I really doubt it. We could give everyone on Earth their own /48 with less than 1% of the IPv6 address space.
- 0 Posts
- 15 Comments
Giving a /48 is spec, but a lot of ISPs are too stingy :/
Going to other planets would require a total re-architecting of our communications infrastructure anyway. There’s such distance too it’s not really viable to have a shared internet. Even Mars would have up to 22 minute latency at peak. So I don’t think it makes sense to plan our current internet around potential future space colonization.
Even so, IPv6 is truly massive. We could give a /64 to every square centimeter of the Earth’s surface and still have IPs to spare. Frankly, I think the protocol itself will be obsolete before we run out.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•Thoughts on the recent Swiss law that might require ProtonVPN to start blocking certain domains?English6·19 days agoAll of your temporary privacy addresses will be coming out of the same subnet, so it’s clear they all belong to the same people.
Ultimately the privacy extensions are just bringing IPv6’s privacy back in line with IPv4, because without the privacy extensions every single device has a separate IPv6 address based on its MAC address whereas in IPv4 most consumer networks have every device sharing a single IP.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish1·1 month agoBe that as it may, the Plex official guide for setting up “remote streaming” walks you through port forwarding. That implies that when they say remote streaming, they mean port forwarding by default. I then had to go digging to find mention of the Relay service which seems to be a fallback. (Apparently it isn’t even supported by all clients)
Surely if they meant they’d start charging for Relays they’d mention that explicitly, and not use the term “remote streaming”?
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish21·1 month agoIt’s the confusing mess of subscriptions and seemingly locking basic functionality behind a paywall that’s skeevy, not paying for software itself. I have happily paid for software before and would again. Plex has never appealed to me though, and they’re certainly doing nothing to make themselves more appealing.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish2·1 month agoDo you have a source for this claim that the new pricing scheme only applies to the Plex Relays? As far as I can tell it applies to anything they consider “remote access”, regardless of whether it goes through their servers or not.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish63·1 month agoIt seems deeply opposed to the spirit of selfhosting to have to pay for the privilege of accessing one’s own server. If the software itself cost money, that would be one thing, but this whole monetization scheme is skeevy.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish252·1 month agoIt seems like multiple things are being conflated here and I’m not sure what the reality is because I’ve never used Plex.
Some people claim this has something to do with Plex needing to pay for NAT traversal infrastructure. Okay, that seems sort of silly but at least there’s the excuse that their servers are involved in the streaming somehow.
But their wording is very broad, just calling it “remote streaming.” That led me to this article on the Plex support website, which walks people through setting up port forwarding in order to enable “remote streaming”! So that excuse doesn’t really seem to hold water. What exactly is being paid for here then? How do they define what “local streaming” is?
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•How do I securely host Jellyfin? (Part 2)English5·2 months agoTailscale is just a bunch of extra fancy stuff on top of Wireguard. If you don’t need the fancy stuff, using raw Wireguard can be more lightweight, but might require more networking knowledge.
The biggest thing Tailscale brings you the table is NAT traversal. On top of that it uses direct Wireguard tunnels as necessary instead of creating a mesh like you usually would if you were using raw Wireguard. It also offers convenient bits of sugar like internal DNS, and it handles key exchanges for you so it’s just generally easier to configure. When you do raw Wireguard you’re doing all the config yourself, which could be a pro or a con depending on your needs—and you’ll be editing config files, unlike Tailscale which has a GUI for most things. It also supports some more detailed security options like ACLs and I think SSO, while Wireguard is reliant on your existing firewall for that.
Here’s what Tailscale has to say about it: https://tailscale.com/compare/wireguard
I’ve messed around with Tailscale myself, but ultimately settled on running Wireguard. The reason I do that though is because I trust my LAN, and I only run Wireguard at the edge. Tailscale really wants to be run on every node, which in turn is something that raw Wireguard theoretically can do but would be onerous to maintain. If I didn’t trust my LAN, I’d probably switch to Tailscale.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•How do I securely host Jellyfin? (Part 2)English33·2 months agoA lot of people have suggested Tailscale and it’s basically the perfect solution to all your requirements.
You keep saying you need ProtonVPN which means you can’t use Tailscale, but Tailscale actually supports setting up an exit node which is what you need. Put Protonvpn on the Raspberry Pi, then set it up as an exit node for your tailnet. There’s a lot of people talking about how they did this online. It looks like they even have native support for bypassing the manual setup if you use Mullvad.
As long as every client has the ability to use Tailscale (I.e. no weird TVs or anything) this seems like it checks all your boxes. And since everything is E2EE from Tailscale, TLS is redundant and you can just use HTTP.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•Plex is locking remote streaming behind a subscription in AprilEnglish2·3 months agoA big part of IPv4’s persistence I think is that people insist that IPv6 is complicated, but then refuse to learn it or think outside their IPv4-brain. It’s just different enough that it’s easier to stay in v4, even if it requires a million hackjob fixes to keep around.
Melmi@lemmy.blahaj.zoneto Selfhosted@lemmy.world•Plex is locking remote streaming behind a subscription in AprilEnglish7·3 months agoIf anything is to blame for that, it’s the lack of momentum behind IPv6. We’re out of IPv4, so NAT is inevitable, and IPv6 doesn’t have enough inertia for single-stack to be viable (certainly wouldn’t be described as “no drama” at least).
deleted by creator
When done correctly, the banner is actually a consent banner. It’s a legal thing, not necessarily trying to discourage criminals. It’s informing users that all use will be monitored and it implies their consent to the technology policies of the organization. It’s more for regular users than criminals.
When it’s just “unauthorized access is prohibited”, though, especially on a single-user server? Not really any point. But since this article was based on compliance guidelines that aren’t all relevant to the homelab, I can see how it got warped into the empty “you no hack” banner.
Only giving a /64 breaks stuff, but some ISPs do it anyway. With only a /64 you can’t subnet your network at all.