this post was submitted on 13 Jul 2023
121 points (95.5% liked)

Selfhosted

40393 readers
560 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

The question above for the most part, been reading up on it. Also want to it for learning purposes.

you are viewing a single comment's thread
view the rest of the comments
[–] orangeboats 2 points 1 year ago* (last edited 1 year ago) (1 children)

Right. Packets still have to go through your router, assuming that your router has firewall turned on, it goes like this:

  1. Your router receives a packet.

  2. It checks whether the packet is "expected" (a "related" packet) - by using connection tracking.

    For example, if ComputerA had sent something to ServerX before, and now the packet received by router says "from ServerX to ComputerA", then the packet is let through - surely, this packet is just a reply to ComputerA's previous requests.

  3. If step 2 fails - we know this is a new incoming packet. Possibly it comes from an attacker, which we don't want. And so the router checks whether there is a rule that allows such a packet to go through (the assumption is that since you are explicitly allowing it, you know how to secure yourself.)

    If I have setup a firewall rule that says "allow packets if their destination is ComputerB, TCP port 25565", and the received packet matches this description, the router lets it through.

  4. Finally, the packets that the router accepts from the previous steps are forwarded to the relevant LAN hosts.

[–] Reliant1087 2 points 1 year ago (1 children)

I understand this part :) I use a fairly complex firewall at work though I only know bits and pieces from reading different manuals. I think the part I didn't understand was how exactly the routing worked differently in IPv4 vs v6. I get that because NAT happens in IPv4, packets can't be routed at all without the firewall/router but I wasn't sure what was the mechanism by which v6 made sure that packets went through the router, especially when you have stuff like v6 DHCP relays.

[–] orangeboats 2 points 1 year ago

Ah, I misunderstood your original comment, oops! But yes, IPv6 packets are routed just like IPv4 ones, just without the NAT'ing process i.e. the packet remains untouched the entire trip.