All Windows users should immediately update their computers. An exploit rated 9.8/10 (CVE-2024-38063) compromises all devices running Windows with an IPv6 address. - eviltoast
  • froh42@lemmy.world
    link
    fedilink
    English
    arrow-up
    51
    ·
    edit-2
    3 months ago

    IPV6 is already rolled out in parts of the world. My provider has a Dual Stack lite architecture, the home connection is over IPV6, IPV4 is normally being tunneled via V6 through a provider grade NAT.

    As I AM a network nerd, I pay for a dedicated IPV4 address every month, so I can reach my stuff from outside from old IPV4 only networks.

    So when I plug in my router, connect a windows machine and just google stuff then all this traffic will be IPV6 without me configuring anything.

    It’s so great fun having the attack surface being doubled by dual stack setups.

      • froh42@lemmy.world
        link
        fedilink
        English
        arrow-up
        19
        ·
        3 months ago

        Because behind the carrier grade NAT I don’t get a routable IPV4 at all, so no inbound connections.

        With the IPV4 I use I do use dyndns now, so I can resolve it from outside.

        • AnUnusualRelic@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          3 months ago

          Some ISPs have basically destroyed their segment of the Internet, turning it into a cable tv network.