mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.8K
active users

#ipv6

27 posts24 participants1 post today
London WiFi IPv6<p>London WiFi IPv6 Map</p><p>Crowdsourcing London’s first map of IPv6-enabled WiFi hotspots, to promote adoption:<br><a href="https://LondonWiFiIPv6.github.io" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">LondonWiFiIPv6.github.io</span><span class="invisible"></span></a></p><p>How to help:<br>•Connect to WiFi hotspots<br>•Check for IPv6 via our website<br>•If so, “Add” the location</p><p><a href="https://mastodon.social/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> <a href="https://mastodon.social/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> <a href="https://mastodon.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.social/tags/LondonWiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LondonWiFi</span></a> <a href="https://mastodon.social/tags/LondonWiFiIPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LondonWiFiIPv6</span></a></p>
Freifunk München<p>Interested in an easy to use one-click for users <a href="https://social.ffmuc.net/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> setup?</p><p>We are maintaining an <a href="https://social.ffmuc.net/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> enabled and up-to-date version of <a href="https://social.ffmuc.net/tags/wg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wg</span></a>-access-server.</p><p>Want new features or contribute?</p><p>Go here:<br><a href="https://github.com/freifunkMUC/wg-access-server" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/freifunkMUC/wg-acce</span><span class="invisible">ss-server</span></a></p><p>Our own VPN servers are also running this server.</p><p><a href="https://vpn.ffmuc.net" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vpn.ffmuc.net</span><span class="invisible"></span></a></p><p><a href="https://social.ffmuc.net/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://social.ffmuc.net/tags/Dataprivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dataprivacy</span></a> <a href="https://social.ffmuc.net/tags/eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eu</span></a></p>
Thomas Schäfer<p>Feedback zum WiFi der Bahn.</p><p>Immer wieder gern geschehen.</p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a></p>
gyptazy<p>No, all public facing services are dual stack. Some things like my free VPS hosting platform (<span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BoxyBSD</span></a></span> ) are <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> only</p><p>M@fredrik@universeodon.com</p>
gyptazy<p>What do you guys do with your left-over (public) IPv4 addresses? And no, that’s meant for real :)</p><p><a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> <a href="https://mastodon.gyptazy.com/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/Ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ipv6</span></a> <a href="https://mastodon.gyptazy.com/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.gyptazy.com/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/aws-lambda-inbound-ipv6-connectivity-aws-privatelink/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/aws-lambda-inbound-ipv6-connectivity-aws-privatelink/</span></a></p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/ipv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6only</span></a> <a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/amazon-memorydb-supports-ipv6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/amazon-memorydb-supports-ipv6/</span></a></p><p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/ipv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6only</span></a> <a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Jima :Compromise_bi_flag:<p>And another <a href="https://mspsocial.net/tags/HowIPv6HelpedMeThisWeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowIPv6HelpedMeThisWeek</span></a> (from another week) related to this toot, I have a BIND nameserver in my homelab with 112 views (for shenanigans reasons), and I can't expose that construct to the internet without either <a href="https://mspsocial.net/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>, or some truly hideous port-based NAT hijinks (which, ugh, no thank you).</p><p>(And worse: I actually have two of them now. 😂)<br><a href="https://mspsocial.net/@jima/114354031715285418" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mspsocial.net/@jima/1143540317</span><span class="invisible">15285418</span></a></p>
hallunke23 🇺🇦<p>Wie wäre es, ihr kümmert euch mal um den <a href="https://troet.cafe/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>|-Rollout auf social.bund.de? Ja, ihr müsstet dafür entweder Fa. T-Systems etwas bearbeiten oder den Hoster wechseln. Aber es lohnt sich, weil euch dann endlich die Grundfunktionen der genutzten Dienstleistung zur VErfügung stehen würden! <span class="h-card" translate="no"><a href="https://social.bund.de/@Bundesregierung" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Bundesregierung</span></a></span></p>
Peter N. M. Hansteen<p>The slime also evolves, apparently. Today <a href="https://nxdomain.no/~peter/wankstortion/20250416_jevkisca@teksavvy.com_me@pmg-pub-smtp1.teksavvy.com.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/wankstortio</span><span class="invisible">n/20250416_jevkisca@teksavvy.com_me@pmg-pub-smtp1.teksavvy.com.txt</span></a> (<a href="https://nxdomain.no/~peter/wankstortion/20250416_jevkisca@teksavvy.com_me@pmg-pub-smtp1.teksavvy.com_original_base64.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/wankstortio</span><span class="invisible">n/20250416_jevkisca@teksavvy.com_me@pmg-pub-smtp1.teksavvy.com_original_base64.txt</span></a>) inboxed, as far as I can recall the first <a href="https://mastodon.social/tags/wankstortion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wankstortion</span></a> message received here over <a href="https://mastodon.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> (and likely inboxed for that reason, bypassing the IPv4 only <a href="https://mastodon.social/tags/spamd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spamd</span></a>). </p><p>See "The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?" <a href="https://nxdomain.no/~peter/despicable_no_good_blackmail.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/despicable_</span><span class="invisible">no_good_blackmail.html</span></a> and links therein for some background <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://mastodon.social/tags/sextortion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sextortion</span></a> <a href="https://mastodon.social/tags/bitcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bitcon</span></a> <a href="https://mastodon.social/tags/bitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bitcoin</span></a> <a href="https://mastodon.social/tags/cryptotulips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptotulips</span></a> <a href="https://mastodon.social/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://mastodon.social/tags/extortion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>extortion</span></a> <a href="https://mastodon.social/tags/teksavvy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>teksavvy</span></a></p>
noahm<p>So I have a host running systemd-networkd. Its DHCP client is configured to *disable* IPv6 prefix delegation requests, yet it insists on sending them. WTF? There do not seem to be any more knobs for me to twist to change the behavior beyond the .network file for the interface. <a href="https://chaos.social/tags/systemd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemd</span></a> <a href="https://chaos.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://chaos.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a></p>
goetz 🚲<p><span class="h-card" translate="no"><a href="https://mastodon.social/@plord12" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>plord12</span></a></span><br>Thank you for sharing.<br>What I missed was that <a href="https://chaos.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> allows for route aggregation and greater visibility.<br>As with <a href="https://chaos.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> prefixes I can now tell you the top 10-20 ASes apart without looking up things.<br>The Subnetting is also more consistent.<br><span class="h-card" translate="no"><a href="https://u3acommunities.org/@u3acommunities.org" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>u3acommunities.org</span></a></span></p>
rvstaveren<p>What <a href="https://mastodon.online/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> also would solve, besides address scarcity, would be those weird feuds where companies that fail in their not policy compliant grab of address space seek out to destroy the RIR system using gaslighting</p>
Peter Lord<p>yesterdays talk to <span class="h-card" translate="no"><a href="https://u3acommunities.org/@u3acommunities.org" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>u3acommunities.org</span></a></span> on <a href="https://mastodon.social/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> and <a href="https://mastodon.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> went well I believe. Although if I do it again I need to improve the flow a bit.</p><p>As usual the followup can be found at <a href="https://u3acommunities.org/interest-groups/computing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">u3acommunities.org/interest-gr</span><span class="invisible">oups/computing/</span></a></p><p><a href="https://mastodon.social/tags/u3a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>u3a</span></a> <a href="https://mastodon.social/tags/retired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retired</span></a></p>
Sam<p>I left Plusnet in 2020 because of their radio silence on IPv6. I’m quite happily on Zen now but good to see more UK ISPs on the way to getting <a href="https://social.running.cafe/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>.<br><a href="https://mastodon.social/@ispreview/114346388264504143" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@ispreview/114</span><span class="invisible">346388264504143</span></a></p>
Thomas Schäfer<p><a href="https://ipv6.social/tags/Monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Monitoring</span></a> <a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> </p><p>Seitenladefehler: <a href="http://www.fh-kiel.de/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="">fh-kiel.de/</span><span class="invisible"></span></a></p><p>ich sollte meine Messungen auch öfter mal anschauen<br><a href="https://atlas.ripe.net/measurements/37917240/results" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">atlas.ripe.net/measurements/37</span><span class="invisible">917240/results</span></a></p><p>Leider hat ripe-atlas da keine Benachrichtigungsfunktion.</p>
Miyuru Sankalpa<p>New Blog Post: IPv6 Support in Public Docker Registries in 2025</p><p><a href="https://blog.miyuru.lk/ipv6-docker-registries-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.miyuru.lk/ipv6-docker-reg</span><span class="invisible">istries-2025/</span></a></p><p>Let me know any other docker registries , that I have missed. I will check and update the post.</p><p><a href="https://ipv6.social/tags/Ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ipv6</span></a> <a href="https://ipv6.social/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a></p>
Thomas Schäfer<p><a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>job</span></a> <a href="https://ipv6.social/tags/de" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>de</span></a> </p><p><a href="https://karriere.bund.de/arbeiten-bei-uns/stellenangebote/it-spezialist-in-m-w-d-fuer-das-netzwerkmanagement-mit-schwerpunkt-ipv6-im-referat-114-informations-und-kommunikationstechnik/23715938" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">karriere.bund.de/arbeiten-bei-</span><span class="invisible">uns/stellenangebote/it-spezialist-in-m-w-d-fuer-das-netzwerkmanagement-mit-schwerpunkt-ipv6-im-referat-114-informations-und-kommunikationstechnik/23715938</span></a></p>
Kajetan Staszkiewicz<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@25admins" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>25admins</span></a></span> </p><p>The case of multiple devices each with its own Wireguard tunnel would be way simpler by using <a href="https://ipv6.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> . This can be done with an ULA prefix, so no "real" IPv6 is needed. Each machine gets a /128 and a static route back to /48, so monitoring and remote management don't have to be limited to a single host.</p><p>This would be way simpler than containers or VNETs. And there would be no risk of conflicting with any existing networks (or rather for ULA: it would be greatly limited).</p>
Jill Veldhuis 💾<p>Noob-level <a href="https://kind.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a> <a href="https://kind.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> question:</p><p>My home computers are connected through a router and, although they're clearly using NAT through said router for IPv4, they appear to all have outside IPv6 addresses. Are those addresses directly accessible from outside? When adding AAAA records to my outside DNS zones, should they point to my router's address, or the target machine's?</p>