reserved for use behind NAT, as are 192.168.0.0/16 and others. This works as far as it goes but has some limitations.

If you don't understand the /8 and /16 concepts, read up about them now. IPv6 uses them exclusively. There is no more netmask.

Public IP Addresses
With IPv4, NAT provided a degree of protection against bad things coming in from the internet. NAT does not stop bad things phoning home after they are in. Running a firewall was still a good thing, even if you are not paranoid.

With IPv6 all IP addresses are public. The concept of NAT does not exist. This means that if you are going to deploy IPv6 you either need a boundary IPv6 firewall or each IPv6 enabled device needs its own firewall.

Switching Over to IPv6
Switching to IPv6 only is not yet an option. At the time of writing the rest of the internet isn't there. If you want to use IPv6 it will be in addition to, not in place of your existing IPv4 setup. The two use completely different tools and are almost completely unaware of one another.

IPv6 Addresses
IPv6 addresses are written in colon separated hex, rather than dot separated decimal. Just like IPv4, IPv6 has the concept of self assigned link local addresses. They are only gaurenteed to be unique on your LAN so should not normally be allowed out on the internet. There are a few exceptions.

fe80::2e0:4cff:fe69:1509/64 is a self assigned link local address.

Link local addresses are made in one of two ways fe80::IPv4_address fe80::MAC_Address

fe80::/64 is the link local address space.



The :: is shorthand for any number of zero hex digits. IPv6 addresses may have a lot of consecutive zeros and it saves writing out and remembering all 32 hex digits. :: may appear only once in an address.

IPv6 Enabled Software
Some commands like route, take a switch -4 or -6 to determine if they should work with IPv4 or IPv6.

Others have two versions. like ping and ping6.

Either way, IPv6 is not yet the default.

Software Support
Your kernel needs IPv6 support. IPv6 firewall support will be useful too. We will use iproute to manage IPv6 and ip6tables for IPv6 firewalling. Set USE=ipv6 in

if its not already on in your profile, then

Do check that ipv6 is on before the emerge goes ahead.

If you had to set USE=ipv6 for yourself, you will need to

too to get IPv6 support everywhere.

Connecting to The Internet
This is probably the last step you want to perform.

Your ISP assigned /64 Prefix
Your ISP will have assigned you a /64 prefix beginning with 2. You need to know this later.

Just as you may have used 192.168.0/24 on your LAN, (the prefix here is 24) to allow up to 253 hosts to be on the same LAN segment, your ISP has allocated you a /64. That's 264 IPv6 addresses, or a lot more than there is in the entire IPv4 address space. This is the standard allocation for a single network segment. You are not supposed to subnet it further.

2001:db8::/32 — This prefix is used in documentation

Your ISP assigned /48 Prefix
ISPs vary, you might have got a /56 instead. Whatever, this is yours to subnet as you see fit for your LAN segments.

Using Your Router
Your router needs to be IPv6 capable. If its not, there may be a firmware upgrade, if not, you need a new router. That can be an old PC, a low power system or even a kernel virtual machine (KVM). You could also buy a IPv6 capable router and follow the instructions.

As with any firmware upgrade, it runs the risk of 'bricking' the device if something goes wrong.

Using PPPoE
In the UK at least, much of the broadband is delivered using Personal Point of Presesce over Ethernet (PPPoE). That is similar to the way internet was delivered using real baseband modems. If you provide your own PPPoE end point, adding IPv6 to your IPv4, so ppp0 gets a public IPv6 address as well as the more familiar IPv4 address is a matter of editing

and adding at the end +ipv6 ipv6 last_16_hex_digits_of_IPv6_address Then restarting ppp0.

should show that ppp0 now has an IPv6 address of the form ISP_assigned_prefix::last_16_hex_digits_of_IPv6_address

should work now too.

You now have IPv6 connectivity from your system to the big bad internet. The big bad internet also has connectivity to your system, which in not quite so good.

IPv6 Firewall
You probably already have an iptables based IPv4 firewall. The IPv6 equivelant is ip6tables. The two are completely complementary.

There are several tools for helping with setting up firewalls. I have used Shorewall for IPv4, so I will describe Shorewall6 (for IPv6) below.

My LAN is divided into three segments.
 * Wired hosts
 * fully protected from the internet, wireless hosts and servers


 * Wireless hosts
 * fully protected from the internet and servers


 * Servers
 * internet exposed devices with limited external access

If this looks like a Smoothwall setup, once upon a time it was. I have even propagated the zone names from Smoothwall.

The firewall setup is to deny everything going anywhere then to add rules to permit traffic as required.

The normal domestic router by contrast, runs a 'half open' setup, where anything is allowed out but packets are allowed in response to an outgoing request. This is simpler and faster to set up but has the disadvantage of allowing anything that does get in to phone home.

You will be surprised at the amount of things that appear to work but want to phone home for their own reasons too.

Shorewall6
Shorewall6 keeps its configuration files in /etc/shorewall6. For getting a IPv6 firewall working many of them can be left empty. Only the files listed below need to be edited
 * interfaces
 * describe your interfaces to Shorewall6


 * params
 * constants you define for use in other files to make them easier to read


 * policy
 * The defaults for each zone


 * rules
 * your firewall pules


 * shorewall6.conf
 * control logging and so on


 * zones
 * Describe your LAN to shorewall6

They all have their own man page which you are encouraged to read.

Shorewall6 can do timed access and Quality of Service too, in case you need to throttle your teenagers. Those topics are out of scope of this document.

/etc/shorewall6/interfaces
net              ppp0 dmz              eth0            nosmurfs blue             eth3            dhcp,nosmurfs green            eth1            dhcp,nosmurfs,routeback
 * 1) ZONE          INTERFACE               OPTIONS


 * 1) green         protected interface
 * 2) blue          protected interface - can't get to wired
 * 3) dmz           servers
 * 4) net           big bad internet
 * 5) net can be eth2 or ppp0

/etc/shorewall6/params
LOG=info


 * 1) IP addresses where we run particular services
 * 2) This avoids using name resolution in rules
 * 3) and at the same time, lets us use names for IP addresses
 * 4) Convention is initial capital letters for parameters

Notice the definition of LOG=info This allows us to write $LOG in other files.

Conversely, changing the LOG= here and restarting shorewall6 will change the log level everywhere that $LOG is used.

This file will grow as you write your rules. My /etc/shorewall/params (for IPv4) contains the following definitions. These will be migrated to /etc/shorewall6/params in due course. However, all the IPv6 addresses will be public, so I don't want to share them here. Of course, if my firewall works, any incoming connection attempts may be dropped

Public=
 * 1) Public IP address


 * 1) All IPs in dmz are static

Ntp=192.168.10.3
 * 1) Raspberry Pi Timeserver

Web=192.168.10.123
 * 1) Local IP of Webserver

Shell=192.168.10.123
 * 1) Local IP of Shell Server (ssh)

Mail=192.168.10.119
 * 1) Local IP of Mail server

Source=192.168.10.119
 * 1) Local IP of Gentoo Source Code Proxy

Portage=192.168.10.119
 * 1) Local IP of Portage Mirror

WAP2=192.168.54.150
 * 1) Local IP of LAPC1200 Wireless Access Point

Media=192.168.100.55
 * 1) Local IP of Media Server
 * 2) Its in green
 * 1) Its in green

Bluray=192.168.100.180
 * 1) Local IP of BluRay Player
 * 2) Its in green

OBI110=192.168.100.80
 * 1) Local IP of OBi110
 * 2) Its in green just now but needs to move to blue

These definitions allow the use of $Public $Ntp ... $Bluray and $OBI110 wherever the IP Address is needed in a rule.

You can also define constants to be used as port numbers or port number ranges here, in case /etc/services does not have the port numbers you need.

/etc/shorewall6/policy
This file says that anything coming from the internet to anywhere gets dropped. The originator will not even get an error message and everything else is rejected. That means, that you will get an error message if you try to connect to one of your own servers (in the dmz) from a wired host (green) until you write a rule.

net    dmz     DROP            $LOG net    blue    DROP            $LOG net    green   DROP            $LOG net    $FW     DROP            $LOG all    all     REJECT          $LOG The policy is applied when ip6tables gets to the end of the rules and still has not routed the packet.
 * 1) SOURCE DEST   POLICY          LOG     LIMIT:          CONNLIMIT:
 * 2)                               LEVEL   BURST           MASK
 * 1)                               LEVEL   BURST           MASK

/etc/shorewall6/zones
You don't need the comments and the names only need be unique. fw     firewall green  ipv6 dmz    ipv6 blue   ipv6 net    ipv6
 * 1) ZONE  TYPE            OPTIONS         IN                      OUT
 * 2)                                       OPTIONS                 OPTIONS
 * 3)       The firewall is its own zone
 * 1)       The firewall is its own zone
 * 1)       Green is the wired network
 * 1)       Green is the wired network
 * 1)       The internet is allowed to the dmz - servers go here
 * 1)       The internet is allowed to the dmz - servers go here
 * 1)       Connect your WAP here - Wireless devices
 * 1)       Connect your WAP here - Wireless devices
 * 1)       The big bad internet
 * 1)       The big bad internet

IPv6 Routing
When IPv6 was designed, routing was built in. Its set up the software and off you go. This means you get randomly seeming IPv6 addresses all over your LAN which can make firewalling difficult.

You can set static IPs and you will need to if you run servers, since you will need to set your AAAA records in the DNS to point to them.

Stateless IPv6 Setup
Use this method if your LAN is all in one zone. That is, if every device on your LAN is free to connect to every other device on your LAN. My view is that this insecure if you have any wireless devices, since they should not be permitted to connect to wired devices.

Stateful IPv6 Setup
Use this method if your LAN is divided into groups of related hosts and you want to control connectivity between them.

IPv6 Nameservers
Its all very well having IPv6 connectivity everywhere but it looks a bit tarnished if you are still using IPv4 for nameservers to get the IPv6 addresses you need for IPv6 to work. It works that way but until you have nameservers on IPv6 then your IPv6 will not be independent of IPv4.