-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPv6 connection limit too relaxed #15
Comments
I believe a /48 or /56 is simply too large, as a /64 roughly corresponds to a /32 in IPv4 and /64 is also the only size that works with SLAAC. |
Also, I believe that the same has happend on IPv4 what was described in kaboomserver/server#147 but has simply gone unreported by Hetzner for the following reason: |
The current IPv6 connlimit mask is /64, which is typically what is given out to customers by ISPs.
Unfortunately, it's way too easy to easy to obtain bigger ranges, for example with HE's TunnelBroker which gives out IPv6 /48 blocks completly for free. That is 65 thousand /64 addresses, meaning 65 thousand possible bots connecting to the server.
Limiting by the /48 or /56 range entirely is not a very good idea either, as it's pretty likely that ISPs will assign multiple customers IPs that both fall in the same /56 range.
I suggest that the connection limits for IPv6 be set up in the following way:
/48
- max. 15 connections;/56
- max. 10 connections;/64
- max. 5 connections.I have not seen this actually be abused yet, however it's very likely that kaboomserver/server#147 was caused by someone exploiting this to spambot the server.
The text was updated successfully, but these errors were encountered: