All the noise that happened recently with the 3G shutdown tells us just how many old phones there out there on the cell networks. Running old iOS/Android versions with a gazillion exploits. I think it’s a good thing that telcos NAT their customers. The last thing we want is for the Internet to be able to easily connect to those devices.
ipv6 does also reduce network congestion and improve routing efficiency.
Unless you are moving gigabits of data, you won’t notice the difference the smaller header payload of ipv6 offers. That’s some serious ePenis bragging bullshit I see all the time among nerds who want to say they’re on the latest and fastest technology without understanding that while they are correct (uploading/downloading a gigabyte over ipv6 will probably complete a few seconds faster over ipv6 instead of ipv4), they’re also making a big deal about nothing.
Your issue is you want to be able to access your home network over mobile infrastructure, while you are paying for a basic phone plan. Optus does offer what you want, but to business customers. Telstra will also permit you to apply a static IP to some of their plans, I managed to do this for a client about 10 years ago. It was just an add-on that Telstra offered. They were on a business plan, but I don’t remember whether a business plan was a requirement.
The_Decryptor@aussie.zone 19 hours ago
That’s the job of a firewall, not a NAT.
That a NAT also blocks connections is incidental, it’s blocking them because it just has no idea how to handle them.
Nath@aussie.zone 19 hours ago
Having been on the other end of this situation before, I’m going to disagree with this take. On a normal network, yes - you have a firewall to block traffic except to specific IPs/ports. Once you are in the Millions of nodes realm though (and I only ever got into the hundreds of thousands), a firewall is too unwieldy. You can never keep it up to date with all your customers comings and goings. Imagine you have 10 million customer devices and 0.01% of them come or go on any given day. That’s 10,000 firewall updates per day. You’re spending a lot of tech time maintaining and updating that firewall, and you introduce a small risk of an incident with every firewall update. And for what? For the most annoying of your customers.
Sorry to be blunt, but it’s true. The tiny proportion of customers who want to be able to remotely connect to their home networks are the first to complain about any sort of network congestion (particularly uploads, which regular users don’t even notice). They make a lot of noise about every $5/month price increase. They are the most likely to be doing sketchy stuff on the network. And six months down the line when there’s some new exploit, they’re the most likely vector into the network of the latest worm as they didn’t maintain their security updates diligently. It is far easier to simply not cater to them and let them be someone else’s problem. As customers, they aren’t profitable.
You handle this by putting your static IP customers on a special VLAN and charge them for the service. And then yes: you have a manageable firewall sample.
Salvo@aussie.zone 39 minutes ago
As a customer that has their own UniFi Security Gateway and also ran services from home during the old BigPond Cable days, everything that Nath has said is correct.
Back in the 90’s BigPond used to do everything possible to prevent us from running our own unmetered file sharing network. We had a set of relays and proxies which meant that we were able to share files with other BigPond users, bypassing the billing system. I am sure that the Management at BigPond Cable hated this while the Technicians (who also had BigPond Cable) enabled it.