-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPv6 Privacy Extensions #16783
Comments
This is extremely important. qBittorrent binds to both the permanent IPv6, and non-permanent IPv6 currently. Usually, even if it's a bad practice to most, users get a different IPv6 prefix each time they restart their router. (My ISP personally seems to give me the same prefix when possible, but I guess if I restart my router too quickly, that's not the case.) What can be done, is track and keep figuring out what IPv6 prefix is assigned to a certain subscription, the moment you see another IPv6 with the same host part. (I guess this is what the OP means by NIC im not too knowledgable about networking) Perhaps these things might benefit in torrenting in a way, because you can try and figure out what peers are likely to seed, and those who are likely to only leech. However I don't believe torrent clients are using that, and so if anyone is using that to their advantage, it's malicious users, and honestly it's better that these clients don't try to judge users that way. If a user wants to be recognized as a seeder, they would ask their ISP to set up their IPv6 (correctly) and give them a static prefix, and go over and enable DHCPv6 and get a static address, or even just randomize their MAC address and use the permanent IPv6 address. |
Fortunately on Linux the permanent address is derived from the DUID, so you can't get the MAC address. But I see your point, it's not the best using this address since it's public and it does not change over time (unless you change the DUID, but that's another matter). Solving this issue seems tricky because I wonder how you can understand if an address is persistent or generated by the privacy extension. The only solution that came to my mind is to use a blocklist so that you can't use a specific IPv6 (the persistent one, but you can also add other address to the list, if needed). |
I managed to resolve this issue blocking inbound and outbound connections on the port used by qBt with the persistent IPv6. |
For this to work, qBT needs to solve two issues as discussed in #21288 (comment) and #19285 (comment):
|
Suggestion
Please make it so that only temporary IPv6 addresses are bound to. The second half of the permanent address can be used to track a specific NIC over arbitrarily-long time periods. At the moment this can only be mitigated by only binding to IPv4 addresses or using a proxy.
Use case
No response
Extra info/examples/attachments
No response
The text was updated successfully, but these errors were encountered: