Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Decide what to do about IPv6 #140

Open
chesio opened this issue Apr 17, 2023 · 5 comments
Open

Decide what to do about IPv6 #140

chesio opened this issue Apr 17, 2023 · 5 comments
Assignees

Comments

@chesio
Copy link
Owner

chesio commented Apr 17, 2023

Right now IPv6 is "supported", but given the differences between IPv4 and IPv6, I should consider whether IPv6 should be treated differently. The sheer amount of available (*) IPv6 addresses makes blocklist feature rather inviable.

(*) Available not only in total, but to any single threat actor.

@chesio chesio self-assigned this Apr 17, 2023
@szepeviktor
Copy link
Contributor

szepeviktor commented May 27, 2023

  • ban a single IPv6 address ❌
  • ban /64 🤔
  • ban /56 🤔
  • search phrase: isp ipv6 assign prefix

@chesio
Copy link
Owner Author

chesio commented Aug 16, 2023

Note: the webhost most our WordPress projects run on, assigns /64 IPv6 prefix to a single VPS instance.

@chesio
Copy link
Owner Author

chesio commented Aug 16, 2023

A workaround to IPv6 problem: turn off IPv6 access by removing AAAA records of the domain from DNS 😄

@szepeviktor
Copy link
Contributor

Fail2Ban authors also talk about this problem.
fail2ban/fail2ban#1123 (comment)

@chesio chesio added this to the 0.22.x milestone Aug 17, 2023
@jameskimmel
Copy link

jameskimmel commented Sep 26, 2023

I think fail2ban should by default ban /48.
My reasoning for a /48 ban is simple: that is what a some ISPs offer to customers.
That is what I get from my ISP. If you wanted to block me, you would have to block 65k subnets. That is probably too much just to block a single attacker.

Yeah, I already know what you are going to say. "That could falsely ban someone that only gets a /64 from his ISP".
Yes, that is right. I totally agree with that argument. But let's look at IPv4 for a moment.
If we block a single IPv4 address, what happens if that IPv4 is a CG-NAT IP? Well, all users behind that CG-NAT IP will get blocked. Is it fair? No. Is it a sexy solution? No. It is a dirty solution.
BUT the reason why this is dirty is not fail2bans fault! It is the ISPs fault for handing out CG-NAT IPv4 to customers instead of real, public IPv4 addresses. And the same logic in my opinion applies to IPv6. It is not fail2bans fault that some ISPs only offer /64 prefixes.

@chesio chesio removed this from the 0.22.x milestone Feb 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants