Hi,
Now, when connect new Mikrotik product, by default every package is enabled except ipv6.
Is possible ( and interesant ) to enable ipv6 package in future versions by default?
And automatically add link local addresses to the interfaces.With just the IPv6 package enabled (but not configured), it does nothing except providing the ability to configure it.
+1.And automatically add link local addresses to the interfaces.With just the IPv6 package enabled (but not configured), it does nothing except providing the ability to configure it.
You are right. Actually not a problem by itself.
I'm not even asking for stateful dhcp-v6 host assignment at this point.I have no experience with that. My ISP has native IPv6 on all accounts, using (unfortunately) PPPoE and DHCP-PD and this works fine. My Linux clients also work fine on SLAAC/RA. I don't use DHCPv6 internally.
Supposedly it does and for a long time, unless I'm misinterpreting it somehow. But I did not have any luck with that so far. Not that I tried too much.Does Mikrotik's IPv6 dhcp-server support stateless server yet?
The default firewall config for IPv4 is "block the WAN, allow the LAN" and doing the same in IPv6 doesn't 'open new vulnerabilities per-se. The fact of the matter is that we're all about to have to start learning IPv6 or stop administering routers and become end-users and let others take over for us.hell, no !!
i hope there wouldn't be other "opened by default vulnerabilities".
ever without actively exploited RA/NDP - IPv6 "enabled by default" - quickly become pain in ... .
that's correct. (but aside that there was plenty of reasons, why im avoid anything in "default config" and feature itself)The default firewall config for IPv4 is "block the WAN, allow the LAN" and doing the same in IPv6 doesn't 'open new vulnerabilities per-se. The fact of the matter is that we're all about to have to start learning IPv6 or stop administering routers and become end-users and let others take over for us.hell, no !!
i hope there wouldn't be other "opened by default vulnerabilities".
ever without actively exploited RA/NDP - IPv6 "enabled by default" - quickly become pain in ... .
The RA/NDP vulnerabilities you mention are very valid, but they're addressed in access switches (1st hop security) and not routers, and even if your router isn't doing IPv6, a naughty client doing rogue RA can still hijack other LAN clients that listen for IPv6 RA.....